Vulnerability Scanning: Automatic Search For Known CVEs With CVEScannerV2

Welcome back, aspiring cyberwarriors!   During reconnaissance, our goal is to identify vulnerable services within our target’s network. To streamline this process, CVEScannerV2 was developed – a powerful Nmap script that bridges the gap between network scanning and vulnerability assessment. This tool enhances the capabilities of the widely-used Nmap scanner, offering security professionals a comprehensive […]

Continue Reading

Wi-Fi Hacking, Part 17: Wi-Fi Hacking with Bettercap

Welcome back my aspiring cyberwarriors! In this series on Wi-Fi (802.11) hacking, we have examined a multitude of approaches to Wi-Fi hacking including; Wireless Hacking Strategies Getting Started with aircrack-ng Hacking WPA2-PSK Continuous DoSing of a Wireless AP Hacking WPS with Reaver Hacking WPA2-PSK without Password Cracking Evading Wi-Fi Authentication Evil Twin Attack to Spy […]

Continue Reading

Database Hacking: Common SQL Injection Commands

Welcome back, my aspiring cyberwarriors! According to the Open Web Application Security Project (OWASP), command injection is perennially one of the most serious and numerous attacks against web applications. In addition, these attacks usually involve serious financial damage to the companies and other institutions as they are attacks against the database, the repository of so […]

Continue Reading

Open Source Intelligence (OSINT): Finding Vulnerable Systems Across the Internet with Netlas.io

Welcome back, my aspiring cyberwarriors! Oftentimes, as cyberwarriors, we need to check to see whether our systems or others’ are vulnerable to various known vulnerabilities and attacks. Whether a penetration tester, security engineer or other malicious actors, such information can be critical to the success of your mission. There are number of other websites that […]

Continue Reading