Cyber Security: A term being given attention by the majority of the IT practitioners.
Cyber Security refers to “PROTECTING YOUR CYBER ASSETS AND SENSITIVE DATA.”
In other words, Cyber Security refers to the technologies, processes and practices designed to protect networks, devices, app and data from any kind of cyber-attacks. Cyber security may referred as information technology (IT) security.
Cyber security can also be described as the collective methods, technologies, and processes to help protect the confidentiality, integrity, and availability of computer systems, networks and data, against cyber-attacks or unauthorized access. …
Hello Everyone, I am back again with new stuff to share with you all. This content is totally made for the beginner who wants to get themselves into Cyber Security. I don’t want to go for theory from now, so I am just adding the link to go through with it but for different tasks, I will add further blogs here.
Link: Advent of Cyber 2
Hello folks, I am Samarth Dad, aka h4xpl0it. Today, we will solve Intro to LAN, and let’s understand the concept.
Over the years, there has been experimentation and implementation of various network designs. In reference to networking, when we refer to the term “topology”, we are actually referring to the design or look of the network at hand. Let’s discuss the advantages and disadvantages of these topologies below.
The main premise of a star topology is that devices are individually connected via a central networking device such as a switch or hub. …
Hello folks, I am Samarth Dad, aka h4xpl0it. I am here with a well-known platform that is famous for the practice of pen-testing and also for gaining knowledge regarding Cyber Security, that is, TryHackMe.
In this room, we will be getting a brief introduction about some terms which are useful in Cyber Security like Web Application Security, Network Security, etc. We will be seeing the Learning Roadmap to find suitable fields like Offensive Security, Cyber Defence.
Hello folks, I am Samarth Dad, wanna be Penetration Tester. I am here with a well known platform which is famous for practice of pentesting and also for gaining knowledge regarding to Cyber Security, that is, TryHackMe.
We are directly jumped at the basic room which tells us about the security terms used by the Cyber Security Experts to call out the professional of it.
Linux is an open source operating system (OS). An operating system is the software that directly manages a system’s hardware and resources, like CPU, memory, and storage. The OS sits between applications and hardware and makes the connections between all of your software and the physical resources that do the work.
For Cyber Security Enthusiasts, Linux is the best Operating System because it provide all security tools inbuilt in it and also the beneficial part is, it provides Kernel, in which you are easily able to understand the working of the OS.
We are going to learn basic commands of…
Hey fellas, in this article I’ll be giving a basic overview of the Portswigger labs and the OWASP 10 vulnerabilities so that you grasp basics of these vulnerabilities before we move on to labs!
Portswigger: A community that builds web Security apps. In the Cybersecurity field, everyone must have heard about one of the well known application which is BurpSuite, which is used to analyze the web application and perform various tasks.
Portswigger providing labs depending on the specific web application to enhance your skills for OWASP 10 vulnerabilities.
Lab link- https://portswigger.net/web-security
Here, at this point, I know many of…
Cyber Security include big selection for various fields regarding to application, network etc. Here, we are going to discuss the assorted type in deep meaning, in order that we are able to differentiate the subsequent terms.
Types of Cyber Security are nothing but the techniques accustomed prevent the stolen or assaulted data. It needs knowledge of possible threats to data, like viruses and other malicious code.
There is a circle above mentioned with all the major types of Cyber Security. We will discuss each type one by one.
Network security may be a broad term that covers a mess of…
I am Samarth Dad (wanna be Pentester) from India. Here, I am going to solve the task of the invite challenge of Hack The Box.
First of all, I am going to tell about Hack The Box for whom are beginner and just started reading security blogs. So, Hack The Box is the platform that provides the various vulnerable machines to solve it and gain the concept of security behind it.
Hack The Box is an online platform allowing you to test your penetration testing skills and exchange ideas and methodologies with thousands of people in the security…
CyberSec Enthusiast. Pentester wannabe. 18 y.o. CTF Player. Exploring world like a fox.