A step by step graphical tutorial on setting up Kali Linux on your windows box

The Environment we will be using would be a VMWare setup on Windows. Kali Linux will be installed in the VM .

Step 1 :

Download VMWare Workstation Player ( for windows ) and the Kali Linux ISO. …


NETWORK TOPOLOGIES

What are the major flaws in Ring , Bus and Star topologies

Ring Topology

The major flaws with a ring topology is that if a device goes down or a cable is broken, then data will no longer be passed.

Bus Topology

With a bus topology, all devices are connected to a single cable, often called the backbone. …


Over 90% of LinkedIn user data leaked

Another massive LinkedIn data breach has been reported and almost 90 % of the users on LinkedIn have been affected.

Over 700 million users data has been leaked ( which accounts to 92% of the userbase) .

What has been leaked ?

  • email addresses
  • full names
  • phone numbers
  • physical addresses
  • geolocation records
  • LinkedIn username
  • profile…


How to merge multiple files and dedupe the lines in the files

Two questions answered here :

  • What should I do if I bring in a file from windows to unix to do text operations ?
  • What are the steps to dedupe the entries in multiple file ?

First things first — dedupe the entries in some files into a single file.


How to prevent some common mistakes in grep

1. Searching for special characters

When you have to search some words using grep and those words have special characters in them, you have to be careful and use the -F parameter in grep command

You might want to search for a password which might contain a special character like % @ $ or ;

Lets take an example .


How to clean up your dictionary file for bruteforce attack

Why do you need to do this ?

At some point in time when you learn cracking passwords, you will have to end up creating your custom dictionaries . Over time these dictionaries grow as you add in more words . And that’s when you find it important to remove the duplicates from this file .

Enter Unix

View the…


University of Hertfordshire, UK joins the new list of varsities that have faced a bout of cyber attack

Background

On April 2021, University of Hertfordshire reported a disruption in their online activities, particularly services like online classrooms, zoom & Team meetings, Wi-Fi , email services and VPNs. [1]


The aftermath of LinkedIn data leak of 500 Million Users

Background

Early April 2021, LinkedIn officially confirmed that data of around 500 Million of its users were scrapped and put for sale. Here is the official communique from LinkedIn [1].


What we know so far about the Bizongo.com data breach

A quick look at yet another data leak from an online eCommerce site — Bizongo.com . The news is still unfolding — So this post will be updated in the coming days.

  • Who : Bizongo.com ( a B2B supply chain automation platform ) — registered as Smartpaddle Technology Pvt. Ltd…


Why the social media giant is becoming an increasing threat to the security of your data

Facebook is normalizing its data-leaks .

“The media attention around the data leak of 533 million users will die soon”

That was one of the messages that was passed on within the Facebook Corporate…

Ned Poplaski (CISSP)

I share news and Lessons to make possible a safer cyber experience. cyber security educator. ex-McAfee, Consultant snyk.io,sonatype.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store