A very common question in the mind of the beginners in cyber security is that do we really need to learn programming to get a job in cyber security? Well, the answer to this question is not as simple as a YES or NO, it varies according to the job…

As a beginner, I used to face a number of issues while installing these tools, so I thought of writing an article about installing and using these basic tools. Some of the basic scanners are described in this article with their installation procedure for Kali Linux.

HOW TO INSTALL NESSUS?

I have explained the steps for writing a web crawler.

WHAT IS A WEB CRAWLER?

Hello Everyone! I have listed some of the popular & easiest tools for bug hunting. Check them out.

1. FOXYPROXY

FoxyProxy automates the manual process of editing Firefox’s Connection Settings dialog. It switches internet connections across multiple proxy servers.

I have explained how a basic file interceptor program is developed using python in this article. Keep in mind that before running this program, We need to run the ARP spoofer. Then run the iptables command.

If you are targeting the remote computers, then redirect the FORWARD chain to your…

Now that I have explained how to develop our own tools for performing MITM attacks such as ARPSPOOF and DNSPOOF, We will explore how to build a program to detect the ARP Spoof attacks being performed on our machine. This is a basic beginner friendly program.

HOW DOES AN ARP SPOOF DETECTOR WORK?

If we look at…

1. INTERCEPTING THE REQUEST

How does a DNS SPOOFER work?

This is a Man-in-the middle attack so there will be three entities :

  1. The victim
  2. The attacker ( I am using Kali Linux 2020.3)
  3. The Access Point/Gateway

The victim sends requests to the Access Point, the attacker sniffs them and modifies them and send…

As a beginner in coding, this was the second program that I had written after understanding the basic concepts of programming. I have explained some of them in a brief manner.

What does an ARP spoofer do?

Address Resolution Protocol is used for mapping a dynamic IP address to a permanent machine address (MAC Address). The…

The First program that I had written was a basic MAC Address Changer program which is available on github. I have explained how to create your own macchanger with python or you can also use the github tool that I have uploaded. …

Anandita

Cyber Security Enthusiast

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store