Home security App - Mobile Artificial intelligence (AI)

Artificial intelligence (AI)

Wrong Permission Delegation Can Dismantle Your Whole Active Directory!

Active Directory Permissions are similar to file system permission we set every day on our servers. UI is almost exactly the same, the permission names are obviously a little bit...

NSE Scripts – More Than Scanning

NSE Scripts Types HWInternally, scripts are divided into four types: prerule scripts, host scripts, service scripts and postrule scripts. Prerule and postrule scripts run before and after Nmap has scanned all of...

How To Protect Unencrypted Network Protocol

Preparing the Environment First of all, I will prepare my environment to have some files and some network shells. I’ll be using one of the servers, which is actually SQL, and...

Protect Yourself From Malicious PKI Administrator – Role Separation In PKI

Availability of Role Separation Role separation is available on Windows certification authorities since Windows 2003. Right now, we have Windows 2016. This year, Microsoft will release Windows 2019, but still, when...

Vulnerability Scanning with OpenVAS 9 part 1: Installation & Setup

A couple years ago we did a tutorial on Hacking Tutorials on how to install the popular vulnerability assessment tool OpenVAS on Kali Linux. We’ve covered the installation process on...

Vulnerability Scanning with OpenVAS 9 part 2: Vulnerability Scanning

Is the previous tutorial Vulnerability Scanning with OpenVAS 9.0 part 1 we’ve gone through the installation process of OpenVAS on Kali Linux and the installation of the virtual appliance. In...

Is Remote Desktop Connection Secure?

Using RDP Bitmap Caches I will open the next document, which is RDPEGDI document, and here we have a chapter within the document with the number 3.1.1.1.1, and within this chapter,...

Using Rubber Ducky To Steal Encrypted Data

I’m pretty sure that you cannot type as fast as this little guy, which looks like this: Inside of Rubber Ducky, we have SD card that holds our payload. We are...

RSA 2018: Adventures In The Underland: Techniques Against Hackers Evading The Hook

About the session Cybercrime is a very lucrative business not just because of the potential financial return, but because it’s quite easy to get away with it. Sometimes hackers get caught,...

Hacking SQL Server Traffic: Tabular Data Stream

Paula’s part: First of all, I will show you the environment. This is the client simulating the application. What I have over here is a regular query, I’m using the CQURE...

LATEST NEWS

MUST READ