web hacking

SMTP Enumeration

SMTP Enumeration

SMTP (Simple Mail Transfer Protocol) is a set of communication guidelines that allow web applications to perform communication tasks over the internet, including emails. It is a part of the TCP/IP protocol and works on moving emails across the network. SMTP enumeration allows us to identify valid users on the SMTP server. This is done with the built-in SMTP commands using them

Cyber Security – Types of Enumeration

Cyber Security – Types of Enumeration

Enumeration is fundamentally checking. An attacker sets up a functioning associated with the objective host. The weaknesses are then tallied and evaluated. It is done mostly to look for assaults and dangers to the objective framework. Enumeration is utilized to gather usernames, hostname, IP addresses, passwords, arrangements, and so on

TCP-ACK Scanning?

TCP-ACK Scanning?

TCP-ACK is a third step of the TCP 3-Way Handshake process (SYN, SYN-ACK, ACK). In TCP-ACK, the client acknowledges the response of the Server, and establish a connection to proceed with the data transfer and any other communication processes.

WAScan – web application security scanner in Kali Linux

WAScan – web application security scanner in Kali Linux

WAScan stands for Web Application Scanner. It is an open-source web application vulnerability scanner. The tool uses the technique of black-box to find various vulnerabilities. This technique will not scan the whole source code of a web application but work like a fuzzer Which means it scans the pages of the whole website or web application. This tool extracts links and forms of the web app

Scanning Attacks In Hacking?

Scanning Attacks In Hacking?

Scanning in ethical hacking is a network exploration technique used to identify the systems connected to an organization’s network. It provides information about the accessible systems, services, and resources on a target system. Some may refer to this type of scan as an active scan because it can potentially disrupt services on those hosts that are susceptible.

Credentialed Vulnerability Scan?

Credentialed Vulnerability Scan?

Cyber Security prevention is the need of today’s generation. Awareness and knowledge of proper security techniques must be spread among the cyber-using generation to prevent frequent cyber attacks from taking place in the cyber world. Here, in this article, we will discuss one very important scanning technique – Credentialed Vulnerability Scan that has played a vital role in preventing cyber

What is DNS Footprinting?

What is DNS Footprinting?

What is DNS Footprinting?DNS Footprinting is a technique that is used by an attacker to gather DNS information about the target system. DNS Footprinting allows the attacker to obtain information about the DNS Zone Data