Skip to content
KyberSecMe

KyberSecMe

  • Home
  • About
  • Ethical Hacking
    • Footprinting and Reconnaissance Tools
    • Scanning Network Tools
    • Cyber Kill Chain
  • Contact

web shell attack

April 30, 2023July 22, 2023
Petroslav Pavlovič
Uncategorized

Between August 2020 and January 2021, there were 140,000 web shell attacks. (Microsoft) How hackers can performing web shell A web shell is a type of malicious code that can be uploaded to a web server, allowing an attacker to

Read more

How to avoid an attacker will spoof your email?

April 30, 2023July 22, 2023
Petroslav Pavlovič
Uncategorized

Over 3 billion domain spoofing emails delivered per day. Yahoo was the most impersonated brand for phishing attacks during Q4 2022, climbing 23 places and accounting for 20% of all attempts. (Checkpoint.com) SPF, or Sender Policy Framework, is an email

Read more

NetBIOS enumeration

March 9, 2023March 14, 2023
Petroslav Pavlovič
Enumeration

What is NetBIOS (Network Basic Input/Output System)? Programs running on Microsoft Windows-based systems communicate with one another across a local area network using the API (Application Programming Interface) known as NetBIOS (LAN) NetBIOS was developed as a part of the

Read more

Cyber Kill Chain – Part 1 – Reconnaissance

March 6, 2023March 6, 2023
Petroslav Pavlovič
Cyber Kill Chain

A security tactic called the Cyber Kill Chain outlines the steps a cyber attacker must take in order to successfully compromise a target. Organizations can better detect, prevent, and react to cyberattacks by understanding and charting these steps. The Cyber

Read more

How to start with Nmap, alias first 10 commands

March 2, 2023March 6, 2023
Petroslav Pavlovič
Scanning Network Tools

A well-known open-source security program called Nmap (Network Mapper) is used to find hosts and services on a computer network and to map out the topology of the network. It may be utilized to check for open ports and identify

Read more

How to help secure your organization by using Google Dorks

February 28, 2023February 28, 2023
Petroslav Pavlovič
Footprinting and Reconnaissance Tools

What are Google dorks? Google dorks are search queries that employ sophisticated search operators to locate particular online data that may not be readily available through standard search searches. With the use of these search operators, users can look for

Read more

Quick overview of how to Trust Nobody!

February 28, 2023February 28, 2023
Petroslav Pavlovič
Uncategorized

68% of cybersecurity leaders say secure cloud transformation is impossible with legacy network security infrastructure such as firewalls and VPNs. Is predicted that Zero Trust will replace VPN by 2025. Over 70% of all organizations around the world have either

Read more

Artificial Intelligence, Security assistant, or Threat?

February 28, 2023March 1, 2023
Petroslav Pavlovič
Uncategorized

A July 2022 report by Acumen Research and Consulting says the global market was $14.9 billion in 2021 and is estimated to reach $133.8 billion by 2030. 68% of survey respondents stated that artificial intelligence (AI) can be used for

Read more

Have you troubled to remember all your passwords?

January 18, 2023February 28, 2023
Petroslav Pavlovič
Uncategorized

Password Manager Benefits And Choices. Web users without password managers are three times more likely to experience identity theft than those who properly use them. Google’s findings: 25% of Americans are still using weak passwords such as pass123, abcpass, or

Read more

Blockchain storage

January 18, 2023January 18, 2023
Petroslav Pavlovič
Uncategorized

For keeping data backup copies, decentralized, distributed storage systems can be madeusing blockchain technology. These systems don’t use a centralized server; instead, data isstored among a number of network nodes. Because there are several nodes where copies ofthe data are

Read more

Posts navigation

Older posts

Archives

  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022

Categories

  • Cyber Kill Chain
  • Enumeration
  • Footprinting and Reconnaissance Tools
  • Scanning Network Tools
  • Uncategorized
KyberSecMe
© 2025
Powered by WordPress
Theme: Masonic by ThemeGrill
Cleantalk Pixel
Manage Cookie Consent
We use technologies like cookies to store and/or access device information. We do this to improve browsing experience and to show personalized ads. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}