Month: November 2019

What is a distributed denial of service attack (DDoS)

A distributed denial-of-service (DDoS) attack is one of the most powerful weapons on the internet. When you hear about a website being “brought down by hackers,” it generally means it has become a victim of a DDoS attack. In short, this means that hackers have attempted to make a website or computer unavailable by flooding …

What is a distributed denial of service attack (DDoS) Read More »

Introduction to Kali Linux

Kali Linux is a Debian-based Linux distribution operating system and it is widely used for Penetration Testing and Security Auditing. Kali contains many several tools which are mostly used for various information security tasks, such as Penetration Testing, Security research, Computer Forensics and Reverse Engineering. Kali Linux is developed, funded and maintained by Offensive Security. …

Introduction to Kali Linux Read More »

Password Auditing on Active Directory Databases

In this article we explore the options to acquire information from an online or offline Microsoft Active Directory database and its encryption keys. We will use this to recover the contained usernames and password hashes for password auditing or penetration testing purposes. The database Microsoft stores the Active Directory data in tables in a proprietary …

Password Auditing on Active Directory Databases Read More »

Brute Forcing Passwords with ncrack, hydra and medusa

What is Brute Forcing? A brute force attack is a trial-and-error method used to obtain information such as a user password or personal identification number (PIN). In a brute force attack, automated software is used to generate a large number of consecutive guesses as to the value of the desired data. Brute force attacks may …

Brute Forcing Passwords with ncrack, hydra and medusa Read More »