Friday 14 October 2022

Before know if you attack on someone or system in Terms of cyber security

Step 1 :- identify a person or system 
Step 2:- scan a system or person because we need to ac a

What is a Passive Attack?

 A passive attack is an attack wherein the hacker waits for the perfect opportunity to penetrate your system. This type of attack is typically done in order for a hacker to observe your networking structure, the type of software you use, or any security measures that you have already installed. 

Passive attacks typically happen when a hacker monitors possible system vulnerabilities without making any changes to the data that he targets. You can think of this attack as a hacker’s means of researching about his target in order to launch a more effective attack. Passive attacks are classified into: 

1. Active reconnaissance 

        This happens when an intruder listens right into a targeted system by engaging the target to find out where weak points are. This is typically done through port scanning, which is an effective tactic to find out where the vulnerable ports are located and what type of data they normally host. After discovering the vulnerability, a hacker may engage this weak point and exploit the services that are associated with them. 

2. Passive reconnaissance

         This happens when a hacker chooses to study the targeted system without actively engaging it, without the intention of directly engaging the target. Passive reconnaissance tactics include war driving (discovery of unprotected wireless network), dumpster diving (finding data on discarded devices or documents), or masquerading (pretending to be a network user with authorization) 

These two tactics can be essential tools when it comes to discovering vulnerabilities in your computer system to enable you to prevent any further attacks. Once you are able to use reconnaissance tactics, you can easily map out where the weak points of your computer system really are. 

Once you are able to identify vulnerable points through the use of test reconnaissance attacks, you will realize that the simplest and best way to protect your computer system from snooping is to install an IPS (intrusion prevention system), which will serve as your safeguard from port scans and your automated method of shutting down any attempts of a port scan before an intruder gets a complete map of your network. At the same time, you can also install a good firewall that will control the visibility of your network’s ports.

Sunday 9 October 2022

Things That Hackers Search For

1. Organization design, filings and registrations 

            Malicious hackers typically perform an online search to look for possible targets, and among the best candidates for an attack are those organizations that provide detailed descriptions of devices that they have access to, including the type of software and hardware that they have installed. Once hackers know that a certain person holds access to a possibly vulnerable point in an organization’s tech security, they get an idea on who they should hack first. Any hacker can obtain this extremely useful information with a simple online search. By digging online, you can find all SEC registrations, public biddings, publicly accessed files, subscribers, and many more. You can even search for all people involved in a particular organization, the time that a website is published, and the webmaster involved in creating web security for an organization. Having that knowledge can easily help a hacker prepare for a massive online attack that can take down an entire organization’s website and database.

 2. Subscriptions and payments 

            Hackers are most likely to hack devices and accounts owned by a person that make online payments or purchases. Since smartphones, emails and online payment systems contain a wealth of personal information, including credit cards and banking statements, hacking these systems make it easy for every criminal hacker to achieve identity theft. 

3. Social media accounts

 While some may say that there is possibly nothing valuable in a personal Facebook account, being able to gain access to social media accounts also enables a hacker to gain access to other personal details, such as passwords, emails, and mobile phone numbers.

 4. Emails 

Emails serve as the hub of your personal information because it serves as a control point for all your passwords, online payment accounts, among others.

 5. Passwords

 Many hackers perform an attack that is made to predict, snoop, or phish for a user’s password. Once they are able to find a single password, they are almost certain that a user may use them for different accounts or use a variation of it for other logins.

 6. Physical hardware

 It is easiest to steal information when you have physical access to a device such as a smartphone or a personal computer. You can easily check all accessed accounts through the registry, browser history, or saved passwords without even having to use a code. At the same time, having physical access to a device also enables you to make it possible to plant a listening device into its system in order to phish out any additional information at any point in the future. 

7. Target locations 

If a hacker cannot find any vulnerability yet in a system that he wants to hack, the next thing that he will try to find is where a computer system is. This will allow him to further study vulnerabilities through social engineering, dumpster diving, or even gaining physical access to a targeted device. Since all computers have a MAC address, and every device connected through the internet has an IP address, every device in the world can be easily searched for in order to figure out where it is located. A hacker, on the other hand, knows how to hide his location in order to remain undetected while he launches an attack. 

Wednesday 5 October 2022

WIFI 6 how it improve then the previous version

 IEEE 802.11ax standard, provides the capacity, efficiency, coverage, and performance required by users today in the most demanding WiFi® environments

Key benefits of Wi-Fi CERTIFIED 6 technology include:

  • Higher data rates
  • Increased capacity
  • Performance in environments with many connected devices
  • Improved power efficiency


WiFi 6 increases the number of streams to a new high of 12 across the 2.4 and 5 GHz
bands, whereas WiFi 5 has a limit of 8 in a dual band configuration. This increase of streams provides higher connection speed, and your client devices have more paths to communicate with your WiFi router.



Ftx Crash

 RUMEAR SAAY THIS HACKE IS  CREATE BY FTX                                                                                                   ...