Category Archives: Uncategorized

How to install Nessus on Kali

How to install Nessus on Kali First download nessus for Linux https://www.tenable.com/downloads/nessus?loginAttempted=true or You can download it through curl from your command line curl –request GET \–url ‘https://www.tenable.com/downloads/api/v2/pages/nessus/files/Nessus-10.5.4-debian10_amd64.deb’ \–output ‘Nessus-10.5.4-debian10_amd64.deb’ After downloading, go to the location where you have downloaded type sudo dpkg -i Nessus-10.4.1-debian9_amd64.deb wait for it, it will be installed on your system.… Read More »

Web Application Penetration Testing

In this article, I will be guiding you to web application penetration testing. By reading this article you will understand what web application penetration testing is, What are the different types of vulnerabilities in web applications? and how to start your web application testing journey. Web Application Penetration Testing: Web Application Penetration Testing consists of… Read More »

Impressive Resume Development

Most people are doing mistakes while writing resumes, In this Impressive Resume Development Guide we will be guiding you, on how to write an eye-catching resume. Resume: A resume is a french word that means summary it is a document that sums up your skills, experiences, and accomplishments. Difference between CV and Resume: A resume… Read More »

MOITT Advanced Cybersecurity lecture 1

Difference Between Information security and Cybersecurity? Information security: securing information whether it is stored or in transit. To protect information whether it is electronic or non-electronic is called information security. Information Security Includes: Cryptography:Converting Plain text into cypher text. Physical security:Physical security is also called infrastructure security. This means what measures are taken in order… Read More »

Functions in SQL

Functions in SQL: There are different functions in SQL which have different uses. Inticap() function in SQL Upper() Function in SQL Lower() Function in SQL Concat() Function in SQL Substr() Function in SQL instr() function in SQL length function in SQL Round() function in SQL Trunc() Function in SQL mod() function in SQL rpad() function… Read More »

Thwarting Cyber Criminals

Following are the measures for Thwarting Cyber Criminals. Thwarting means to prevent cyber criminals how ever thwarting a cyber criminals is a difficult task but it can be reduced through some measures that are taken by some companies, governments and international organizations. These measures include: Vulnerability Databases: Created a comprehensive database of known vulnerabilities and… Read More »

CEH Lecture 1

OSCP offensive Security Certified Professional cyberwing.pk sir website CEH 80% mind makup canable, ettercap, wireshark a tool used for picket sniffing prerequisites: Basic NetworkingBasic Windows Concept like cmd/active directory domain services(ads)cloudScriptinglinux__________________Kali Linux____________________________________ Linux InstallationBasic CommandsToolsBasic User/permissionNetworkSoftwareServices and PortsBasic Server=> DNS/DHCP Web Server Linux: Win=>NTFS Linux => root ext2/3/4/ xfs zfs btrf SWAP = For Ram… Read More »

Check products at Amazon

The 10,000-foot view: Amazon Go permits clients to shop without any lines, no checkouts and no registers – essentially open the Amazon application on your cell phone, examine it when entering the store, get what you require and go. Things you leave will be charged to your Amazon account.  It’s been barely a long time… Read More »

best web hosting in Pakistan |top web hosting in Pakistan

There are many companies that provide web hosting and domain facilities. But some of them are one of the best web hosting providers in Pakistan. In order to provide information about the best web hosting services in Pakistan. There some questions that I want to clear. What is Web hosting? Web hosting is basically a… Read More »