Open in app

Sign In

Write

Sign In

Abdullah Baghuth
Abdullah Baghuth

7 Followers

Home

About

Nov 6, 2021

Why does Kali Linux Upgrade take more than usual

When we try to update kali, all the necessary files are fetching from the default repository of Kail Linux https://http.kali.org/ You can check that in /etc/apt/source.list using command #cat /etc/apt/source.list

Kali

2 min read

Why Does Kali Linux Update Take More Than Usual
Why Does Kali Linux Update Take More Than Usual
Kali

2 min read


Dec 20, 2020

Best Tools for Information Gathering

Information Gathering (Reconnaissance) In this write-up, I’ll go through the best tools used by penetration tester to do Information Gathering. Identifying Our Target: Before we begin we have to establish a client to attack, so I picked up Tesla from bugcrowd programs. please double check when you read this if tesla still exists…

Cybersecurity

5 min read

Best Tools for Information Gathering
Best Tools for Information Gathering
Cybersecurity

5 min read


Nov 29, 2020

How to do Reconnaissance?

Information Gathering There are so many types of Passive Recon. we will go through physical and social Recon. Physical meaning actually going on-site and doing a physical engagement or the social engineering aspect or maybe doing phishing assessment or even including in a physical engagement just gathering this information from the physical…

Reconnaissance

2 min read

How they do Reconnaissance?
How they do Reconnaissance?
Reconnaissance

2 min read


Nov 22, 2020

The Five Stages of Ethical Hacking

Please Use This Information For Ethical Purposes — In these five stages, we actually start with 1- Reconnaissance: this stage is also known as Information gathering, there are two different types of Recon. Active and Passive - Passive Recon. : when you going to google and search for something, say you are given a client and you are looking there…

Cybersecurity

2 min read

The Five Stages of Ethical Hacking
The Five Stages of Ethical Hacking
Cybersecurity

2 min read


Nov 15, 2020

What is the Open Systems Interconnection Model?

The OSI Model If you read what I wrote before you will see that I spooked a lot about layer three or layer two, but what is these layer, these all correspond with what is called OSI model, Now if you ever in network interview or you have talked with…

Networking

3 min read

What is the Open Systems Interconnection Model?
What is the Open Systems Interconnection Model?
Networking

3 min read


Nov 8, 2020

What is TCP & UDP? How do they work?

TCP vs UDP When we talking about TCP and UDP we actually talking about layer three of the OSI model which is the Transport layer. What is TCP: Transmission Control Protocol is one of the main protocols of the Internet protocol suite. it is a connection-oriented protocol. What is UDP…

Networking

2 min read

What is TCP & UDP? How do they work?
What is TCP & UDP? How do they work?
Networking

2 min read


Nov 3, 2020

Why we need MAC address?

Media Access Control Addresses Coming to layer two of the OSI model we have MAC Address which is in the physical layer, now remember IP Address in layer three (network layer). …

Cybersecurity

2 min read

Why we need MAC address?
Why we need MAC address?
Cybersecurity

2 min read

Why we need MAC address?

Media Access Control Addresses

Coming to layer two of the OSI model we have MAC Address which is in the physical layer, now remember IP Address in layer three (network layer). …

--

--


Nov 2, 2020

Why IPv6 is innovated while we can use IPv4?

An Internet Protocol address is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. — To bring up your IP address type $ifconfig in your terminal & in Windows >ipconfig inet -> for IPv4 inet6 -> for IPv6 this is how to communicate devices communicating, we communicate over layer 3 (Network Layer [Routing]) IPv4 is in deceminal notation 8bit.8bit.8bit.8bit = 32byte 11111111 = 8bit

Cybersecurity

3 min read

Why IPv6 is innovated while we can use IPv4?
Why IPv6 is innovated while we can use IPv4?
Cybersecurity

3 min read

Abdullah Baghuth

Abdullah Baghuth

7 Followers

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech