❌

Reading view

There are new articles available, click to refresh the page.

Beginners guide to Nuclei vulnerability scanner

Hello, aspiring ethical hackers. In our previous blogpost, you learnt about vulnerability scanning. In this article, you will learn about Nuclei, a high performance, fast and customizable vulnerability scanner that uses YAML based templates. Its features include, Let’s see how this tool works. For this, we will be using Kali Linux as attacker system as […]

The post Beginners guide to Nuclei vulnerability scanner appeared first on Hackercool Magazine.

Beginners guide to chntpw

Hello, aspiring ethical hackers. In our previous blogpost, you learnt how Windows authentication works. In this article, you will learn about chntpw, a offline Windows password and Registry Editor that can be used to reset or blank local passwords on Windows NT operating systems. Chntpw or Change NT Password is a utility that does the […]

The post Beginners guide to chntpw appeared first on Hackercool Magazine.

What is EDR? Endpoint Detection and Response

Hello, aspiring ethical hackers. In our previous blogpost, you learnt about Antivirus. In this article you will learn about Endpoint Detection and Response (EDR). Let’s begin with what is it. What is Endpoint Detection and Response (EDR)? Endpoint Detection and Response, also known as Endpoint detection and Threat response (EDT) is a tool used in […]

The post What is EDR? Endpoint Detection and Response appeared first on Hackercool Magazine.

Beginners guide to malware analysis

Hello, aspiring ethical hackers. In our previous blogpost, you have learnt in detail about malware. In this article, you will learn about malware analysis. What is malware analysis? Malware analysis is the process of analyzing the code of the Virus to find out what it does, how it works, how it evades Antivirus etc. This […]

The post Beginners guide to malware analysis appeared first on Hackercool Magazine.

Beginners guide to digital forensics

Hello, aspiring ethical hackers. In our previous blogpost, you learnt about threat intelligence. In this article, you will learn about digital forensics. It plays an important role not only in investigating cyber attacks but also in solving crimes that have digital elements attached to it. This digital evidence is admissible in court proceedings. In Information […]

The post Beginners guide to digital forensics appeared first on Hackercool Magazine.

Beginners guide to Threat Intelligence

Hello, aspiring ethical hackers. In our previous blogpost, you learnt about about cybersecurity. In this article, you will learn everything you need to know about threat intelligence. Threat intelligence (TI) plays a very important role in enhancing cybersecurity. But first, let’s start with what actually is a threat. What is a threat? A threat is […]

The post Beginners guide to Threat Intelligence appeared first on Hackercool Magazine.

Beginners guide to cybersecurity

Hello, aspiring ethical hackers. In our previous blogpost, you learnt about ethical hacking. In this article, you will learn what is cybersecurity. Cybersecurity and ethical hacking can be confusing to people. That’s because they are closely related but yet they are different. But don’t worry by the end of this article, you will understand clearly […]

The post Beginners guide to cybersecurity appeared first on Hackercool Magazine.

Beginners guide to vulnerability management

Hello, aspiring ethical hackers. In our previous blogpost, you learnt what is a vulnerability and about vulnerability scanning. In this article, you will learn in detail about vulnerability management. What is vulnerability management (VM)? Vulnerability management is a continuous process of identifying, prioritizing, assessing, remediation, reporting and verification of vulnerabilities in an organization. Stages of […]

The post Beginners guide to vulnerability management appeared first on Hackercool Magazine.

❌