cover

OSINT Tools – Pt.3

 

OSINT – Pt.2 – Intelligence Cycle and OSINT Framework



OSINT Basics – What is OSINT and Why Do We Need It?


In: #infosec

John the Ripper Pt.4

Intro

In this article – the last in our John the Ripper series – we would like to focus on how we can use John to crack SSH keys, as well as mention some basics of Custom Rules.

 

John the Ripper Pt. 3

Intro

It should come as no surprise that John can also deal with .zip and .rar archives. John does this by leveraging the zip2john and rar2john utilities, built in the tool, so that it can ingest something that it will know how to use. The syntax is pretty much the same, and by now, you should be quite familiar with it; still, we will use this article to show some examples of how we can make our .zip and .rar archives John-ready. As we will see, this is akin to the unshadow tool we’ve used previously.

 

What is Vulnerability Prioritization?

In an ideal world, security teams would remediate all vulnerabilities as soon as they are discovered, eliminating both small and large risks. However, zero inboxing in the world of vulnerability management is a mere pipe dream. 

In: #security

What is Automated Patching?

The easiest way to fix known vulnerabilities is through patching. The major challenges are often gaining approval from app owners and in executing the change approval process.

In: #patching

What is Risk-Based Vulnerability Management?

Risk-based vulnerability management is the process of reducing vulnerabilities across the attack surface of an organization’s assets by prioritizing remediation based on the risks they pose. 

In: #patching

Leave a Reply

    Categories

    See all

    Strong Cyber Hygiene is only One Click Away

    Want to take TOPIA for a free ride? Schedule A Meeting with our 🐺team!

    Let us know what would like to see 😀