Category: Cybersecurity

  • Cloud Computers for Hacking

    Cloud Computers for Hacking

    Cloud computing has been around for a while now. There are offerings from many big tech companies and it’s very cheap, sometimes free, to get a cloud server up and running. In this article, we’ll look at the uses of these servers in the world of cybersecurity. Hosts But before we begin let’s review some…

  • DNS Poisoning

    DNS Poisoning

    DNS poisoning is the act of intercepting DNS requests and sending spoofed responses. This can be done as most DNS requests are sent in plaintext, making it easy to intercept. These attacks are actually quite common as most routers use it censor adult websites on devices. In this article, we’ll go over ways to perform…

  • Kali vs Parrot vs Athena

    Kali vs Parrot vs Athena

    The operating system is an integral part of cybersecurity. Each one offers different tools and functions catering to different people. In this article, I will review some of the differences and my experiences with the OSs I’ve used. Kali Based on Debian, link here. Pros: Cons: Parrot Based on Debian, link here. Pros: Cons: Athena Based on…