Sistema de blogs Diarium
Universidad de Salamanca
Pablo Gallardo's Blog
My professional web log about IT, Cybersecurity & Project Management
 
Tag Archives | hacking

DLL Side-loading Attack

This post explains what is a DLL side-loading attack in the context of IT security.   What is a DLL Side-loading Attack? A Dynamic Linked Library (DLL) is a file that is used on Windows systems to group functions. By using DLLs, common functionality can be isolated and re-usability is enabled. As DLL are particular […]

Comments { 0 }

List of Web Server Attack Tools

List of web server attack tools metasploit Wfetch THC Hydra HULK DoS MPack w3af Among the most popular, there is metasploit and Wfetch. List of web server attack tools metasploit https://www.metasploit.com/ Wfetch https://download.cnet.com/WFetch/3000-2356_4-10735465.html THC Hydra https://www.thc.org HULK DoS https://github.com MPack https://sourceforge.net w3af http://w3af.org     External references EC-Council; “CEH v10. Module 14 Hacking web servers”, […]

Comments { 0 }

List of Bluetooth Hacking Tools

List of Bluetooth Hacking Tools: Bluetooth View BlueScan BTCrawler bt_rng Bluesnarfer GATTack.io Bluediving BluPhish ubertooth Super Bluetooth Hack CIHwBT BH BlueJack BlueZ/I2ping Ghettotooth Bluesniff One of the most popular is Bluetooth View and BlueScan.   List of Bluetooth Hacking Tools Bluetooth View https://bluetoothview.en.lo4d.com/windows Bluetooth View is a utility which runs on your computer, warning and […]

Comments { 2 }

List of Deliberately Vulnerable Web Applications

List: WebGoat Damn Vulnerable Web Application (DVWA) List WebGoat https://owasp.org/www-project-webgoat/ Damn Vulnerable Web Application (DVWA) http://www.dvwa.co.uk/

Comments { 0 }

Cybersecurity Attack Phases

According to EC-Council EC-Council identify in the CEH course 5 hacking phases: Reconnaissance Scanning Gaining Access Maintaining Access Clearing Tracks According to ISACA ISACA identify 8 phases in a cybersecurity generalized attack processs: Perform reconnaissance Create attack tools Deliver malicious capabilities Exploit and compromise Conduct an attack Achieve results Maintain a presence or set of […]

Comments { 0 }
Política de privacidad
Studii Salmantini. Campus de excelencia internacional