Bug Bounty Hunting & Ethical Hacking

SHA-1 is Obsolete – Do Not Use It for the Passwords

SHA-1 (secure hash algorithm) is a cryptographic hash function. At the time it was created, it was considered being secure, but nowadays it isn’t secure no more. The hash function, that was created in 1995 by US NSA (National Security Agency), is considered being vulnerable since 2005. NIST (National Institute of Standards and Technology) had …

Read more

The 7 Best Keyboards for Ethical Hacking

Best keyboard for ethical hacking

While having a cool looking keyboard is not a must for an ethical hacker, it sure adds you some style. But will it help you to become a better specialist? Just like the speed glasses does not add you actual speed, a glowing keyboard will not make you a pro hacker. So should we even …

Read more

Log4j Scanning – Check if You Are Vulnerable

Log4j scanning

Log4j vulnerability is one of the biggest topics recently. A zero-day vulnerability affecting widely used software component that is being actively exposed in the wild. What could be worse. Almost every big company having many different external and internal systems, is affected. Before it is not too late and the vulnerability is not exploited by …

Read more

Is Penetration Testing a Good Career Choice?

Is penetration testing a good career choice

Getting out of a college as an IT graduate might be stressful. There are plenty of opportunities and chances to work in various industries while different interesting technologies. IT is always evolving and there are endless options where you can realize yourself. But with that many options, it is very hard to decide where do …

Read more

How to Crack SSH Private Key With John the Ripper

How to crack SSH private key with SSH2John

While finding the private key is a bad thing itself, you can try stepping a step forward – find out the password of the private key and log in with it. This is a thing you might need to do in a CTF, or by hacking a vulnerable machine. Let’s see how to crack SSH …

Read more

9 Best Operating Systems for Penetration Testing and Ethical Hacking

Best OS for penetration testing

There is a variety of options when it comes to the best operating system for penetration testing and ethical hacking. There are some known names in this category, that are almost considered a standard, however, new OSes are released once in a while. As a penetration tester, I like trying different OSes myself. Usually, there …

Read more

WebMap Dashboard for Nmap XML Scan Results

WebMap Dashboard for Nmap XML Scan Results

If you have to scan a network, that might potentially have many running hosts, you will probably use Nmap. And if your weapon of choice is Nmap, you will soon realize that working with the results is a pain in the ass when there is a lot of data. No matter in what format from …

Read more

CEH Practical Review – How to Prepare for the Exam

CEH Practical Review

It all started a few months after passing the CEH. I received an email from the EC-Council, once again congratulating me on my achievement. They informed me that due to my high score (91%) on the CEH Ansi exam, I was being gifted a voucher for the CEH (Practical) exam. As the discount was significant, …

Read more

Why Maltego Is Not Working on Parrot OS?

Why Maltego is not working on Parrot OS

Parrot OS is popular not without a reason. It is liked by penetration testers as it comes with a plethora of penetration testing tools. Because the whole purpose of the distribution is to provide a wide range of different cybersecurity tools, it becomes irritating when some of the tools do not work. Let’s see why …

Read more