Month: February 2024
Detecting Sneaky Connections: A PowerShell Crash Course for Windows Newbies
Today, we embark on a quest to unmask the devious connections lurking in the shadows of our systems. Cyber threats beware, for we have PowerShell at our side—a tool so mighty, it makes even the most elusive network villains tremble. In this blog post, we’ll explore the world of malicious connections and learn how to
Site Cloning and Credential Harvesting
There are so many methods a hacker can use to grab someone’s online credentials. Login credentials to lets say a bank, credit card, email or social networking site arThere are so many methods a hacker can use to grab someone’s online credentials. Login credentials to lets say a bank, credit card, email or social networking
How to quickly block an IP address with IPTABLES on Linux.
As I was experimenting, creating a few bash scripts to view and in addition monitoring a few logs on my Linux box, I came across a few IP addresses showing up associated with an invalid SSH login. I will show you the scripts in another post because someone trying to access your system and how
HTTP Never!
Web security is an ongoing concern, prompting many websites to transition from the less secure HTTP to the more robust HTTPS protocol. However, within internal networks, some companies still rely on HTTP, creating potential vulnerabilities despite external firewalls and intrusion detection systems (IPS). Consider a scenario where an attacker gains physical access to a company’s