Blog

Can ChatGPT defend us against hackers?

I pressed ChatGPT about its ability to defend us against attackers, and it gave me an intriguing answer. ChatGPT is a language model, not a security tool. However, it can be used to help protect against hackers in a few ways: Automatic threat detection: ChatGPT can be used to monitor and analyze text data, such…

continue reading

IDOR – Do you know what I am doing ?

An application provides direct access to an object, such as a file or a database record, based on user-supplied input. This can allow an attacker to bypass the application’s access controls and access sensitive information or perform unauthorised actions it is called as an IDOR (Insecure Direct Object Reference) vulnerability.  Attacker can manipulate the URL…

continue reading

Windows Buffer Overflows – 32 Bit.

Get the Buffer Overflow in 11 Steps. I. Install the immunity debugger on source machine. II. Find the Vulnerable parameter in the victim application by crashing it. Providing high volume of input. III. Identify the location [That 4 Bytes] where crash is happening by Fuzzing the application. IV. Get the exact EIP pointer with the…

continue reading

SYSMON – Free EDR?

Protecting Endpoints are challenging. It has become more crucial after the COVID pandemic. Work from Home has made Cybersecurity more proactive from reactive. Endpoint detection and response (EDR) is providing security for user machines. It helps to protect Files, Web, and Removable media. But acquiring EDR is not easy for all firms. Giant institutions, they…

continue reading

Be Ready for Cyber War

If we know how to hack, we can protect us from being hacked. In this Hacking Tutorial, we will see the basics of hacking. But don’t try this in public domains or networks. Try this is in your own private network. While hacking a system, application or database, the phases are same. But attack method…

continue reading

How Organizations Detect the Cyber Attacks?

Organizations running with more than 1000 employees, need to have big infrastructure.  Organizations running with more than 100,000 employees need to have very big infrastructure. Providing security to this infrastructure is very challenging. When it comes to security, providing physical security is not enough. Organizations need to invest much more on cyber security. Multilayered security…

continue reading