E-Discovery

Hello dear Kernelblog followers. In this article, I will show you what is E-Discovery, and how to do it. E-discovery (e-discovery) is an inseparable part from the forensic informatics that emerged in the early 1990s. E-discovery can be defined as the discovery process in civil cases conducted for crimes committed electronically. It provides gathering and[…]

Zer0Day Attacks

A zero-day vulnerability is a software flaw that is not recognized or detected until exploited by a developer or vendor. They are often difficult to detect until the attacks occur. Attacks happen by abusing this vulnerability and spreading malware without allowing developers to release a patch or fix. If a software contains a security flaw,[…]

Information Security

Information Security is defined as the protection of information, as an asset, from unauthorized access, use, alteration, disclosure, modification, destruction, and disruption. It consists of three basic elements; Confidentiality: Protecting information from being accessed by unauthorized parties. Integrity: Preventing data from being modified in an unauthorized or undetected manner. Accessibility: Data, software, and hardware are[…]

Passive Data Collecting: Shodan

Data collecting is the first step of pentesting. The more data you have, easier and faster it is to be successful. Passive data collecting is collecting data about your target without directly contacting your target. Which means, from the internet. There’s lots of tools and methods to collect data about a target though Shodan has[…]

Possible Cyber Attack Scenario: Data Collecting

Hello readers! If you want to know how to cyber attack other devices, the information for it is on the internet messily. The purpose of this article is to teach you the steps and scenarios of an attack systematically. First of all, I’d like you to know that a cyber attack is no different than[…]

Bypass Antiviruses with Veil Framework

During pentesting, the target machine/machines may be protected by Antivirus softwares. You’d have to bypass these softwares and open a shell. The tool that’s necessary for this kind of job is under the Veil roof, called veil-evasion. Softwares like this bypass antiviruses with different encoding methods. Setup: After the setup, run the “Veil-Evasion.py” file under the[…]

What Is Metasploit, What Does It Do?

Metasploit is an open sourced penetration test tool, written with Ruby language. Developed for security tests, Metasploit has a practical interface and contains of over 1500 exploits. Also includes lots of parameters and modules for easier use of all the tools inside it. This form of Metasploit allows the user to build their own strategy.[…]