Subhashini Rai
14 posts
Graduated with a B.Tech degree in Computer Science engineering with knowledge of programming languages. Pursued Post graduation Diploma in Cyber security and law from University of Delhi so have gained knowledge on Networking, Web Application, Compliance, Forensics, Cloud and Mobile Computing.
Netdiscover – To Scan Live Hosts In Network
Netdiscover is a simple ARP scanner which can be used to scan for live hosts in a network.…
How To Encrypt And Decrypt Data Using PGP – Working
What is PGP? First Read Pretty Good Privacy (PGP) – A Program That Provides Data Encryption And Decryption…
How Can Information Leakage Happen in Organisation?
Conduct Search Engine Discovery and Reconnaissance for Information Leakage is in testing checklist for information gathering while doing analysis.…
Weevely – Post Exploitation Suite For Penetration Testing
Weevely is a web shell designed for post-exploitation purposes that can be extended over the network at run…
ARP-Scan Command To Scan The Local Network
The Arp-scan network discovery command is designed to map physical (MAC) addresses to logical (IP) addresses. The Address…
NETCAT- To Scan Open Ports
Netcat is a very useful and powerful LINUX command used by network administrators and security experts for various…
Xerosploit – Penetration Testing Framework For Man-In-The-Middle Attack
So in today’s article, you will be getting some information about Penetration Testing Framework, a “XEROSPLOIT.” Networking is…
How To Use PING Command?
PING (Packet Internet Groper) command is used to check the network connectivity between host and server or host.…
How To Analyse And Capture The Packets in Wireshark
Wireshark is an open source software project and you can freely use Wireshark on any number of computers…
Steganography- Data That Hidden Behind Images
Steganography is data hidden within data. Steganography is an encryption technique that can be used along with cryptography…