Posts

Showing posts from August, 2019

HTB-Netmon(writeup)

Image
Hack The Box - Netmon Hey guys today Netmon retired and here’s my writeup on the machine. It was a easy machine that’s everything I can say about it. IP of the Box : 10.10.10.152 As always we will start with nmap to scan for open ports and services : nmap –sC –sV –A 10.10.10.152 We got ftp on port 21, http on port 80 and smb. The most interesting thing is that anonymous login is allowed on ftp.  For user.txt root@kali:~/Desktop/HTB/boxes/netmon# ftp 10.10.10.152 Connected to 10.10.10.152. 220 Microsoft FTP Service Name (10.10.10.152:root): anonymous 331 Anonymous access allowed, send identity (e-mail name) as password. Password: 230 User logged in. Remote system type is Windows_NT. ftp> ls 200 PORT command successful. 125 Data connection already open; Transfer starting. 02-03-19   12:18AM                  1024 .rnd 02-25-19   10:15PM        <DIR>           inetpub 07-16-16   09:18AM        <DIR>   

Best Linux distribution to start journey as pentester

Image
So in this post, I am describing some of the best Linux Distribution and my personal favorite distribution. Let's get started   Kali Linux: One of the best Operating system with thousands of tools which helps in Pentesting. Developed by Offensive Security, Kali Linux distro tops our list of the best operating systems for hacking purposes. This Debian-based OS comes more than 600 preinstalled pen testing tools that make your security toolbox even more advanced. These efficient tools are updated regularly like Nmap, Metasploit, etc and are available for different platforms like VirtualBox and VMware . Download  Kali Linux Parrot Security OS: This is also the best Operating system with thousands of tools which helps in Penetration testing. This distribution is designed for ethical hacking, pen testing, computer forensics, ethical hacking, cryptography, etc. Compared to others, Parrot Security OS promises lightweight OS that is highly efficient. Download  Pa

What is cybersecurity?

What is cybersecurity? Cybersecurity is the mechanism of protecting systems, networks, and programs from digital attacks.  These cyberattacks usually target to access, changing, or destroying sensitive information. What cybersecurity can prevent? Cybersecurity prevents cyberattacks, data breaches, and identity theft and can aid in risk management. When an organization has a strong point in network security and an effective incident response plan, it is better able to prevent and mitigate cyber-attacks. For example, end-user protection defends information and guards against loss or theft while also scanning computers for malicious code. Types of cybersecurity threats The process of keeping up with updated technologies, security trends and threat prevention is a challenging task . However, it's necessary in order to protect information and other assets from cyber threats, which takes in many forms, some of them are mentioned below: ·        Rans

Followers