Why There is No IPV5?

Why there is no IPV5

In 1970, the Internet was only in its early stages. Several internet protocols were being developed to set a standard for internet usage and to control how information packets carrying large amounts of data should be sent over a network. Several internet protocols, such as IPv4 and IPv6, are being developed and deployed in the …

Read more

The Art of Invisibility Review

The art of invisibility review

Have you ever wondered how much information the internet knows about you? If you are a heavy internet user, with a track record of many years, there is probably a lot of data gathered about you. It might be by sitting in the servers of companies, such as Google, or Amazon (searching history, orders history, …

Read more

10 Best Laptops for Ethical Hacking and Kali Linux

10 Best Laptops for Ethical Hacking and Kali Linux

Since I am a penetration tester myself, the question what is the best laptop for ethical hacking and Kali Linux has been extremely relevant to me. I had spent a lot of time online looking for the best option when looking for a new computer for myself. After I realized that my current hardware didn’t …

Read more

TryHackMe Basic Pentesting Walkthrough

Tryhackme Basic Pentesting Walkthrough

Tryhackme has many beginner friendly rooms. If you are just starting with the platform, rooms, such as Nmap, or Introductory Researching, is a great start. However, after you’ve nailed the basic tools and methodologies, you should increase difficulty. If you will stay solving same level rooms, you won’t progress that much. Today we are going …

Read more

Biggest Bug Bounties for Remote Code Execution

Remote code execution

Remote code execution, that is also known as arbitrary code execution vulnerability is one of the most dangerous vulnerabilities. If a publicly accessible website is affected by this security issue, this could lead to a total takeover of the system. As a result, data confidentiality, integrity, and availability might be affected. One of the biggest …

Read more

SHA-1 is Obsolete – Do Not Use It for the Passwords

SHA-1 (secure hash algorithm) is a cryptographic hash function. At the time it was created, it was considered being secure, but nowadays it isn’t secure no more. The hash function, that was created in 1995 by US NSA (National Security Agency), is considered being vulnerable since 2005. NIST (National Institute of Standards and Technology) had …

Read more

Is the MacBook M1 Good for Cyber Security Professionals?

MacBooks for ethical hacking

There is a misconception that a hacker should use a MacBook for hacking. This myth comes from the media. Movies such as The Girl with the Dragon Tattoo, portrays a hacker using the MacBook. So, for someone it might look that the newest MacBook M1 is good for cyber security professionals. However, that is unlikely …

Read more

The 7 Best Keyboards for Ethical Hacking

Best keyboard for ethical hacking

While having a cool looking keyboard is not a must for an ethical hacker, it sure adds you some style. But will it help you to become a better specialist? Just like the speed glasses does not add you actual speed, a glowing keyboard will not make you a pro hacker. So should we even …

Read more

Log4j Scanning – Check if You Are Vulnerable

Log4j scanning

Log4j vulnerability is one of the biggest topics recently. A zero-day vulnerability affecting widely used software component that is being actively exposed in the wild. What could be worse. Almost every big company having many different external and internal systems, is affected. Before it is not too late and the vulnerability is not exploited by …

Read more

Is Penetration Testing a Good Career Choice?

Is penetration testing a good career choice

Getting out of a college as an IT graduate might be stressful. There are plenty of opportunities and chances to work in various industries while different interesting technologies. IT is always evolving and there are endless options where you can realize yourself. But with that many options, it is very hard to decide where do …

Read more