WHAT IS THREAT MODELING?

Threats are those things that we can not control. What I mean by this is that threats, when it comes to security, are mainly driven (when there is a human behind the actions) by motivation and skills/capabilities. To give an analogy on Threats, in traffic example, when you drive a car there are different kinds […]

Read More WHAT IS THREAT MODELING?

GAMING FOR SECURITY ENTHUSIASTS

TERMINAL TERMINAL ┌──(kali㉿kali)-[~] nmap -sC -sV -T4 W.X.Y.Z Starting Nmap at XXX-YY-ZZ Nmap scan report (Z.Y.X.W) Host is up, Not shown: 995 filtered ports Reason: 995 no-responses PORT STATE SERVICE22/tcp open ssh 53/tcp open domain80/tcp open http443/tcp open httpsMAC Address: ##:##:##:##:##:## (Nmap done: 1 IP address scanned) ┌──(kali㉿kali)-[~] gobuster dir -u W.X.Y.Z -w /home/kali/small.txt ==================================== […]

Read More GAMING FOR SECURITY ENTHUSIASTS

THE RISK ANALYSIS PHASE EXPLAINED

In this article, the focus will be on the Risk Analysis phase in the Risk Assessment process. I will go through the phase, Analysis, and the elements within it. Risk Analysis is the second phase of the Risk Assessment process. If you want to read about the Risk Identification phase (which is the first phase), […]

Read More THE RISK ANALYSIS PHASE EXPLAINED