As an assistant mentor on Cybrary, I get asked a lot “how much Linux do I need to study security?” What I really hear is “Hey, I get it: more is better, but do I really need to be a deeply skilled/certified Linux admin with years of hands-on experience before
Read more →Arka Kapı is a hackers’ magazine that began its journey in Turkey. ‘Arka Kapı’ stands for back door. We’re publishing our fourth issue in Turkey as we introduce the first English issue to you. The internet today hosts the core components of personal freedom: freedom of speech,
Read more →A password is known generally to be the secret code you input to gain access to a resource. Authentication is the process of gaining access to a resource. Passwords are a means of authentication. They are usually our only means of authentication for our online accounts. Are they hackable? Yes, very much
Read more →Dear Cybrarians, I’m going to explain how to bypass login of a website and how it works using SQL injection. I hope you all have a basic understanding of database and SQL queries. So, it starts now. Whenever we visit a website, there are options for logging
Read more →Cyber-terrorists were once hackers, and maybe that’s why the media treat them like that. But if they were, why are not they anymore? Every hacker has a strict code of ethics, where he tries to always differentiate between right and wrong, from the moment that code is
Read more →HoneyBOT is a medium interaction honeypot for windows. It is a fake device occurrence on our local network. The device works as a target for hackers and to get what they want from fake data on the device. This is great to learn how the hacker thinks and what his
Read more →Dear Cybrarians, I’m writing this article after a while.Many of my friends asked me is hacking possible without having a desktop or laptop? I understood their frustration. So I decided to do a write-up on hacking with android applications. There are plenty of Android apps are available for
Read more →Introducing UNMASKED, your source for the latest and greatest in cyber security and at Cybrary, found in a new, easily downloadable and interactive PDF format. Get more from your reading experience by clicking the buttons or bolded text to explore content beyond what’s on the page. In this edition,
Read more →CEH Course Modules *Introduction to Ethical Hacking there are five phases of hacking 1. Information gathering (Reconnaissance) 2. scanning 3. Gaining Access 4. Maintaining Access 5. Covering Tracks (back door) Footprinting and reconnaissance Footprinting is the process of collecting as much information as possible
Read more →