Posts

Digital Forensics

Image
  Episode Title: Digital Forensics Episode Description: Technical news, Tech Awareness, Tips & Tricks, Tools Episode Links: Gaana: https://gaana.com/podcast/cm-common-man-voice-season- 1 Spotify: https://podcasters.spotify.com/pod/show/bilalma1976/episodes/Digital-Forensics-e26gfe0 Anchor: https://anchor.fm/bilalma1976 Digital forensics: Digital forensics is a branch of forensic science encompassing the recovery and investigation of material found on digital devices, often in relation to computer crime.So, forensics is the technical process of recovering or collecting evidence that will be used in an investigation. Professionals: Soc Analyst Incident Response Threat Hunter Digital Forensic Analyst Challenges & Process in Digital Forensics: Challenges: Navigating the complexities of the digital realm. Encryption: Dealing with encrypted data and passwords. Anti-Forensic...

Website

Image
 Season: 1 Episode: 5 Episode Title: Webpage Episode Description: Technical news, Tech Awareness, Tips & Tricks, Tools Episode Links: Gaana- https://gaana.com/podcast/cm-common-man-voice-season-1 Spotify: https://open.spotify.com/episode/23Eiaq9apv3W9hMUWup0jp Why Website: The internet and websites have transformed the way we connect with people, and share information. A lot of people spend most of their time on the internet. This could be for buying a product, using a service, reading a blog, entertaining themselves, or for various other reasons. Considering the amount of time people spend on the internet, businesses too have moved online. So, in order to connect with the world to represent our products or our projects, we need a platform to showcase them. Websites are one of the easiest ways to showcase. Designing and hosting a website: Choose a website platform: There are many website platforms to choose from, such as WordPr...

Podcast Transcript (Securing our Wi-Fi)

Image
Season:  1 Episode:  4 Episode Title:  Securing our Wi-Fi Episode Description:  Technical news, Tech Awareness, Tips & Tricks, Tools Episode Links: Spotify:   https://podcasters.spotify.com/dash/episode/6M0OeD9bvVOyrS8bDZu514 Gaana:   https://gaana.com/podcast/cm-common-man-voice-season-1 Google:  https://podcasts.google.com/feed/aHR0cHM6Ly9hbmNob3IuZm0vcy9kNWQ1MmE0OC9wb2RjYXN0L3Jzcw Anchor:   https://anchor.fm/bilalma1976/episodes/Securing-our-wifi-e1v5ecf Wifi -Wireless Fidelity Radio wave (IEEE 802.11) Our home networks might have a range of wireless devices on them from computers and phones to IP cameras, voice assistants(Alexa), smart TVs, and connected appliances(Smart bulbs). Taking some basic steps to secure your home Wi-Fi network will help protect your devices from getting hacked and your informations from getting stolen. Some of the simple steps that help to protect our wifi below: The Wi-Fi network password The router admin passwor...

Podcast Transcript (Securing our Accounts)

Image
Season: 1 Episode: 3 Episode Title: Securing our accounts Episode Description: Technical news, Tech Awareness, Tips & Tricks, Tools Episode Links: Gaana: https://gaana.com/podcast/cm-common-man-voice-season-1 Spotify: https://open.spotify.com/show/4I6Fv49zLxNvyWlVPCiPEu Anchor: https://anchor.fm/bilalma1976 Google Podcast: https://podcasts.google.com/feed/aHR0cHM6Ly9hbmNob3IuZm0vcy9kNWQ1MmE0OC9wb2RjYXN0L3Jzcw In this episode, we will discuss about the methods to secure our accounts and protect our data. We all may have different accounts like Social Media, Email, etc. And while accessing it prompts us for a user-id/username or password in order to prove our identity to access our account once the username and password match it generates an access token to access the account and the token is valid until we sign out. We will see the various methods that help us to p...

Podcast Transcript (Approaches of Attackers)

  Season:  1 Episode:  2 Episode Title:  Approaches of Attackers (Hackers) Episode Description:  Technical news, Tech Awareness, Tips & Tricks, Tools Episode Link: https://spotifyanchor-web.app.link/e/gCs1IxGMywb Let's start this episode with 2 quotes “If you want to win a person think like him” “If you want to be rich think like rich act like rich” Like the quote says if you want to be safe and secure from attackers then you must know his approaches and technics to defect them so let's dig deep into it First, an attacker sets his target (Machine, Mobile, Person) and collects data as possible their name, IP, favourite items, DOB, email etc. From the open source,  dark web or physical approach and from the collected data he tries to create a connection between himself and the target by means of any medium. Then he uses some of the various methods such as Phishing Attack Ransomware Attack ...

Podcast Transcript (Tech Hunt)

  Season:  1 Episode:  1 Episode Title:  Tech Hunt Episode Description:  Technical news, Tech Awareness, Tips & Tricks, Tools Episode Link:  https://spotifyanchor-web.app.link/e/oHSdyJxLowb How to be safe and secure while using the Internet? We all use the internet very often and it keeps on increasing day to day all the activities and services are based online only such as the issue of voter id, passport renewal and electricity bills etc Statistics say that there will be 5 billion online users in 2022 and in 2023 it’s expected to be in one-third of the world’s population will be using the internet In other Statistics over a 22billion user data are exposed to the dark web in the 2022 cyber attack Let’s have a look at the Technicis and methods to keep our data safe Use VPN to hide your IP. Never feed your data online unless you feel the platform is safe or it’s mandatory for you. Enable 2-step verification where ever it’s available. Put your mobile or la...

DDOS using hping tool

Image
What is a Ping (ICMP) flood attack?                 ICMP-INTERNET CONTROL MESSAGE PROTOCOL The Internet Control Message Protocol (ICMP), which is utilized in a Ping Flood attack, is an internet layer protocol used by network devices to communicate A ping flood is a denial-of-service attack in which the attacker attempts to overwhelm a targeted device with ICMP echo-request packets, causing the target to become inaccessible to normal traffic.                When the attack traffic comes from multiple devices, the attack becomes a DDoS or distributed denial-of-service attack. Flood Attack: The ping flood attack aims to overwhelm the target device's ability to respond to the high number of requests and overload the network connection with bogus traffic. Installation:           https://www.kali.org/tools/hping3 Commands: hping3 -1(ICMP) ...