Posts

Featured Post

Main Steps Of A Cyber Attack

Image
Fundamentally There Are Seven Steps Of A Cyber Attack: Step 1 :  Reconnaissance This is Step in which a hacker tries to identify the system and checks for vulnerability and the best way to hack it ( This process happens before the attack ). Step 2 :  Scanning After Reconnaissance, the next step is scanning in this step hacker tries to identify a weak point that allows the hacker access to the system or gain some privilege. Step 3 : Access and Escalation   After Scanning the hacker's  next step is to gain access and then escalate privileges to allow the attacker to move freely within the environment. Once the attacker has access and privileges are escalated, they have effectively taken over your system. Step 4 :  Exfiltration  In this step the hacker now seeks data,sensitive information, logs and everything that he can possible get form the system and then hacker extracts this data to his/her server or any means to steal it. Step 5 :  Sustainment In thi...

What is Geographic Information Systems (GIS)

Image
Geographic Information Systems (GIS) Stands for "Geographic Information Systems." GIS tools are used to gather and analyze data about the surface of the earth. The data can be used to create charts, maps, and 3D models of the earth's surface. This includes hills, mountains, trees, buildings, streets, rivers, and pretty much anything else. Sounds fun, but how is it used? Well, organizations such as the police and fire department can use the data to develop emergency routes. The government can use the data to measure the growth and expansion of cities or the depletion of forests. Most importantly, however, GIS can assist with special effects by simulating landscapes and terrain in action movies. GIS files created with ArcGIS software use the  .e00  file extension.

Top 5 Text Editors Programmers Use!

Image
Top 5 Text Editors Programmers Use: 1. Atom Atom is a free and open-source text and source code editor for macOS, Linux, and Microsoft Windows with support for plug-ins written in Node.js, and embedded Git Control, developed by GitHub. Atom is a desktop application built using web technologies. 2. Sublime Text Sublime Text is a shareware cross-platform source code editor with a Python application programming interface. It natively supports many programming languages and markup languages, and functions can be added by users with plugins, typically community-built and maintained under free-software licenses 3. gedit gedit is the default text editor of the GNOME desktop environment and part of the GNOME Core Applications. Designed as a general-purpose text editor, gedit emphasizes simplicity and ease of use, with a clean and simple GUI, according to the philosophy of the GNOME project 4. Vim Vim is a clone, with additions, of Bill Joy's vi text editor program for Unix. Vim's autho...

Top 3 Forensic Tools

Image
TOP 3 COMPUTER FORESIC TOOLS 1.  ProDiscover Forensic 2.  The Sleuth Kit (+Autopsy) (personal fav) 3.   CAINE (Computer Aided Investigative Environment) For More Information Google Is Your Friend.

Over 4000 Android Apps Expose Users' Data via Misconfigured Firebase Databases

Image
More than 4,000 Android apps that use Google's cloud-hosted Firebase databases are 'unknowingly' leaking sensitive information on their users, including their email addresses, usernames, passwords, phone numbers, full names, chat messages and location data. The investigation, led by Bob Diachenko from Security Discovery in partnership with Comparitech, is the result of an analysis of 15,735 Android apps, which comprise about 18 percent of all apps on Google Play store. "4.8 percent of mobile apps using Google Firebase to store user data are not properly secured, allowing anyone to access databases containing users' personal information, access tokens, and other data without a password or any other authentication,"  Comparitech  said Acquired by Google in 2014,  Firebase  is a popular mobile application development platform that offers a variety of tools to help third-party app developers build apps, securely store app data and files, fix issues, and even engag...

Rot13 Cipher

Image
Rot13 Ciper Basic Crypto The ROT13 cipher is a substitution cipher with a specific key where the letters of the alphabet are offset 13 places. I.e. all 'A's are replaced with 'N's, all 'B's are replaced with 'O's, and so on. It can also be thought of as a Caesar cipher with a shift of 13. The ROT13 cipher is essentially a substitution cipher with a fixed key, if you know the cipher is ROT13, then no additional information is needed to decrypt the message. The substitution key is: ABCDEFGHIJKLMNOPQRSTUVWXYZ NOPQRSTUVWXYZABCDEFGHIJKLM Example The Word Pirzada is written as Cvemnqn