Product Manager with a strong tech background and a flair for Marketing. Guest writer for FreeCodeCamp and The Startup. Learn more at www.manishmshiva.com

Social engineering is the technique by which an attacker can make a person do something that is not usually in their best interest. In this article, we will look at a few common ways Social Engineers try to manipulate you.

Image for post
Image for post


Numpy is a python library for performing large scale numerical computations. It is extremely useful, especially in machine learning. Let's look at what Numpy has to offer.

Image for post
Image for post

Introduction



Aircrack comprises of a suite of tools that help you attack as well as defend wireless networks. Let's look at what Aircrack has to offer.

Image for post
Image for post



Cybersecurity has its fair share of jargon. This article will help you understand some of the common terms you will come across as a security engineer.

Image for post
Image for post
Photo by Nahel Abdul Hadi on Unsplash
  1. Authentication — The process of checking if a user is allowed to gain access to a system. eg. Login forms with username and password.
  2. Authorization — Checking if the authenticated user has access to perform an action. eg. user, admin, super admin roles.
  3. Audit — Conduct a complete inspection of an organization’s network to find vulnerable endpoints or malicious software.
  4. Access Control List — A list that contains users and their level of access to a system.
  5. Aircrack-ng — Wifi penetration testing software suite. Contains sniffing, password cracking, and general wireless attacking tools.
  6. Backdoor — A piece of code that lets hackers get into the system easily after it has been compromised. …


Penetration testing is the process of exploiting an organization’s network to help defend it better. Here are five steps involved in a successful penetration test.

Image for post
Image for post


Advertising is failing, thanks to Adblockers. Here’s how you can sell successfully to an audience without trying to shove an ad down their throat.

Image for post
Image for post
Photo by Jo San Diego on Unsplash

THE PROBLEM


Intelligent IoT devices are all around us. In this article, we will see how you can combine machine learning and embedded systems to build intelligent IoT devices.

Image for post
Image for post


Metasploit can handle everything from scanning to exploitation. In this article, we will take a look at what makes Metasploit the most versatile penetration testing toolkit.

Image for post
Image for post

Intro to Penetration Testing

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store