What is Hydra? Hydra is a brute force online password cracking program; a quick system login password ‘hacking’ tool. We can use Hydra to run through a list and ‘bruteforce’ some authentication service. Imagine trying to manually guess someones password on a particular service (SSH, Web Application Form, FTP or SNMP) – we can useContinue reading “Hydra”
Tag Archives: requirements
Metasploit Framework
Metasploit, an open-source pen testing framework, is a powerful tool utilized by security engineers around the world. Maintained by Rapid 7, Metasploit is a collection of not only thoroughly tested exploits but also auxiliary and post-exploitation tools. Throughout this room, we will explore the basics of using this massive framework and a few of theContinue reading “Metasploit Framework”
Some Generic Terms
Goals, Mission and Objectives Goals: Define what the organization desires to achieve Goals provide the overall context of what the organization wants to accomplish. Mission: Indicate how will you proceed to them Mission is a statement of the organization’s purpose and reason for existence. Objectives: Help in creation of long term and short term strategiesContinue reading “Some Generic Terms”
Governance, Risk and Compliance
GRC is an acronym of Governance, Risk management and Compliance. GRC of every organization is different and varies based on the type of organization. It depends on organization mission, size, industry, culture and legal regulations. Ultimate responsibility of GRC program is to protect their assets and operations, including their IT infrastructure and information. Governance ItContinue reading “Governance, Risk and Compliance”
Client Server Architecture
Client server architecture is a distributed architecture that helps to divide workloads between client and server. In the client server architecture, when the client sends the request to server over internet, the server validates the request and responses to that. Advantages All dat in centralized at one place. Cost efficient Data recovery possible. Capacity canContinue reading “Client Server Architecture”
OSI Model
The Open Systems Interconnect model (OSI Model) explains all the individual functions that are necessary for the Internet to work. Physical Layer The Physical layer of the OSI model is responsible for the transfer of bits — the 1’s and 0’s which make up all computer code. Physical Layer is anything that carries 1’s andContinue reading “OSI Model”
Basics of Networking
What is networking? So in simple words networking is an art of connecting devices together so that they can communicate with each other and transmit data. Basic terminologies: Client A client is a hardware device or software that access a service made by the server. Client basically request for services to the server. For example:Continue reading “Basics of Networking”
Prerequisites To Start Ethical Hacking
Skills required to become an Ethical Hacker or Information Security Analyst. Computer Networking Skills General Computing Skills Linux Knowledge Programming Knowledge Database Management Systems(DBMS) Wireless Technology Patience (Most important) Computer Networking Skills Understanding networking concepts and protocols like SSH, FTP, OSI Model, how a packet travels according to OSI model, etc. General Computing Skills ThesesContinue reading “Prerequisites To Start Ethical Hacking”
