IPBAN – Windows

In Linux we can use fail2ban to prevent brute attack based on the login failure attempt. Windows has a similar […]

Encryption and Tunneling Techniques

Authentication can be performed in several different ways, including the following: ■ Something you know—Passwords ■ Something you have—Tokens, smart cards, […]

User Agent Strings

User Agent Strings User agent strings act as another method to fingerprint a client. These characteristics range from identifying the browser […]

Nmap NSE scripts with examples

Information Gathering   1. DNS Brute Force Find sub-domains with this script. Detecting sub-domains associated with an organizations domain can reveal […]