Browsing CategoryInfosec- Resources

Surprising Differences between TLS and SSL Protocol

TLS is simply a successor of SSL 3.0, TLS is a protocol which provides Data encryption and Integrity between communication channels. SSL 3.0 is served as a base for TLS 1.0. SSL OR TLS Which is good? We use to believe that TLS 1.0 is a Successor of SSL 3.0. As we know SSL3.0 are […]

The post Surprising Differences Between TLS and SSL Protocol appeared first on GBHackers On Security.

Modern CyberSOC – A Brief  Implementation Of Building a Collaborative Cyber Security Infrastructure

In earlier years, everyone depends on SOC (includes firewalls, WAF, SIEM,etc.) and the prioritize in building the SOC provides security and the CIA was maintained. However, later the emerge of the attacks and the threat actors becomes more challenge and the existing SOC will not able to provide better security over the CIA. There are […]

The post Modern CyberSOC – A Brief Implementation Of Building a Collaborative Cyber Security Infrastructure appeared first on GBHackers On Security.

Shodan and Censys

Our digital lives connect massive things with the Internet. Starting with Smartphones, Wi-Fi routers, Surveillance Camera, Smart TV, SCADA networks and leading to traffic light management systems are exposed to the internet. In 2016 impact of Mirai botnet attack, which was orchestrated as a distributed denial-of-service attack affects 300,000 vulnerable Internet of Things devices. IoT […]

The post Shodan and Censys: Finding Hidden Parts On the Internet With Special Search Engines appeared first on GBHackers On Security.

Intrusion Detection System (IDS)  and Its Detailed Working Function – SOC/SIEM

An intrusion detection system (IDS) is a type of security software designed to automatically alert administrators when someone or something is trying to compromise information system through malicious activities such as DDOS Attacks or security policy violations. An IDS works by monitoring system activity through examining vulnerabilities in the system, the integrity of files and […]

The post Intrusion Detection System (IDS) and Its Detailed Working Function – SOC/SIEM appeared first on GBHackers On Security.

Most Important Security Tools and Resources For Security Researcher and Malware Analyst

Security Professionals always need to learn many tools, techniques, and concepts to analyze sophisticated Threats and current cyber attacks. Here we are going to see some of the most important tools, books, Resources which is mainly using for Malware Analysis and Reverse Engineering. Also Read –   Become Master in Cyber Security with Complete Advance Level […]

The post Most Important Security Tools and Resources For Security Researchers and Malware Analyst appeared first on GBHackers On Security.

Macro Pack

Malware delivery trends change every day. For the last few years, we have observed various hacker groups like ( APT12 to Turla ) uses various techniques to deliver malware on the system or network. One of the best technique hackers groups used is to write malicious code and obfuscate it and embed with Office documents […]

The post Macro Pack – Automatize Obfuscation and Generation of Malicious Office Documents appeared first on GBHackers On Security.

Computer Forensics Tools

Computer Forensics tools are more often used by security industries to test the vulnerabilities in network and applications by collecting the evidence to find an indicator of compromise and take appropriate mitigation Steps. Here you can find the Comprehensive Computer Forensics tools list that covers Performing Forensics analysis and respond to the incidents in all the […]

The post Most Important Computer Forensics Tools for Hackers and Security Professionals appeared first on GBHackers On Security.

Cyber attack

The cyber attack occurs on a daily basis, and these can range from attacks on tech giants to individuals falling foul to the many scams which are present online. Thankfully, there are ways in which people and groups at both ends of the scale can reduce their level of susceptibility to attacks, with virtual private […]

The post Most Important Cyber Attack Techniques that often used by Hackers appeared first on GBHackers On Security.

How To Perform External  Black-box Penetration Testing in Organization with “ZERO” Information

The objective was simple – see how susceptible the organization is from an external point of view and test the effectiveness of the security controls that are managed enterprise-wide. As such, asides, the company name, we were given “ZERO” information to perform an external black-box penetration Testing. This black-box external penetration Testing Performing with a by a […]

The post How To Perform External Black-box Penetration Testing in Organization with “ZERO” Information appeared first on GBHackers On Security.

Phishing Attack Prevention: Best 10 Ways To Prevent Email Phishing Attacks

No one wants to believe they’d fall victim to phishing attacks. However, phishing attacks are on the rise and are more sophisticated than ever. There’s a good reason phishing attacks are touted as one of the most common security challenges companies and individuals face – there are ample opportunities for cybercriminals to maximize profits. Companies […]

The post Phishing Attack Prevention: Best 10 Ways To Prevent Email Phishing Attacks appeared first on GBHackers On Security.