Mohamed Abdalla Ibrahim's Blog

Mohamed Abdalla Ibrahim's Blog

Follow
homebadges
Tag

hacking

#hacking

More content

Read more stories on Hashnode


Articles with this tag

The Benefits of Using Chat.openai in Ethical Hacking

Jan 3, 20232 min read

Ethical hacking, also known as "white hat" hacking, is the practice of using hacking techniques to test the security of computer systems and identify...

The Benefits of Using Chat.openai in Ethical Hacking

Security & Risk Management

May 12, 202223 min read

WannaCry Ransomware? WannaCry ransomware is a crypto-ransomware worm that attacks Windows PCs. It’s a form of malware that can spread from PC to PC...

Security & Risk Management

CYBER SECURITY (Penetration Testing Prerequisites) 1.9 DNS

Apr 29, 20223 min read

How does this support my pentesting career? SSL/TLS certificates validation relies on DNS Mounting spoofing attacks Performing information...

CYBER SECURITY (Penetration Testing Prerequisites) 1.9 DNS

Chief Information Security Officer (CISO) responsibilities

Apr 3, 20224 min read

let us assume that Today is my first working day as an information security officer and I would like to share with you my daily activity in my new job...

Chief Information Security Officer (CISO) responsibilities

CYBER SECURITY (Penetration Testing Prerequisites) 1.8 Firewall and Network defense

Mar 30, 20224 min read

-There are many different appliances on the market that a system administrator can use to protect the network. -These devices use different techniques...

CYBER SECURITY (Penetration Testing Prerequisites) 1.8 Firewall and Network defense

CYBER SECURITY (Penetration Testing Prerequisites) 1.7 TCP and UDP

Mar 21, 20223 min read

How Do TCP and UDP support my pentesting career? it will allow me to perform the TCP session Attacks, advanced DOS attacks, and network scanning ...

CYBER SECURITY (Penetration Testing Prerequisites) 1.7 TCP and UDP