Tutorials
Courses
Go Premium
Data Structure
Java
Python
HTML
Interview Preparation
DSA
Practice Problems
C
C++
Java
Python
JavaScript
Data Science
Machine Learning
Courses
Linux
DevOps
SQL
Web Development
System Design
Aptitude
GfG Premium
Similar Topics
Web Technologies
32.1K+ articles
DSA
20.0K+ articles
Python
19.6K+ articles
Experiences
15.8K+ articles
Interview Experiences
14.1K+ articles
School Learning
11.1K+ articles
JavaScript
9.9K+ articles
Misc
7.8K+ articles
Difference Between
3.1K+ articles
Ethical Hacking
770+ articles
Ethical Hacking - Misc
32 posts
Recent Articles
Popular Articles
Difference Between Vishing and Smishing Attacks
Last Updated: 23 July 2025
Pre-requisites: Difference between Phishing and VishingThere are several types of Email attacks that are used by the attackers to steal confidential information from users...
read more
Difference Between
Ethical Hacking
Ethical Hacking - Misc
OSINT Intelligence Cycle
Last Updated: 11 April 2023
OSINT(Open-Source Intelligence) is a multi-methods methodology for collecting, analyzing, and making decisions about data accessible in the public domain. Whether carried ...
read more
Technical Scripter
Ethical Hacking
Ethical Hacking - Misc
What is Google Dorking?
Last Updated: 23 July 2025
Google Dorking is a powerful way to find the hidden information using advanced Google search operators to perform Dorking. Instead of just typing random words, you can use...
read more
Web Technologies
Ethical Hacking
Ethical Hacking - Misc
How To Use Radare2?
Last Updated: 23 July 2025
Pre-requisites: Penetration Testing and Reverse EngineeringRadare2, or "r2," is a powerful and versatile open-source reverse engineering toolkit. It can be used to analyze...
read more
Misc
Ethical Hacking
Ethical Hacking - Misc
What is Astaroth Malware?
Last Updated: 23 July 2025
Pre-requisite: MalwareIn late 2017 the Astaroth Malware was first detected in multiple countries and was mostly used in various cyberattacks. It is a Trojan and informatio...
read more
Picked
Ethical Hacking
Ethical Hacking - Misc
What is DarkHotel?
Last Updated: 23 July 2025
In Cybersecurity, cyber threats have evolved. DarkHotel is the most dangerous and relentless hacking group which is active since at least 2007, DarkHotel is a cyber-espion...
read more
Technical Scripter
Picked
Ethical Hacking
Ethical Hacking - Misc
How To Use Ophcrack for Windows Password Recovery?
Last Updated: 23 July 2025
Ophcrack is a free, open-source tool that can be used to recover lost Windows passwords. It works by using pre-computed tables to crack password hashes, allowing users to ...
read more
Technical Scripter
Picked
Ethical Hacking
Technical Scripter 2022
Ethical Hacking - Misc
How To Counter Insider Threats in Software Supply Chain?
Last Updated: 23 July 2025
In today’s digital world, software supply chain security is a major concern for organizations. In the age of cyber threats, cybercriminals can use a variety of techniques ...
read more
Technical Scripter
Picked
How To
Ethical Hacking
Technical Scripter 2022
Ethical Hacking - Misc
WhisperGate Ransomware
Last Updated: 23 July 2025
WhisperGate is a type of malware that can be used to gain access to a victim's computer or device. This malicious software can be used to steal personal information, insta...
read more
Technical Scripter
Picked
Ethical Hacking
Technical Scripter 2022
Ethical Hacking - Misc
How to Design Architecture for Enterprise Wireless Security?
Last Updated: 23 July 2025
Wireless networks are becoming very common in the enterprise, with many devices utilizing it as a primary communication method. Although these networks provide convenience...
read more
Picked
How To
Ethical Hacking
Ethical Hacking - Misc
Converting a CVE list to Patch Vulnerabilities
Last Updated: 30 November 2022
The National Vulnerability Database (NVD) provides a way for vendors to have research into their products publicly disclosed so that people can find and review the latest ...
read more
Picked
Ethical Hacking
Ethical Hacking - Misc
Password Auditing With L0phtcrack 7 Tool
Last Updated: 23 July 2025
In essence, password auditing programs make guesses about the credentials being used on your network. They accomplish this using a combination of brute force and dictionar...
read more
Technical Scripter
Picked
Ethical Hacking
Technical Scripter 2022
Ethical Hacking - Misc
Access Management Strategies in Cybersecurity
Last Updated: 23 July 2025
According to a recent Verizon study, 63% of confirmed data breaches are due to the use of weak, stolen, or default passwords. There is a saying in the cybersecurity world ...
read more
Picked
Ethical Hacking
Cyber-security
Ethical Hacking - Misc
Cookie Tampering Techniques
Last Updated: 23 July 2025
Cookie tampering is a method in which the attacker manipulates or modifies the information of the stored data on a web browser. This includes all types of data like person...
read more
Picked
Ethical Hacking
Ethical Hacking - Misc
What is Codebook Attack?
Last Updated: 23 July 2025
The codebook attack is a very common password hacking technique where the hacker guesses the passwords of a user by using common phrases and words as password phrases. Hac...
read more
Picked
Ethical Hacking
Ethical Hacking - Misc
1
2
3
We use cookies to ensure you have the best browsing experience on our website. By using our site, you acknowledge that you have read and understood our
Cookie Policy
&
Privacy Policy
Got It !