top of page
What are the common metasploit commands?
Metasploit Framework is one of the most powerful and leading penetration-testing tool written in Ruby, and also one of the biggest...
Nov 19, 20243 min read
Â
Â
How does an organization network diagram look like with all security components deployed?
The network diagram would change from one organization to other, but this is what a general network diagram looks like: Let’s discuss the...
Nov 19, 20242 min read
Â
Â
What is bind shell and reverse shell? Explain difference between them also explain what are different options in reverse and bind shell
Bind shell and Reverse shell are two different types of hacking techniques in order to gain unauthorized remote access to the compromised...
Nov 19, 20242 min read
Â
Â
What is LHOST and RHOST ? Explain in detail
LHOST (Local Host): This refers to the attacker's own system, the one from which the attack or exploit is initiated. It specifies the IP...
Nov 19, 20241 min read
Â
Â
All NMAP commands and why they are used?
The following are the fundamental nmap commands and their purpose as follows: Basic scan techniques: Scan name and their purpose NMAP...
Nov 19, 20242 min read
Â
Â
How to install wireshark in windows
A good tutorial on the installation of wireshark can be found below. https://www.youtube.com/watch?v=fpeMCuCKgHA To download Wireshark,...
Nov 18, 20241 min read
Â
Â
bottom of page
