How to carry out a watering hole attack: Examples and video walkthrough

What is a watering hole attack, how do they work and what can you do to defend against them? Find out in this watering hole walkthrough from Infosec Principal Security…

How cross-site scripting attacks work: Examples and video walkthrough

What is a cross-site scripting vulnerability and how does an attacker carry out a cross-site scripting attack? Find out in this walkthrough from Infosec Skills author John Wagnon. How does…

How to write a port scanner in Python in 5 minutes: Example and walkthrough

Infosec Institute –  Infosec Institute –  What is a port scanner and how does one work? Learn how easy it is to build your own basic Python port scanner in…

How to use Wireshark for protocol analysis: Video walkthrough

Capturing and analyzing network traffic is a foundational skill for many cybersecurity positions. Learn how to use popular tools like the free protocol analyzer Wireshark and sniffing tool tcpdump in…

How SQL injection attacks work: Examples and video walkthrough

Injection attacks are the number one web application security risk, according to the OWASP Top 10. Learn how they work and how you can defend against them in this walkthrough…

Role of digital signatures in asymmetric cryptography

Encryption and decryption Encryption is the process of converting plaintext to encrypted text. Since encrypted text cannot be read by anyone, encrypted text hides the original data from unauthorized users.…

Man-in-the-middle attack: Real-life example and video walkthrough [Updated 2021]

Is your web browsing private, or is a man in the middle looking at everything you do? Learn what a man-in-the-middle (MITM) attack is, how to set up and execute…