Skip to main content

Posts

Showing posts from September, 2020

What is Cryptography? The Use Of Cryptography In Hacking.

Introduction to Cryptography:- Cryptography is the science of protecting secrets. As a result, it’s designed to make it impossible for an unauthorized party (like a hacker) to gain access to the protected data. While early encryption algorithms had significant flaws and were easily broken, the state of the art in encryption has gotten a lot better. That being said, cryptography can be broken under the right circumstances.  The first step in breaking cryptography is identifying the cryptographic algorithm in use.  Cryptography is the art of converting text into another form for secret transmission and reception. It works by converting plain text into cipher text using some encryption algorithm at the sender’s side and converting ciphertext into plain text at the receiver’s. Cryptography is used to provide confidentiality, integrity, authenticity and non-repudiation. With this information in hand, it’s time to start looking for an exploitable vulnerability.  This can be acc

What is Penetration Testing? The Importance of Penetration Testing

“ What is penetration testing? ” Penetration testing is a complex process that involves testing applications for security vulnerabilities. Easier said than done, penetration testing has become a major part of ethical hacking. People with above ordinary hacking skills hoping to make a living out of them legally are applying for penetration tester positions across a host of different companies.  Importance of Penetration Testing:- 1.      Big companies throughout the world rely on ethical hacking methods and penetration testing to give them results in terms of their security deficiencies. Is a company’s security policy in line with requirements? This question is best answered through conducting penetration tests. 2.      Penetration tests can be used to confront and catch hackers before they cause the damage. It has been seen that a lot of companies spend resources on damage control, whereas it would be better if they followed an old saying; “Prevention is better than cure

What is Vishing? Tips for Spotting and Avoiding Vishing.

"When your phone rings, it’s sometimes hard to know who’ll be on the other end. It might be someone vishing. " Vishing, a combination of ‘voice’ and ‘phishing,’ is a phone scam designed to get you to share personal information. Here's what to know about vishing attacks and how to help protect yourself. What is Vishing? During a vishing phone call, a scammer uses social engineering to get you to share personal information and financial details, such as account numbers and passwords. The scammer might say your account has been compromised, claim to represent your bank or law enforcement, or offer to help you install software. Warning: It's probably malware. Vishing is just one form of phishing, which is any type of message — such as an email, text, phone call or direct-chat message — that appears to be from a trusted source, but isn’t. The goal is to steal someone's identity or money. It’s getting easier to contact more people, too. Scammers can place