Resources

Google Dorking Methodology

Active Directory Attack

Phone Scam: Family Emergency

OSINT Investigation Methodology

Online Shopping Fraud: Fake Stores

Fast Loan Apps Fraud

Missed Call Scam: Wangiri

Crimes using AI

Pentesting Methodology

Microservices Attack

APIs Security Testing Methodology

Incident Response Process

Red Team

Blue Team

Purple Team

Bug Bounty Hunting

Phishing through fraudulent domains

Verification process in Zero Trust

Prompt Injection attacks on Automated Systems

MCP

SPF

DMARC

DKIM

MFA

Anatomy of an attack on JWT

Anatomy of a reserve proxy phishing attack

Anatomy of a supply chain attack

Bypass of EDR/XDR controls

Fileless Malware

Living off the Land

Command and Control Mechanism

Threat Hunting Process

Spyware

Watering Hole

Wireshark Traffic Analysis

Social Engineering

Signs of Phishing

How is my Network Hacked?

Types of Malware: Virus

HTTP Request Smuggling

Man in the Middle

DNS Cache Poisoning

DNS Memcached Attack 

DDOS DNS Flood Attack

DDOS HTTP Flood Attack

DDOS Volumetric Attack

Botnets

SQL Code Injection

SSO and SAML

Cross-site Scripting Stored XSS

Cross-site Request Forgery (CSRF)

Cross-site Request Forgery (CSRF)

[/et_pb_column]

IDOR Attack

Server-Side Request Forgery

Ransomware

Drive By Download

DDOS TCP Syn Flood Attack

Sub-domain Takeover

DDOS Slowloris Attack

DDOS SSDP Attack

Types of Malware: Macro Viruses

DDOS NTP Amplification Attack

Rootkit

Explotation Cycle

Phishing Techniques

Password almost impossible to hack

Malware: Worm

Malware: Trojan

Access token manipulation

Password almost impossible to hack

Ransomware

MITM Attack

Sniffing attack

Reflection/amplification attack

Evil twin

BGP hijacking

MAC flooding

Password cracking

Contact Us

+1 (804) 256-8316

2034 Eisenhower Ave # 170 Alexandria, VA 22314

Monday-Friday: 9am - 5pm

Get Started

Schedule a virtual appointment with our experts for a free External Cybersecurity Diagnostic.

ISO 9001 SGS Certificate Icon
ISO 27001 SGS Certificate Icon

Privacy Policy

Follow us on our social media