Cyber Security

Nmap (Network Mapper)

Nmap (Network Mapper) is a powerful open-source tool used for network discovery and security auditing. It’s commonly used by network administrators and security professionals to identify hosts and services on…

What is Phishing Attack?

Phishing is a type of attacks where scammer attempts to obtain sensitive information by sending fraudulent communication that appear to come from a reputable source. The Phishing attacks can be…

What is Shellcode?

Shellcode is defined as a set of instructions injected and then executed by an exploit. It is used to directly manipulate the logs and functionality of an exploit, even ensuring…

What is port scanning?

Port Scanning is the technique used to identify open ports and service available on a host. The outsider use port scanning to find information that can be helpful to exploit…