What is Kerberosting

What is Kerberoasting ? The general concept of Kerberoasting is requesting service tickets (TGS) from the KDC (Kerberos Domain Controller) that are associated with service accounts to retrieve their hashes. Then, attempt to crack them offline with tools like Hashcat or John to recover the cleartext passwords to either escalate privileges vertically to become a local administrator or horizontally to access a set of different resources that can […]

How to find hidden directories in a website

The reconnaissance and scanning phases of a penetration test are arguably the most important of the entire process. Without a clear understanding of the bigger picture and the avenues potentially available to you, you won’t be going very far at all. As part of this process, it’s very likely that you regularly come up against […]

How to use Proxychains

Proxy Chains

Using a Linux-based operating system to hide your identity on the internet is quite simple, and you can do it all without paying for a VPN service like those available today. Kali Linux distributions are used to test the security of WiFi networks, websites, and servers, among other things. Operating systems like Debian and Ubuntu are also […]

Data privacy vs Data security


When it comes to data security and data privacy, these terms are often exchanged. Whether these are synonyms , closely connected with each other or do have some difference? Let’s clear this through this post.  Firms who manage and collect their data needs  protection  and security in a well manner. So what is privacy and […]

cyber security and cloud security

Cloud security vs cyber

Introduction- In the age of digital world , data from almost every company is available in digital format. But as technology advances, cybercrime grows rapidly , making devices and data more exposed. As a result, it is important that businesses take steps to protect their data and sensitive information. The first thing that comes to mind when […]

Cybersecurity Interview Questions Part-4

In continuation of our interview series, here we are presenting the 4th part in our interview series. Let’s begin: Q1. How firewall can aid in malware mitigation? An enterprise firewall between your internal network and the Internet provides one layer of protection for the internal computers. However, not all threats come through the “front door” […]

Cybersecurity Interview Questions Part-3

In the continuation of our interview questions series, here we present the next part of our interview questions, Lets begin: Q1. Name some malware identification tools. Some of the mostly used tools in identification of malware is: CrowdStrike Falcon Insight EDITOR’S CHOICE This EDR analyzes malware on two levels and also identifies intruder activity. The […]

Linux File System

Linux File System If you are in IT Field or thinking of getting into it. Then a deep understanding of Linux is very important. In this article, we are going to get a decent understanding of Linux File System. What is a File System ? OS stores data on disk drives using a structure called […]

Cyber crime and Security

Introduction- Crimes committed under cyber space are cyber crimes. Cyber space is a broad term. Most of us don’t have knowledge bout this term. Crimes which happens on computer and internet comes under cyber space. Criminals use resources to gain information and technical aspects of security  and often confused with the term Cyber crimes. Cyber […]

Outdated course? Learn Cybersecurity with Cybervie

About the Indian Education System   Pre  independence period Significant changes in the education system can be seen from pre- and-post-British rule to ultramodern India. Originally children were educated in the latterly changed Gurukul’s and a ultramodern educational program was introduced. Post independence period After India gained independence, the constitution elevated six introductory rights, one […]