Posts

Showing posts from May, 2021

What is OSI Model | How OSI Model works ?

Image
INTRO TO OSI Model      [ Open Systems Interconnection ] In the early 1980s , the development of networks was chaotic. Each vendor had its own proprietary solution(PC). The bad part was that one vendor’s solution(PC) was not compatible with another vendor’s solution (PC) ex. IBM and Microsoft both are developing they own standard so only Microsoft can communicate with Microsoft computer and IBM can communicate with IBM computer. This is where  I nternational Organization for Standardization (ISO) come in action and ISO  developed an Open model called OSI Model ( Open System Interconnection ) ,OSI comes with a Layering approach to the network or hardware vendors would design hardware for network, and others could develop software for the application for this hardware or network. Using an open model which everyone agrees so means we can build a network that is compatible with each other.        The OSI Model is a conceptual Model ,  Nowadays most vendors build networks based on the

Top 10 Best Vulnerability Database in 2021

Image
    Vulnerability Databases NVD  – US National Vulnerability Database CERT  – US Computer Emergency Readiness Team OSVDB  – Open Sourced Vulnerability Database Bugtraq  – Symantec SecurityFocus Exploit-DB  – Offensive Security Exploit Database Fulldisclosure  – Full Disclosure Mailing List MS Bulletin  – Microsoft Security Bulletin MS Advisory  – Microsoft Security Advisories Packet Storm  – Packet Storm Global Security Resource SecuriTeam  – Securiteam Vulnerability Information CXSecurity  – CSSecurity Bugtraq List Vulnerability Laboratory  – Vulnerability Research Laboratory ZDI  – Zero Day Initiative Vulners  – Security database of software vulnerabilities

What is OSINT in cyber security | how to use OSINT techniques

Image
 What is OSINT ?             OSINT ( Open Source Intelligence ) and it is the one of the key aspects in the cyberSecurity. NOTE :  “ OS ” (from OSINT ) means OPEN SOURCE . In this case, it is not related to the               Open source movement             The term OSINT come from US military agencies the started using the term OSINT  in late               1980’s  as they re-evaluating the nature of information requirements in tactical levels under               battlefields.In 1992  the intelligence Reorganization Act determined that there is main goals               of intel gathering included key concepts like: Must be objective intelligence free. Data must be available on public  and may be non-public sources             The key word Behind OSINT concept is information, and most importantly, information that can                be obtained for free and information that Publicly available and it doesn’t matter if it located inside                newspapers, blogs, web pages, twee

10+ best information security confrences for hackers

Image
  Information Security Conferences DEF CON  – An annual hacker convention in Las Vegas Black Hat  – An annual security conference in Las Vegas BSides  – A framework for organising and holding security conferences CCC  – An annual meeting of the international hacker scene in Germany DerbyCon  – An annual hacker conference based in Louisville PhreakNIC  – A technology conference held annually in middle Tennessee ShmooCon  – An annual US east coast hacker convention CarolinaCon  – An infosec conference, held annually in North Carolina CHCon  – Christchurch Hacker Con, Only South Island of New Zealand hacker con SummerCon  – One of the oldest hacker conventions, held during Summer Hack.lu  – An annual conference held in Luxembourg HITB  – Deep-knowledge security conference held in Malaysia and The Netherlands Troopers  – Annual international IT Security event with workshops held in Heidelberg, Germany Hack3rCon  – An annual US hacker conference ThotCon  – An annual US hacker conference hel