MITRE ATT&CK: External remote services

| | MITRE ATT&CK
Introduction In this article, we will discuss the various ways that attackers are able to abuse external remote services to gain unauthorized access into internal networks. We will also discuss some... Go on to the site to read the full article ... Read More

MITRE ATT&CK: Exploiting a public-facing application

| | MITRE ATT&CK
Introduction Public/internet-facing applications are the most common applications present on the internet today. In this article, we’ll take a close look at these applications. We not only discuss... Go on to the site to read the full article ... Read More

MITRE ATT&CK: Drive-by compromise

| | MITRE ATT&CK
Introduction In this article, we will discuss drive-by compromise attacks: exactly what they are and the different forms they can take. We will also see examples of how they are executed, how to... Go on to the site to read the full article ... Read More

MITRE ATT&CK: Hardware Additions

| | MITRE ATT&CK
Introduction In this article, we shall discuss the very real threat of malicious hardware additions, what they are and their different types and forms, application areas and usage. We will also see... Go on to the site to read the full article ... Read More

Network traffic analysis for incident response (IR): What incident responders should know about networking

Introduction In this article, we’ll discuss the various things that incident responders must know about the operation of a network and how this can help improve how their security teams respond to... Go on to the site to read the full article ... Read More

Traffic analysis for incident response (IR): How to use traffic analysis for Wireshark

Introduction Traffic analysis is the process of monitoring network protocols and the data that streams through them within a network. In this article, we’ll discuss how you can use Wireshark for... Go on to the site to read the full article ... Read More

Ethical hacking: Passive information gathering with Maltego

Introduction In this article, we’ll discuss passive information gathering. We’ll first look at how we can use Maltego, a common information gathering tool, to perform this form of reconnaissance.... Go on to the site to read the full article ... Read More

Ethical hacking: What is vulnerability identification?

Introduction In this article, we will discuss vulnerability identification, discussing what it means and how best to conduct it. We’ll also look at how organizations take the initiative of... Go on to the site to read the full article ... Read More

Linux for ethical hackers 101

Introduction In this article, we’ll discuss the Linux operating system and how it ties in with ethical hacking. We will explore the Linux distributions that have been designed with hacking in mind... Go on to the site to read the full article ... Read More

Getting started with ethical hacking

| | ethical hacking
Introduction In this article, we’ll discuss the ways that even complete beginners with no security background can get into ethical hacking. In case you are considering ethical hacking as a career, we... Go on to the site to read the full article ... Read More