Ultima perioadă este cu siguranță una deosebită, prin care noi toți nu am mai trecut. Într-un timp relativ scurt, Covid-19 a pus o presiunea uriașă în toate domeniile de activitate. Cu toate astea, noi cei din industria cybersecurity cunoaștem cât de periculoase sunt aceste perioade, mai ales in spatiul virtual. Astfel am realizat o listă […]
How easy is it to crack a password?
Cracking a password can be easier than you think, by the time you’re done with this article you’ll be aware of how important it is to have a strong password. A computer that can crack an 8-character password in 4.2 hours would need 5.7 trillion years to crack a 16-character one. Do I have your […]
Guidance in Cyber Security Trainings
In the need to increase their cyber security resilience, companies start searching for cyber security trainings. This thing, in fact, is a very normal and recommended action. But there are many times when they find themselves in one of these three situations: There are too many options Trainings are too expensive and the overall quality […]
How to expand your attack surface
with Reverse IP lookups Often, we face a situation where we receive a domain to pentest, and after each attempt in the playbook, we still don’t find any way to get in. So, how to expand your attack surface? When you run out of options for breaking into one door, you might want to try […]
Can we detect APT attacks?
In the previous post, we learned what is and how APT (Advanced Persistent Threat) attacks work. But the interesting part comes when we think about: How can we detect such complex attacks? And is there any way to detect APT infections? The answer is yes. Yet, detecting APT attack is a real challenge and requires […]
Advanced Persistent Threat Attack and it’s morphology
Advanced Persistent Threat attack – learn what is and how it works The number of cyber attacks is increasing on the internet nowadays. It is not surprising that the World Economic Forum and Global Risk Report placed in 2018 cyber attacks as the third most likely risk, behind extreme weather conditions and natural disasters. One […]
CA and Bypass SSL pinning protection on Android
Adding CA to an Android system and bypass SSL pinning protections are two very important steps in testing the security of different applications. After my latest article – How To Install And Root Your Android Emulator – I received a couple of questions about what to do next. In the article that I mention above […]
How to install and root your Android emulator
Mobile applications became an essential part of our lives, somehow we are dependent of them. We are using a lot of mobile applications every day. If you are lost in a new city, Google Maps gets you out of this situation. or if we want to make an appointment to the hairstylist, mobile applications assist […]
CTFs in Cyber-Security
CTFs from the Cyber Security domain, or Capture-The-Flag competitions, have nothing to do with games that imply physical activity (e.g Paintball, Airsoft), but are perfect for hands-on and real-life hacking techniques, just to level up your skills.