KernelBlog

Touch The Technology

Cyber Security

Network Analysis: Ngrep

What is ngrep? You may want to do network analysis for many reasons. This may be during or after an attack or just out of pure curiosity. That’s why there’s some tools to help you analyze your network easier. Ngrep…

Penetration Test Steps

Hello everyone! Today I’ll talk about the steps to penetration testing. I hope you’ll enjoy it! First of all, let’s talk about what a penetration test is. It is, in short, called “Pentesting”. Pentesting is to report the bugs, vulnerabilites…

Passive Data Collecting: Shodan

Data collecting is the first step of pentesting. The more data you have, easier and faster it is to be successful. Passive data collecting is collecting data about your target without directly contacting your target. Which means, from the internet….

Raspberry Pi – Raspbian Setup

Hello, today I will show you how to setup Raspbian. Steps First, you’ll have to download raspian (RASPBIAN STRETCH WITH DESKTOP). Second, you should download Win32 Disk Imager to write Raspbian to an SD Card. We needs this program to…

Possible Cyber Attack Scenario: Data Collecting

Hello readers! If you want to know how to cyber attack other devices, the information for it is on the internet messily. The purpose of this article is to teach you the steps and scenarios of an attack systematically. First…

21 TCP | FTP PORT ABUSE

Hello dear readers, first of all, I’d like to give you some information about 21 TCP | FTP Protocol today. 21st Port is a protocol that does the file transfers and all the other input and outputs on the web…

Network Analysis: Using ngrep

What is Ngrep? We might want to analyze our network for many reasons. This may be during or after an attack or maybe just out of curiosity. Cause of this, there are tools to use, to make our job easier….

Bypass Antiviruses with Veil Framework

During pentesting, the target machine/machines may be protected by Antivirus softwares. You’d have to bypass these softwares and open a shell. The tool that’s necessary for this kind of job is under the Veil roof, called veil-evasion. Softwares like this…

What is Social Engineering?

Social Engineering is one of the most basic hacking methods. Social engineering, in basic, is grabbing information about the target person or institution by using people’s human interactions and their carelessness. Shortly, Social Engineering’s goal is to -quite literally- fool…

What Is Metasploit, What Does It Do?

Metasploit is an open sourced penetration test tool, written with Ruby language. Developed for security tests, Metasploit has a practical interface and contains of over 1500 exploits. Also includes lots of parameters and modules for easier use of all the…