Saturday, 22 March 2025
Lab - Reading Server Logs
Part 1: Reading Log Files with Cat, More, Less, and Tail
Part 2: Log Files and Syslog
Part 3: Log Files and Journalctl
Lab - Attacking MySQL database - CISCO Cybersecurity
Lab - Attacking a mySQL Database
In this lab, you will view a PCAP file from a previous attack against a SQL database.
Part 1: Open Wireshark and load the PCAP file.
Part 2: View the SQL Injection Attack.
Part 3: The SQL Injection Attack continues…
Part 4: The SQL Injection Attack provides system information.
Part 5: The SQL Injection Attack and Table Information
Part 6: The SQL Injection Attack Concludes.
Part 1: Open Wireshark and load the PCAP file.
Part 2: View the SQL Injection Attack.
Part 3: The SQL Injection Attack continues…
Part 4: The SQL Injection Attack provides system information.
Part 5: The SQL Injection Attack and Table Information
Part 6: The SQL Injection Attack Concludes.
Tuesday, 18 March 2025
Cybersecurity - Website Vulnerability check - Working on Linux - Lab
🔍 Phase 1: Basic
Reconnaissance & Scanning (Legal & Passive Tools)
Here are some initial commands and techniques you can safely use to gather information.
Errors and fixes for VM workstation - Virtual Machine errors
Errors and its work arounds and fixes for Virtual Machine installation or execution
Virtual Machine - Aborted:Monday, 17 March 2025
MEC - Cybersecurity Gamification in Education
Gamification in EducationThrough gamification the students are motivated and their involvement and interaction is enhanced by segregating them into groups or teams and awarding them with points across various parameters like, punctuality, attendance, adherence to break timings, assignments, tasks, quiz, leadership ability, etc.
Gamification in Education
Through gamification the students are motivated and their involvement and interaction is enhanced by segregating them into groups or teams and awarding them with points across various parameters like, punctuality, attendance, adherence to break timings, assignments, tasks, quiz, leadership ability, etc.
CrackStation: The Ultimate Password Cracking Tool for Cybersecurity
In today's digital world, password security is a crucial concern. Cybercriminals are constantly finding ways to breach online accounts using weak or stolen credentials. This is where CrackStation.net comes into play—a powerful online tool designed to crack password hashes using an extensive database of precomputed hashes.
Sunday, 16 March 2025
How to Install a Virtual Machine on Your Personal Computer: Step-by-Step Guide Cisco Cybersecurity
Virtual machines (VMs) are a great way to run multiple operating systems on a single computer, test software in isolated environments, or experiment with different OS configurations. In this guide, we’ll walk you through the step-by-step process of installing a virtual machine on your personal computer.
Saturday, 15 March 2025
Exploring CrypTool: Your Gateway to Cryptographic Education
In the evolving landscape of cybersecurity and cryptography, having access to reliable educational resources is crucial for students, researchers, and professionals alike. CrypTool (CT) stands out as a powerful, open-source platform designed to demystify cryptographic concepts through interactive learning. If you’re eager to dive into encryption, decryption, and cryptanalysis, CrypTool provides an excellent foundation.
Thursday, 13 March 2025
Subscribe to:
Posts (Atom)