Tag: EthicalHacking

  • How Cybercriminals Exploit Human Psychology & How to Defend Against It

    The Cost of a Simple Mistake It was a regular Monday morning at a financial firm in New York. Sarah, a senior accountant, received an email that appeared to be from her CFO. The subject line said: 🚨 URGENT: Immediate Wire Transfer Required 🚨 At first glance, the email seemed professional—it had the company logo,…

  • Basic Pentesting – 2 Walkthrough | Vulnhub

    Another Walkthrough of the Basic Pentesting series on Basic Pentesting: 2 VulnhubMachine made by Josiah Pierce. It contains multiple remote vulnerabilities and multiple privilege escalation vectors. For more details or for downloading the machine go here. If you’ve solved the Basic Pentesting: 1 then this Machine is good for the next step and challenging one….

  • Basic Pentesting – 1 Walkthrough | Vulnhub

    This walkthrough covers Basic Pentesting: 1, a Vulnhub machine created by Josiah Pierce. It contains multiple remote vulnerabilities and several privilege escalation vectors. For more details or to download the machine, visit the official Vulnhub page. After setting up the machine, I started by scanning the entire network using Nmap with a ping scan to…