Folgen
-
Hi, friends 🙋♂️ Happy to share with you the 9th episode of First Infosec Podcast 🎉 Today’s guest Hammad Amjad (OSCP, CPSA, CRT) We will discuss Pentesting and Cybersecurity Certifications Follow FIP page on Instagram here
The post FIP9: About Pentesting and Cybersecurity Certifications with Hammad Amjad (OSCP, CPSA, CRT) appeared first on infosec.tinc.kz.
-
What are Cryptographic Failures Cryptographic Failures also known as lack of cryptography lead to exposure of sensitive data. Notable Weakness Enumerations included are CWE-259: Use of Hard-coded Password, CWE-237: Broken or Risky Crypto Algorithm, and CWE-331 Insufficient Entropy. First of all, we need to determine what data need protection. For instance, passwords, credit card numbers, …
FIP8: Cryptographic Failures (OWASP Top 10) Read More »
The post FIP8: Cryptographic Failures (OWASP Top 10) appeared first on infosec.tinc.kz.
-
Fehlende Folgen?
-
Welcome to the First Infosec Podcast – your guide to the world of Informational Security. This is episode number seven and today we will talk about Broken Access Control. In 2017 Broken Access Control was in the fifth position. Since then this security risk become far more prevalent. Most spread Common Weakness Enumerations include CWE-200 …
FIP7: Broken Access Control Read More »
The post FIP7: Broken Access Control appeared first on infosec.tinc.kz.
-
Welcome to The First Infosec Podcast – your guide to the world of Informational Security. This is episode number 6 and today we will overview OWASP Top 10. The OWASP Top 10 is a list of the ten most critical security risks to web applications. The document was developed for companies to help them secure …
Overview of OWASP Top 10 Read More »
The post Overview of OWASP Top 10 appeared first on infosec.tinc.kz.
-
Who is Web Pentester? Web Pentester is an information security specialist who conducts an assessment of web applications or websites by simulating hackers’ attacks. Most people who want to become ethical hackers start from the web. I think there are two main reasons why you should start from the web. First, a lot of learning …
Web Pentesters. How to get into pentest? Read More »
The post Web Pentesters. How to get into pentest? appeared first on infosec.tinc.kz.
-
Ports make communication between devices possible. Devices connected to a network send and receive data through TCP/UDP ports. For example, emails are sent through port 25 when websites work through port 80. Usually, ports refer to TCP and UDP ports which, in turn, are part of the Transport Layer of the Internet Protocol Suite. Leave …
What is a TCP/UDP port? Why open ports are potential risks? Read More »
The post What is a TCP/UDP port? Why open ports are potential risks? appeared first on infosec.tinc.kz.
-
On April 26 Microsoft 365 Defender Research Team disclosed new privilege escalation vulnerabilities in Linux also known as Nimbuspwn. The vulnerabilities were found in a systemd unit called networkd-dispatcher. Fixes for the vulnerabilities available as CVE-2022-29799 and CVE-2022-29800. Let’s consider what it means – Privilege Escalation. In most cases, during penetration tests, attackers get first control with …
Nimbuspwn. What is Privilege Escalation? Read More »
The post Nimbuspwn. What is Privilege Escalation? appeared first on infosec.tinc.kz.
-
Hi everyone! My name is T.F. Welcome to the infosec podcast from TINC.KZ – your guide to the world of information security. This is our episode number two and today we will explain how to secure yourself from being hacked. We prepared 5 simple rules, remember that this list is a minimum requirement and can …
How to secure yourself from being hacked Read More »
The post How to secure yourself from being hacked appeared first on infosec.tinc.kz.
-
Hi everyone! My name is Tim First. Welcome to the infosec podcast from TINC.KZ – your guide to the world of information security. This is our episode number one and today we will explain why terms information security and cyber security are NOT the same. For most people, the terms informational security and cyber security …
The difference between Information Security and Cyber Security Read More »
The post The difference between Information Security and Cyber Security appeared first on infosec.tinc.kz.