Bug Bounty Hunting & Ethical Hacking

SHA-1 is Obsolete – Do Not Use It for the Passwords

SHA-1 (secure hash algorithm) is a cryptographic hash function. At the time it was created, it was considered being secure, but nowadays it isn’t secure no more. The hash function, that was created in 1995 by US NSA (National Security Agency), is considered being vulnerable since 2005. NIST (National Institute of Standards and Technology) had …

Read more

Is the MacBook M1 Good for Cyber Security Professionals?

MacBooks for ethical hacking

There is a misconception that a hacker should use a MacBook for hacking. This myth comes from the media. Movies such as The Girl with the Dragon Tattoo, portrays a hacker using the MacBook. So, for someone it might look that the newest MacBook M1 is good for cyber security professionals. However, that is unlikely …

Read more

The 7 Best Keyboards for Ethical Hacking

Best keyboard for ethical hacking

While having a cool looking keyboard is not a must for an ethical hacker, it sure adds you some style. But will it help you to become a better specialist? Just like the speed glasses does not add you actual speed, a glowing keyboard will not make you a pro hacker. So should we even …

Read more

Log4j Scanning – Check if You Are Vulnerable

Log4j scanning

Log4j vulnerability is one of the biggest topics recently. A zero-day vulnerability affecting widely used software component that is being actively exposed in the wild. What could be worse. Almost every big company having many different external and internal systems, is affected. Before it is not too late and the vulnerability is not exploited by …

Read more

Is Penetration Testing a Good Career Choice?

Is penetration testing a good career choice

Getting out of a college as an IT graduate might be stressful. There are plenty of opportunities and chances to work in various industries while different interesting technologies. IT is always evolving and there are endless options where you can realize yourself. But with that many options, it is very hard to decide where do …

Read more

How to Crack SSH Private Key With John the Ripper

How to crack SSH private key with SSH2John

While finding the private key is a bad thing itself, you can try stepping a step forward – find out the password of the private key and log in with it. This is a thing you might need to do in a CTF, or by hacking a vulnerable machine. Let’s see how to crack SSH …

Read more

WebMap Dashboard for Nmap XML Scan Results

WebMap Dashboard for Nmap XML Scan Results

If you have to scan a network, that might potentially have many running hosts, you will probably use Nmap. And if your weapon of choice is Nmap, you will soon realize that working with the results is a pain in the ass when there is a lot of data. No matter in what format from …

Read more

Why Maltego Is Not Working on Parrot OS?

Why Maltego is not working on Parrot OS

Parrot OS is popular not without a reason. It is liked by penetration testers as it comes with a plethora of penetration testing tools. Because the whole purpose of the distribution is to provide a wide range of different cybersecurity tools, it becomes irritating when some of the tools do not work. Let’s see why …

Read more