Skip to content

Welcome to the cybersecurity repository for the hacktoberfest.

Notifications You must be signed in to change notification settings

dsc-iem/Cysec-Hacktoberfest

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

31 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

dsc logo

Cybersecurity Hacktoberfest repository

This repository contains two very basic programmes one of which is focused on networking while other on
a very beginner yet very important vulnerability information gathering


Key Logger

Key logger, often referred to as keystroke logger or keyboard capture, is the action of recording the keys struck on a keyboard, typically covertly ,so that person using the keyboard is unaware that their actions are being monitored. A key logger can be a software or a physical device we will be making one such software in this directory.

Know_Your_IP

IPv4 addresses are 32-bit numbers that are typically displayed in dotted decimal notation. A 32-bit address contains two primary parts: the network prefix and the host number. All hosts within a single network share the same network address. Each host also has an address that uniquely identifies it. IPv4 addresses are also classified into 5 different classes.

Reverse Shell

A Reverse Shell is a common tool used by attackers to take control of a victim machine. The attacker listens for incomimng connection requests as the victim tries to connect back to it. The attacker can now execute various tasks on the remote victim achine like Spawning a shell , taking a screenshot , uploading and downloading files, etc.

MITM Over ARP

The Address Resolution Protocol (ARP) is a communication protocol used for discovering the link layer address, such as a MAC address, associated with a given internet layer address, typically an IPv4 address.The ARP protocol lacks any authentication mechanism which allows for performing Man-In-The-Middle Attacks.

Head over to the directories to know more.

Contributing Guidelines

FOLLOW THE STEPS STRICTLY MENTIONED DURING THE SESSION

About

Welcome to the cybersecurity repository for the hacktoberfest.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 4

  •  
  •  
  •  
  •