Securing your WiFi Network

Hello guys, In this tutorial we’ll be discussing how to secure your WiFi from Intruders, Crackers etc. Here’s a list of stuff that we are going to discuss in this tutorial:

- Router Features
- Strong Encryption
- Low WiFi Strength and Proximity
- MAC Filtering
- Strong Password
- Hiding WiFi SSID
- Deactivate WPS
- Upgrading Your Firmware

Router Features

The first most step towards security is to see whether your device has the appropriate features to make itself secure. As for Routers especially the one’s with WiFi. Security features are a must to avoid intruders to break in and take pleasure of your shit 😛
Always choose a Router which has most of the Security Features, Some of the important one’s I’ll list below:

Continue reading “Securing your WiFi Network”


Portability – A new Security Threat

With the drastic change in technology, machines are getting smaller and feature rich. In other words machines are being made more Portable as per human needs but this concept of Portability has bought a new level of threat to Security. A person can carry a portable computer having installed a penetration testing OS or any other tool on it,to penetrate deep into a company’s network without the device or the person getting detected.

Continue reading “Portability – A new Security Threat”

Restrict Apache Acess to Localhost Only

Setting up a Dev Server on your system can be easy but it can be a security hazard too! Why? Because if you have your server running, a person can access your web server page via your IP which can be dangerous. Anyone inside your local network can access it so as from the INTERNET if your External IP is known.

For me, the only solution for this  problem was to deny all the connections from the outside and only allow localhost access i.e if you access the server from your local  or external IP, you will receive a 403 Forbidden error. The only way you can access that server is to login via localhost on the same system where your web server is present.

Continue reading “Restrict Apache Acess to Localhost Only”

Beginner’s Guide to Telnet [Basics]

– What is Telnet?
Telnet is a Network Protocol and the tool which uses that protocol (i.e Telnet) is also known as Telnet.

– What is its usage?
Well Telnet is used to connect to an External or a Remote Computer via Port 23. You’ll need to enter the Login and Password in order to connect to that remote PC. After connecting to your remote PC you can carry out commands to preform your task on your Remote PC for example you want to create a text file or you want to check how your system is working or you want to check the directory of your remote PC.

Continue reading “Beginner’s Guide to Telnet [Basics]”

Setting Up a Honeypot On Linux For Security

Hello HC!
Today the topic of my tutorial is Creating a Honeypot on Linux but before we continue we need to understand what the term “Honeypot” stands for:

In easy words, Honeypot is a fake system which is used to set a trap for intruders trying to gain unauthorized access to your system. A Honeypot is like a virtual program which tends to be a part of the computer and the network on which it is installed. A Honeypot detects scans, bruteforce attempts, nmap service scans, pings, telnet connections and more!

Continue reading “Setting Up a Honeypot On Linux For Security”

Vulnerability Assessment With Nessus

Hello Guys! In this tutorial I’m am going to discuss about how you can find out Vulnerabilities using Nessus, We are going to do the following steps in the tutorial:

– What is Nessus?
– Installing Nessus
– Starting Up Nessus
– Scanning Target for Vulnerabilities
– Exploit Target
– Using Nessus for your own advantage
– Tune Nessus Scans

What is Nessus?

Nessus is a worldwide popular comprehensive vulnerability scanner. Using nessus you can find out the potential vulnerabilities in your system. Nessus can scan for the following type of Vulnerabilities:

– It scans a PC for vulnerabilities that can allow a Hacker to exploit the system, Gain access and steal sensitive data.
– It searches the target system for missing patches that may get exploited by a hacker
– Nessus can launch dictionary scan against passwords to see how strong they are as sometime users do keep common passes that might lead to easy access by a Hacker
– It can search for potential threats against DOS attacks by preforming tests on the system

Continue reading “Vulnerability Assessment With Nessus”

Beginner’s Guide to Nmap and Reconnaissance

Hello Ex094, in this tutorial we will be discussing mainly about a network analysis tool called Zenmap, it’s Nmap actually but the CLI version is known as “Zenmap”.

Table Of Contents:

1) Installing and Understanding Nmap

– What is Nmap?
– Installation
– Basic CLI Usage
– Main useful Commands 

– Target Reconnaissance with Nmap

– OS Detection
– Service Detection
– IDS Bypass and Stealth
– LAN Scan
– Checking Open Ports

Continue reading “Beginner’s Guide to Nmap and Reconnaissance”

Wanna Be Anonymous?

Hello guys!
I’ve seen people talk a lot about anonymity so I thought I did make a tutorial on it and explain clearly whether you can get anonymous or not, We’ll also be discussing some methods and tools to make that happen but first read this para with extreme attention and understand what it says:

Sometimes it is desired that a person can establish a long-term relationship (such as a reputation) with some other entity, without necessarily disclosing personally identifying information to that entity. In this case, it may be useful for the person to establish a unique identifier, called a pseudonym, with the other entity. Examples of pseudonyms are pen names, nicknames, credit card numbers, student numbers, bank account numbers, and IP addresses. A pseudonym enables the other entity to link different messages from the same person and, thereby, the maintenance of a long-term relationship.
Someone using a pseudonym would be strictly considered to be using “pseudonymity” not “anonymity”, but sometimes the term “anonymity” is used to refer to both (in general, a situation where the legal identity of the person is disguised) – Wikipedia

So here I’ll say my pseudonym is Ex094.

Continue reading “Wanna Be Anonymous?”