TIL About Footprinting. Part 3: Username Enumeration

In short, footprinting refers to the process of collecting data over time in order to make a targeted cyberattack. Footprinting involves gathering information about a target—typically related to its network infrastructure, systems, and users—without actually committing an attack. Footprinting can be performed manually or using automated tools. It may involve scanning for open ports, identifying user accounts, … Read more

TIL About Footprinting. Part 2: Website Footprinting

In short, footprinting refers to the process of collecting data over time in order to make a targeted cyberattack. Footprinting involves gathering information about a target—typically related to its network infrastructure, systems, and users—without actually committing an attack. Footprinting can be performed manually or using automated tools. It may involve scanning for open ports, identifying user accounts, … Read more

TIL About Footprinting. Part 1: DNS Footprinting

In short, footprinting refers to the process of collecting data over time in order to make a targeted cyberattack. Footprinting involves gathering information about a target—typically related to its network infrastructure, systems, and users—without actually committing an attack. Footprinting can be performed manually or using automated tools. It may involve scanning for open ports, identifying user accounts, … Read more

Fooling ChatGPT to leak secret information

ChatGTP becomes one of the most discussed phenomenon last year. Mostly because of human like interaction and quite conscious problem solving skills. The core function of a chatbot is to mimic a human conversation, here ChatGPT is versatile and mostly polite preparand correct answers. So, today I would like to demo some interesting approach to … Read more

Is a CTF pointless? Learning through games.

What is CTF? Capture the flag or CTF is kind of gamified activity to learn computer science, cybersecurity, information security and programming in general. This is a awesome way to get into computer science, networking basics, cryptography, reverse engineering, web forensics technologies and many more. Learn with fun. So, there are different styles or types … Read more