Featured Article

Web Application Penetration Testing

In this article, I will be guiding you to web application penetration testing. By reading this article you will understand what web application penetration testing is, What are the different types of vulnerabilities in web applications? and how to start your web application testing journey. Web Application Penetration Testing: Web Application Penetration Testing consists of… Read More »

How to install Nessus on Kali

How to install Nessus on Kali First download nessus for Linux https://www.tenable.com/downloads/nessus?loginAttempted=true or You can download it through curl from your command line curl –request GET \–url ‘https://www.tenable.com/downloads/api/v2/pages/nessus/files/Nessus-10.5.4-debian10_amd64.deb’ \–output ‘Nessus-10.5.4-debian10_amd64.deb’ After downloading, go to the location where you have downloaded type sudo dpkg -i Nessus-10.4.1-debian9_amd64.deb wait for it, it will be installed on your system.… Read More »

Permissions in Linux

Permissions in Linux: Like in this world everything has a particular owner and everyone cannot use everything without proper permission, For security reason Linux also have different permissions, that do not allow other users or groups to access a particular file, make changes to it or execute it unless if proper permissions are assigned to… Read More »

Users and Groups in Linux

In this article, I am explaining what are users and groups in Linux and how to create users, apply different policies on users and delete them. I am also explaining how to create groups in Kali Linux and how to add users to different groups. After reading this blog about Users and Groups in Linux… Read More »

Impressive Resume Development

Most people are doing mistakes while writing resumes, In this Impressive Resume Development Guide we will be guiding you, on how to write an eye-catching resume. Resume: A resume is a french word that means summary it is a document that sums up your skills, experiences, and accomplishments. Difference between CV and Resume: A resume… Read More »

MOITT Advanced Cybersecurity lecture 1

Difference Between Information security and Cybersecurity? Information security: securing information whether it is stored or in transit. To protect information whether it is electronic or non-electronic is called information security. Information Security Includes: Cryptography:Converting Plain text into cypher text. Physical security:Physical security is also called infrastructure security. This means what measures are taken in order… Read More »

nmap scanning | Learn Nmap

In this blog, I will teach you different types of Nmap scanning techniques and how to use each Nmap scanning technique one by one with examples. This is a detailed article on Nmap scanning and how to defend it. Nmap ping scan: Nmap ping scan is used to check whether the target host is up… Read More »

Learn cybersecurity for free | How?

Many people are asking about free cybersecurity courses and certifications, for that purpose I am writing this blog, especially for those people who are searching for free cybersecurity courses and resources to get these courses for free. In this article, I will be revealing all the methods through which you can learn cybersecurity for free… Read More »

SQL Statements | SQL Queries

Following is the complete list of SQL Statements. There is a list of SQL Queries with examples like create a statement, update statement, delete statement, etc. Create Statement in SQL: Create statement is used to create a table, index, or View Statement to Create Table: Alter Statement: Alter statement in SQL is used to change,… Read More »

Functions in SQL

Functions in SQL: There are different functions in SQL which have different uses. Inticap() function in SQL Upper() Function in SQL Lower() Function in SQL Concat() Function in SQL Substr() Function in SQL instr() function in SQL length function in SQL Round() function in SQL Trunc() Function in SQL mod() function in SQL rpad() function… Read More »

Digital Forensics | Learn Digital Forensics

What is Digital Forensics? Digital Forensics also called network forensics and has many definitions. In general, it is considered the application of science to the identification, collection, examination, and analysis of data while information integrity is preserved and a strict chain of custody is maintained for the data. Types of Data: While in the first… Read More »

Penetration Testing

Penetration testing also called pentest is a real attack against your network, app, or other resources with proper permission in order to find vulnerabilities that can be exploited. In other words, it is a security testing of systems to find loopholes and exploit them in a safe way with a proper permission of an organization… Read More »

Thwarting Cyber Criminals

Following are the measures for Thwarting Cyber Criminals. Thwarting means to prevent cyber criminals how ever thwarting a cyber criminals is a difficult task but it can be reduced through some measures that are taken by some companies, governments and international organizations. These measures include: Vulnerability Databases: Created a comprehensive database of known vulnerabilities and… Read More »

CEH Lecture 1

OSCP offensive Security Certified Professional cyberwing.pk sir website CEH 80% mind makup canable, ettercap, wireshark a tool used for picket sniffing prerequisites: Basic NetworkingBasic Windows Concept like cmd/active directory domain services(ads)cloudScriptinglinux__________________Kali Linux____________________________________ Linux InstallationBasic CommandsToolsBasic User/permissionNetworkSoftwareServices and PortsBasic Server=> DNS/DHCP Web Server Linux: Win=>NTFS Linux => root ext2/3/4/ xfs zfs btrf SWAP = For Ram… Read More »

Free Amazon Courses by eCommerce success Pakistan

Free Amazon Courses is offered by Ecommerce success Pakistan, Thank you for this offer, We love free content/ courses. I hope most of you will take advantage of this offer. Ecommerce Success Pakistan is offering $999 courses for free. There are free amazon courses once you avail this opportunity, you will get lots of knowledge… Read More »

Python Free Courses online

There are bunch of Python Free Courses avaialable on the internet most of them are paid while you can also get free courses from famous sites like Coursera, Udacity, YouTube etc. If you are searching Free Python Courses then you are at the right place, Here you can find a list of free courses through… Read More »

aws solution architect associate

aws solution architect associate dumps are the latest dumps and are free, these types of questions are always part of exams. Study these aws solution architect associate and prepare yourself for the final exam of Amazon aws solution architect associate. If you are planning to take your aws solution architect associate then you must study… Read More »

CS222 – Database Management Systems

CS222 – Database Management Systems paper solution step by step. Question 4: Write queries for the following: a) Create a table for an entity type you mentioned in Question – 3 above. There must be at leastfour attributes in the table. The first Attribute should be PK. The second attribute should be NN.The third attribute… Read More »

CS372–Information Security paper solution

Question 1: How can we secure operations of” Institute of Computing”, KUST through applying varioussecurity layers. Answer: We can secure operations of the Institute of Computing “KUST” by applying the followingsecurity layers. Physical Security: Physical Security is necessary everywhere in the world even in the Institute of Computing “KUST”.By applying Physical Security we can minimize… Read More »