Also known as DPI, deep packet inspection is a kind of packet filtering that evaluates the data and header of a packet...
In general, corporate security policies define the information assets needed to continue corporate activities. Detecting threats to this information asset is the...
The threat of DDoS (Denial-of-Service) attacks that send massive processing demands from multiple Internet-connected devices (be it a PC, a smartphone, a...
Once again Toyota Motor Corporation reported its second data breach. The first attack was in February, and it’s not clear whether the...
procedural security is what we call operational security (OPSEC), it is kind of risk management process that encourages admin to monitor operations...
VPN is a wonderful thing that you all have probably heard about. I assume it was something like this: “Using a VPN...
Currently, most computers are connected to the network, and various information is exchanged beyond national borders. Mobile devices such as smartphones and...
What is a Secure Web Gateway (SWG)? For the perspective of a typical Joe or Jill of today’s computing, Secure Web Gateway...
APT32 malware has been covered here in Hackercombat recently, and we are set to update you of the latest findings from Palo...
Synopsisbscan is a command-line utility to perform active information gathering and service enumeration. At its core, bscan asynchronously spawns processes of well-known...
A powerful tool for managing networks and troubleshoot network problems! Features Network Interface – Information, Configure IP-Scanner Port-Scanner Ping Traceroute DNS Lookup...
You may want to think twice before providing an enterprise fax number to a stranger Many companies still provide their fax number...
It’s no longer necessary to run attacker code on the victim system. When the Spectre and Meltdown attacks were disclosed earlier this year, the...
A powerful tool for managing networks and troubleshoot network problems! Features Network Interface – Information, Configure IP-Scanner Port-Scanner Ping Traceroute DNS Lookup...
Research has revealed that public WiFi networks are more dangerous than one might realize. They can be like ripe fruit for hackers....
Impacket is a collection of Python classes for working with network protocols. Impacket is focused on providing low-level programmatic access to the...
LuLu is the free open-source macOS firewall that aims to block unauthorized (outgoing) network traffic, unless explicitly approved by the user: Full...
Monitor illegal wireless network activities. Similar SSID broadcasts Same SSID broadcasts Calculates unencrypted wireless networks density Watches SSID broadcasts at the blacklist. Capabilities...
SPARTA is a python GUI application which simplifies network infrastructure penetration testing by aiding the penetration tester in the scanning and enumeration...
dnscap is a network capture utility designed specifically for DNS traffic. It produces binary data in pcap(3) and other format. This utility is similar to tcpdump(1),...
Detects wireless network attacks performed by KARMA module (fake AP). Starts deauthentication attack (for fake access points) Working Principle for PiKarma Collects...