Professional Documents
Culture Documents
Basics of Cybersecurity by Shreyash Shukla-Open @majorkali
Basics of Cybersecurity by Shreyash Shukla-Open @majorkali
Training
By – Shreyash Shukla
What is Cybersecurity is the protection of digital systems,
networks, and data from unauthorized access, theft, or
Integrity Checking
This method generally checks for
manipulated files in OS from the viruses.
Interception
This method is used basically to detect
Trojans and it checks the request made
by the operating system for network
access.
DOS & DDOS ATTACK
The basic command for Responder to run this tool in Linux is “responder -I
eth0 -w -r -f” or “responder -I eth0 -wrf”, both are the same command
function. And this is the result from Responder tool.
Cyber Attack Practices
Cyber attack practices are malicious actions or techniques used by cybercriminals or hackers to gain
unauthorized access to computer systems, networks, or devices with the intention of stealing or
compromising sensitive information, disrupting services, or causing damage to the target.
Infographic Style
You can simply impress your audience You can simply impress your audience
and add a unique zing and appeal to your and add a unique zing and appeal to your
Presentations. Easy to change colors, Presentations. Easy to change colors,
photos and Text. photos and Text.
You can simply impress your audience You can simply impress your audience
and add a unique zing and appeal to your and add a unique zing and appeal to your
Presentations. Easy to change colors, Presentations. Easy to change colors,
photos and Text. photos and Text.
Payloads : Reverse Vs Bind
Payload refers specifically to the A reverse payload, also known as a A bind payload, also known as a
part of a malware or virus that reverse shell, is a type of payload
used in a cyber attack that allows an
bind shell, is a type of payload
used in a cyber attack that allows
carries out the malicious attacker to gain control of a victim's
computer or device by establishing a
an attacker to gain control of a
victim's computer or device by
actions. For example, a payload connection from the victim's
computer to the attacker's computer.
creating a listening port on the
remote attacker. taking other malicious action connection with the victim's
computer.
Reverse payloads can be used in a The advantage of a bind payload
variety of cyber attacks, such as in is that it allows the attacker to
remote access trojans (RATs), gain control of a victim's
botnets, and other types of malware. computer or device even if the
They are a common tool used by victim's network is behind a
hackers and cybercriminals to gain
firewall or other security
unauthorized access to computer
systems and networks.
measures that block incoming
connections. By creating a
listening port on the victim's
computer, the attacker can
establish a connection from
outside the network, bypassing
THANK YOU
Regards : Shreyash Shukla