Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
IGNITE Technologies
IGNITE Technologies
A Detailed Guide on Medusa
Hi Pentesters! Let’s learn about a different tool Medusa, which is intended to be a speedy,...
IGNITE Technologies
A Detailed Guide on Crunch
Often times attackers have the need to generate a wordlist based on certain criteria which is...
IGNITE Technologies
A Detailed Guide on Cewl
CeWL – A custom wordlist generator is a ruby program that crawls a specific URL to...
IGNITE Technologies
RED TEAM OPERATIONS – MITRE ATTACK
The document provides a comprehensive overview of the Red Team Operation training program offered by MITRE,...
IGNITE Technologies
A DETAILED GUIDE ON
Hello! Pentesters, this article is about a brute forcing tool Hydra. Hydra is one of the...
IGNITE Technologies
Credential Dumping
Active Directory Reversible Encryption According to MITRE an adversary may abuse Active Directory authentication encryption properties...
IGNITE Technologies
EASY WAY TO GENERATE REVERSE SHELL
This document provides a comprehensive overview of generating reverse shells using online tools. It delves into...
IGNITE Technologies
RED TEAM
OPERATIONS - MITRE ATTACK The document delves into the intricate realm of cybersecurity operations, specifically focusing...
IGNITE Technologies
Burpsuite for Pentester: Authorise
The document focuses on the "Autorize Burp" extension, an essential tool for conducting comprehensive security reviews....
IGNITE Technologies
Infra Pentest Course
This is exclusive training provided by Ignite technologies worldwide to provide realistic exposure for Vulnerability Assessment...
IGNITE Technologies
Windows Reverse Shell
The document provides a comprehensive guide on acquiring a reverse shell using PowerShell scripts on the...
IGNITE Technologies
Firefox Addons for Pentesting
In the ever-evolving landscape of cybersecurity, penetration testing stands as a crucial pillar of defence against...
IGNITE Technologies
Web ApplicationPenetration TestingTraining
Web Pentest Web Pentest program, also known as the Bug Bounty program, is a crowdsourcing initiative...
IGNITE Technologies
Process Ghosting Attack
Gabriel Landau released a post on Elastic Security here which talks about a technique through which...
IGNITE Technologies
Active Directory Pentest Course
THREATS TO ACTIVE DIRECTORY SYSTEMS Default Security Settings: Microsoft built a set of predetermined, default securitysettings...
IGNITE Technologies
A Detailed Guide on AMSI Bypass
Windows developed the Antimalware Scan Interface (AMSI) standard that allows a developer to integrate malware defense...
IGNITE Technologies
NETWORK PENETRATION TESTING
Network penetration testing is one of the most efficient methods in weeding out any loopholes and...
IGNITE Technologies
TRAINING PROGRAM CAPTURE THE FLAG
CTF is the latest edition of our training which provides the most advance modules that connect...
IGNITE Technologies
CREDENTIAL DUMPING CHEATSHEET
What is Credential Dumping? When the term password cracking is used in the cyber world, it...
IGNITE Technologies
CHEATSHEET PORT FORWARD & TUNNELLING
Port forwarding can be defined as implementation of the Network Address Translation to send requests to...
IGNITE Technologies
MSSQL for Pentester Hashing
Hash is a specific type of algorithm that produces an output string of a fixed length....
IGNITE Technologies
MSSQL for Pentester Command Execution External Scripts
Microsoft has released a lot of versions for SQL servers. Microsoft has released version 2019 of...
IGNITE Technologies
Linux privilege Escalation Writable passwd File
We will focus on exploring diverse techniques to modify the etc/passwd file, enabling us to create...
IGNITE Technologies
Burpsuite for Pentester Course
Bug Bounty without Burp Suite? Impossible to think that of!! In today’ sera, web-application penetration testing...
IGNITE Technologies
A Detailed Guide on Log4J Penetration Testing
we are going to discuss and demonstrate in our lab setup the exploitation of the new...
IGNITE Technologies
A Detailed Guide on Kerbrute
Background:Kerbrute is a tool used to enumerate valid Active directory user accounts that using kerrberos preauthentication....
IGNITE Technologies
A Detailed Guide on Evil Winrm
Evil-winrm open-sourced tool written in ruby language making post exploitation easy as possible. This tool comes...
IGNITE Technologies
A Detailed Guide on Chisel
Chisel is open-sourced tool written in Go (Golang) language, mainly useful for passing through firewalls, though...
IGNITE Technologies
Bloodhound Active Directory Enumeration Tool
BloodHound is designed to generate graphs that reveal hidden and relationship within an Active Directory Network.BloodHound...
IGNITE Technologies
Anonymous Logins for Pentesters
Anonymous Logins are a feature that allows the user to set up a service that is...
Posts navigation
1
2
3
4
Latest News
The Register Security
A pot of $250K is now available to ransomware researchers, but it feeds a commercial product – Source: go.theregister.com
23/04/2025
The Register Security
This is not just any ‘cyber incident’ … this is an M&S ‘cyber incident’ – Source: go.theregister.com
23/04/2025
The Register Security
UN says Asian scam call center epidemic expanding globally amid political heat – Source: go.theregister.com
23/04/2025
securityweek.com
Terra Security Raises $8M for Agentic AI Penetration Testing Platform – Source: www.securityweek.com
23/04/2025
securityweek.com
Cyberattack Knocks Texas City’s Systems Offline – Source: www.securityweek.com
23/04/2025
securityweek.com
Many Malware Campaigns Linked to Proton66 Network – Source: www.securityweek.com
23/04/2025