❌

Reading view

There are new articles available, click to refresh the page.

Beginners guide to Threat Hunting

Hello aspiring Ethical Hackers. In our previous blogpost, you learnt about Blue Teaming. In this article, you will learn about Threat Hunting, which plays a powerful role in Blue Teaming. In today’s digital landscape, cyber threats are becoming increasingly sophisticated. Attackers often hide deep within networks, evading traditional security tools like antivirus software and firewalls. […]

The post Beginners guide to Threat Hunting appeared first on Hackercool Magazine.

Beginners guide to Database forensics

Hello, aspiring cyber forensic investigators. In our previous blogpost, you have learnt about Digital Forensics. In this article, you will learn about Database Forensics, an important branch of Digital Forensics. This article will teach you what database forensics is, why it matters and how it works. In today’s digital world, data is one of the […]

The post Beginners guide to Database forensics appeared first on Hackercool Magazine.

Beginners guide to Network Forensics

Hello, aspiring computer forensic investigators. In our previous blogpost, you learnt about digital forensics. In this article, you will learn about Network Forensics, one of the branches of digital forensics. In today’s hyperconnected world, cyber threats are not a question of if, but when. Whether it’s a data breach, ransomware, or insider abuse, almost every […]

The post Beginners guide to Network Forensics appeared first on Hackercool Magazine.

Beginners guide to Mobile Forensics

Hello, aspiring cyber forensic investigators. In our previous blogpost, you learnt about digital forensics. In this article, you will learn about mobile forensics, an important branch of digital forensics. Smartphones have become a central part of modern life. We use them for everything β€” from messaging and social media to banking, GPS and storing data […]

The post Beginners guide to Mobile Forensics appeared first on Hackercool Magazine.

Beginners guide to Computer forensics

Hello aspiring cyber forensic invetigators. In our previous blogpost, you learnt what is digital forensics, types of digital forensics and stages of a digital forensic investigation. In this article, you will learn about computer forensics, one of the branches of digital forensics. What is computer forensics? Computer forensics (often interchangeably and mistakenly used with digital […]

The post Beginners guide to Computer forensics appeared first on Hackercool Magazine.

Beginners guide to Purple Teaming

Hello, aspiring ethical hackers. In our previous blogposts, you learnt about Blue Teaming and Red Teaming. In this article. you will learn what is Purple Teaming, why it matters and how to get started in Purple teaming. In the ever-evolving world of cybersecurity, staying ahead of attackers is a constant challenge. Traditionally, organizations split their […]

The post Beginners guide to Purple Teaming appeared first on Hackercool Magazine.

Beginners guide to Blue Teaming

Hello aspiring Blue teamers. In our previous blogpost, you learnt what is Red teaming. In this article, you will learn what Blue Teaming or Blue Team hacking is, what Blue Teams do and how you can get started in this essential field of cybersecurity. In today’s connected world, protecting your digital assets is just as […]

The post Beginners guide to Blue Teaming appeared first on Hackercool Magazine.

Beginners guide to Red Teaming

Hello, aspiring ethical hackers. In our previous blogpost, you learnt about pen testing. In this article, you will learn about Red Teaming or Red team hacking. What is Red Teaming? In today’s digital landscape, cyber threats are constantly evolving becoming more sophisticated and more dangerous day-by-day. Organizations can no longer rely solely on traditional security […]

The post Beginners guide to Red Teaming appeared first on Hackercool Magazine.

Beginners guide to Recon-ng

Hello, aspiring ethical hackers. In our previous blogpost, you learnt in detail about OSINT. In this article, you will learn about Recon-ng, a OSINT gathering tool. Recon-ng is an open-source intelligence gathering tool aimed at reducing the time spent harvesting information from open sources. It is a full-featured reconnaissance framework designed to gather OSINT information […]

The post Beginners guide to Recon-ng appeared first on Hackercool Magazine.

Beginners guide to bettercap

Hello, aspiring ethical hackers. In our previous blogpost, you learnt about Man in The Middle (MiTM) attack. In this article, you will learn about Bettercap, a network reconnaissance and MiTM attack tool. What is Bettercap? Bettercap is a powerful, easily extensible and portable framework written in GO programming language, that is useful to security researchers, […]

The post Beginners guide to bettercap appeared first on Hackercool Magazine.

Beginners guide to wfuzz

Hello, aspiring ethical hackers. In our previous blogpost, you learnt what is fuzzing. In this article, you will learn about wfuzz, a web application fuzzer or brute forcer. Wfuzz is a tool designed to bruteforce web applications and can be used to find directories, servlets, scripts etc. It can also be used to brutefoce GET […]

The post Beginners guide to wfuzz appeared first on Hackercool Magazine.

Beginners guide to Responder

Hello, aspiring ethical hackers. In this article, you will learn about Responder tool, a tool that is helpful in harvesting credentials and passwords on the target network. It is useful mostly in internal penetration testing of services. What is Responder? Responder is a LLMNR, NBT-NS and MDNS poisoner with a built in HTTP, SMB, MSSQL, […]

The post Beginners guide to Responder appeared first on Hackercool Magazine.

Beginners guide to SIEM

Hello, aspiring ethical hackers. In our previous blogpost, you learnt about threat intelligence. In this article, you will learn everything you need to know about Security Information & Event Management or SIEM solutions and its role in threat intelligence. What is SIEM? You have learnt in threat intelligence that data & information related to security […]

The post Beginners guide to SIEM appeared first on Hackercool Magazine.

Beginners guide to Incident response

Hello, aspiring ethical hackers. In this article, you will learn everything you need to know about Incident Response (IR). Unfortunately, unlike pen testing or ethical hacking, the role of incident response becomes important only after a cyber attack or any other cyber incident has occurred. What is Incident Response (IR)? In simple terms, incident response […]

The post Beginners guide to Incident response appeared first on Hackercool Magazine.

Beginners guide to Information security

Hello, aspiring ethical hackers. In our previous blogpost, you learnt about cybersecurity. In this blogpost, you will learn about Information security. The word Information security is often used interchangeably used with cybersecurity but they are different although not entirely. So, let’s begin with definition of Information security. What is Information security? Information security, also known […]

The post Beginners guide to Information security appeared first on Hackercool Magazine.

Windows POST Exploitation: Koadic

Hello aspiring Ethical Hackers. In this article you will learn about a Windows POST Exploitation tool named Koadic. Koadic, or COM command and control is a Rootkit tool that is used for Windows POST exploitation. It is similar to Meterpreter and Powershell Empire except that it performs most of its operations using Windows Script Host. […]

The post Windows POST Exploitation: Koadic appeared first on Hackercool Magazine.

Password Cracking for Beginners

Hello aspiring Ethical hackers. In this article, you will learn what is password cracking and various types of password cracking. In Ethical hacking, password cracking is recovering passwords from data that has been stored in or transmitted by a computer system. Hackers use password cracking to grab credentials which can be helpful in further exploiting […]

The post Password Cracking for Beginners appeared first on Hackercool Magazine.

EternalBlue vulnerability: Explained with POC

Hello, aspiring Ethical Hackers. In this article, you will learn about the infamous EternalBlue vulnerability and its exploitation. Vulnerability & Impact Exploited by Wannacry ransomware, the EternalBlue vulnerability exists in the Server Message Block (SMB) protocol. Due to improper handling of specially crafted packets by SMB version 1 (SMBV1) of Microsoft windows this vulnerability allows […]

The post EternalBlue vulnerability: Explained with POC appeared first on Hackercool Magazine.

Excel 4.0 Macros: How to create a malicious one

Hello aspiring ethical hackers. In our previous article, you have learnt what a Macro is and how to create a malicious VBA macro. In this article, you will learn about Excel 4.0 Macros and how to create one. Excel 4.0 Macros or XLM were introduced by Microsoft in 1992 when Excel 4.0 was launched as […]

The post Excel 4.0 Macros: How to create a malicious one appeared first on Hackercool Magazine.

Malicious Macro’s : What, Why and How

Hello aspiring Ethical Hackers. In this article, you will learn about Malicious Macros also known as Macro Malware or Macro Virus. In computer science, a Macro is a set of commands grouped together as a single command. This is used to run some tasks automatically. In Word, Macros are used to automate frequently used tasks.Β Β Β Β Β Β Β Β Β Β  […]

The post Malicious Macro’s : What, Why and How appeared first on Hackercool Magazine.

❌