Jump to content

Forums

  1. Important Information

    1. Community Rules

      Our community have specific rules, read them today in order to take care of your account here.

      1
      Topics
      1
      post
    2. Announcements

      All news and announcements about our forums can be found here.

      4
      Topics
      4
      posts
    3. Suggestion & Ideas

      Our community is like a family and in our family everyone have rights to share their ideas and suggestion.

      2
      Topics
      16
      posts
  2. Penetration Testing & Hacking

    1. Web & Mobile Application

      What does it take to break into a web or mobile application? Is it just OWASP top 10 and Burp suite? Stay tuned to know what it really takes to break into web/mobile applications.

      32
      Topics
      128
      posts
    2. Network

      Everything from enumerating a network to gaining initial access and escalating user privileges can be discussed here.

      33
      Topics
      106
      posts
    3. Social Engineering & NLP

      Of-course hacking section without social engineering and neuro-linguistic programming {NLP} is never a good one. So we thought of adding this section under hacking/penetration testing.

      5
      Topics
      15
      posts
    4. Malware Development

      What does it take to build malware? How can we by-pass AV's and make a malware which is hard to be reversed using reverse engineering? Here you can find A to Z about the science behind "malware development" in this section of the forum.

      19
      Topics
      100
      posts
    5. Exploit Development

      Ever wondered how people make millions or cause chaos using 0-day exploits? Well you are at the right place.

      4
      Topics
      19
      posts
    6. Wireless

      Last but not least, wireless-hacking plays a crucial role too. Instead of naming this section as "Wireless- Hacking", we wanted to name something special for the last section of hacking/penetration testing. And here we go, we named the last section as "Wireless Kung-Fu".

      5
      Topics
      6
      posts
  3. DFIR

    1. Digital Forensics

      All topics which are related to "data recovery", "data  acquisition ",  mac, windows, smartphones and linux forensics are meant to be discussed here.

      6
      Topics
      27
      posts
    2. Incident Response

      So you have basic/good understanding of how to stay safe online, but what if your family/friends or company gets hacked? It's show time .....

      2
      Topics
      3
      posts
  4. Cyber Defence & Blue Team

    1. System & Server Hardening

      Everything from linux/unix/windows/mac system hardening topics to hardening the servers are meant to be discussed here.

      48
      Topics
      59
      posts
    2. Intrusion Detection, Networking Monitoring & Log File Analysis

      Everything related to IDS and network monitoring and log file analysis are meant to be discussed here.

      5
      Topics
      12
      posts
    3. OSINT, Privacy, Anonymity & OPSEC

      Well we do agree that OSINT, anonymity & OPSEC to go hand in hand with hacking, but these terms are closely related to blue teaming and work great when it comes defending our identity or a company. So we thought of adding this section here at "Cyber-Defence and Blue Team"

      Note: Privacy, anonymity and OPSEC are not the same term even if they have lot of similarities between them.

      22
      Topics
      44
      posts
    4. SIEM & Kill Chain Defenses

      Topics related to security information event management {SIEM} and defence techniques for cyber-kill chain should be discussed here.

      1
      Topics
      4
      posts
    5. Malware Analysis & Reverse Engineering

      Want to know how a malicious file works and eager to prevent the chaos caused by malware? This section is the right place for you. 

      5
      Topics
      29
      posts
    6. Threat & Vulnerability Management

      Is your workplace and home environment safe from threats like hacking, cyber-crime & cyber espionage? 

      3
      Topics
      4
      posts
    7. Defending Mobile & Web Applications

      Last but not least, defending mobile and web-applications does play a crucial role when it comes down to the topic of "Cyber-Defence".

      1
      Topics
      10
      posts
  5. CTF Section

    1. CTF Events

      You can post your challenges in this format 👇🏻

      Challenge Category:

      Difficulty: [ Easy Medium Hard Insane ]

      Point:

      Little Hint:

      Flag Type:

      Also you can post on-goin CTFs, so other users can attend.

      6
      Topics
      10
      posts
    2. 10
      Topics
      16
      posts
  6. Misc Discussion

    1. Discussion

      Feel free to talk and discuss about off-topic thing here.

      74
      Topics
      205
      posts
    2. Infosec Fun

      Infosec Fun is the right for sharing meme and fun photos/gif related to infosec.

      2
      Topics
      32
      posts
    3. Story

      Share your real life story and experience anonymously, Other people can learn from it.
      [ None of members are able to see who actually posted that story, please send it anonymously ]

      2
      Topics
      14
      posts
×
×
  • Create New...

Important Information

Before sign-up please read our Guidelines and Terms of Use