We are all familiar with the concept of internet search engines such as Google, Bing, Safari, and even Yahoo. But what if you looking for information that is deeper than the capabilities of these search engines?
There are some web-based tools for someone to pick particular information from the ocean of CyberSpace. In this article, we gathered five of them:
Shodan is a popular search engine for conducting security research on internet-connected devices. This tool is used by thousands of security experts, researchers, CERTs, large organizations, and others throughout the world.
Basically, a sock puppet is an alternative profile usually, a social media profile, which you create intending to gather open-source information, with the restriction that this profile will not link back directly to your original account.
Sock puppets can be used in various different ways-
Basically, sock accounts…
Rogue mobile apps might be the fastest-growing phenomenon among cybercriminals.
They’re a constant problem in unauthorized and authorized mobile app stores, including Google Play and the App Store.
Rogue mobile apps are counterfeit apps designed to mimic trusted brands or apps with non-advertised malicious features. In both cases, the goal is that unaware users install the app in order to steal sensitive information such as credit card data or login credentials.
The common way to install apps is to use the official app store. By default, neither Android nor Apple’s iPhone allows users to install apps from unknown sources. …
From a cybersecurity point of view, the dark web is like a huge marketplace, where sensitive data (personal data, banking data, credentials, etc.) rubs shoulders with cyberattack kits. We find indeed malware sold between $50 and $500, there would be 15 billion credentials in circulation.
After clarifying the terms deep web, dark web, and darknet, we will see how to verify if your business data is available on the dark web and what to do if it is.
This is the publicly visible part of the internet that most of us use each day, and is accessed through search engines…
Google is one of the most reliable and validated search engine ever in the history of the internet. it is specifically designed to show the result according to our need and even sometimes when we do not know the exact query what to be searched, by entering a few of the words related to the query we get the result.
Google hacking, sometimes, referred to as Google Dorking, is an information-gathering technique used by an attacker leveraging advanced Google searching techniques. …
The term reconnaissance comes from its military use to describe an information-gathering mission. Both types of reconnaissance are sometimes referred to as passive attacks because the purpose is simply to obtain information, rather than to actively exploit the target. However, reconnaissance is often a preliminary step towards an active attempt to exploit the target system.
Passive reconnaissance is part of the pre-attack phase for hackers. Attackers first “get to know” their targets to ensure that they have all the relevant information to make their attacks successful. They can do so by gathering intelligence in two ways―passive or active reconnaissance. …
Pegasus is a remote access tool (RAT) with spyware capabilities. Its Android variants are capable of extracting data from popular messengers such as WhatsApp, Facebook, and Viber as well as email clients and browsers. The spyware is capable of remote surveillance through the phone’s microphone and camera as well as taking screenshots and keylogging the user’s inputs.
Pegasus is used only on a few individuals, apparently, for surveillance purposes. The minimal spread of the spyware doesn’t make it less dangerous, for each individual is under surveillance the scope of privacy damage is certainly very high. …
The majority of networked systems link together using some type of cabling. Different types of networks over the years have used a number of different types of cables
All cables used in the networking industry can be categorized in two distinct groups: copper and fiber-optic. All styles of cables have distinct connector types that you need to know.
Copper Cabling and Connectors The most common form of cabling uses copper wire wrapped up in some kind of protective sheathing, thus the term copper cables. The two primary types of copper cabling used in the industry are coaxial and twisted pair…
A basic Ethernet frame contains six pieces of information: the MAC address of the frame’s recipient, the MAC address of the sending system, the type of the data, the data itself, a pad (if needed), and a frame check sequence. Appended to the front of the frame is the preamble.
All Ethernet frames begin with a preamble, a 7-byte series of alternating ones and zeroes followed by a 1-byte Start Frame. The preamble gives a receiving NIC time to realize a frame is coming and to know exactly where the frame starts. …
Prerequisite — Layers of OSI Model
The OSI Model we just looked at is just a reference/logical model. It was designed to describe the functions of the communication system by dividing the communication procedure into smaller and simpler components. But when we talk about the TCP/IP model, it was designed and developed by the Department of Defense (DoD) in the 1960s and is based on standard protocols. It stands for Transmission Control Protocol/Internet Protocol. The TCP/IP model is a concise version of the OSI model. It contains four layers, unlike seven layers in the OSI model. The layers are: