Posts

DASHBOARDS AND REPORTS

Image
  a { text-decoration: none; color: black; } DASHBOARDS AND REPORTS REGIONAL SALES REPORT PRODUCT WISE SALES REPORT SALES NEXUS REPORT SALES ANALYSIS ADVANCE KPI SUPPLY CHAIN REPORT PASSENGER SATISFACTION DASHBOARD EU TRADE GOODS DASHBOARD DEMOGRAPHY DASHBOARD PHARMA ANALYTICS AEROSPACE ANALYTICS DRUG MANUFACTURER STOC HISTORICAL ANALYSIS REPORT BANK RISK ANALYSIS REPORT OIL & GAS STOCK HISTORICAL ANALYSIS REPORT

WINDOWS EVENTLOG POWERSHELL SCRIPTS

Image
  EVENTLOG THROUGH POWERSHELL SCRIPTS ******* LOCATION OF LOG FILES IN WINDOWS OS C:\Windows\System32\winevt\Logs ******* CHECKING OF EVENTVIEWER SERVICE STATUS Get-Service eventlog ******** SOME IMPORTANT PS SCRIPTS Get-EventLog -List Get-EventLog -LogName System -Newest 5 Get-EventLog -LogName System -EntryType Error Get-EventLog -LogName System -after 10/09/2022 Get-EventLog -LogName System -Before 19/09/2022 -After 10/09/2022 Get-EventLog -LogName Security -EntryType SuccessAudit | Where-Object{$_.EventID -eq 4720} ******** Parsing Windows Defender event log in PowerShell Get-WinEvent -logname "MICROSOFT-WINDOWS-WINDOWS DEFENDER/OPERATIONAL" EVENT VIEWER EVENT ID EXPOLORER SITE:

SOME IMPORTANT USEFULL DOWNLOAD LINKS

  SOME IMPORTANT USEFULL DOWNLOAD LINKS WikiDll  Dll Filebase & Encyclopedia DLL DOWNLOADER

How to Start a Cyber Security Career

Image
  What is Cybersecurity? Cybersecurity is a practice of protecting the systems, networks from digital attacks. Now that many of the companies, financial sectors, government organizations are looking forward to protecting their data from hackers or cybercriminals .  These attacks must be handled by engineers, pen testers, security testers and other professionals to prevent the attack.  Why Cybersecurity is important? Cybersecurity is important across different sectors such as government organizations, startups, mid and large enterprises and even for personal use. But why do think security is very important? Gone are the days of simple firewalls and antivirus software being your sole security measures.  Cyber threats can come at any level of your organization So, educating your employees about simple scams like phishing, ransomware attacks or other malware designed to steal intellectual property or personal data.  Cybersecurity risk is increasing and withou...

PASSIVE Vs ACTIVE INFORMATION GATHERING FOR WEBSITE RELIABILITY

Image
  Information Gathering is the First Step of Ethical Hacking. Penetration Tester or even Hackers Gather Information on their target victims.  Every Attack Begins with Information Gathering. There are two types of Information Gathering that anyone can perform: Active Information Gathering Passive Information Gathering Passive Information Gathering Passive Information Gathering is when anyone gather information about a target without directly interacting with the target.  This means that anyone do not send any type of request to the target and therefore the target has no way of knowing that anyone is gathering information on them.  Generally passive information gathering uses public resources that have information on that target. Using public resources to gather information is called Open source intelligence (OSINT).  Using OSINT anyone can gather things such as: Victim IP addresses Domain Name Information Technologies used by the website/web applications Other we...

First Commands After Installing Kali Linux

Image
IMPORTANT POINTS TO BE NOTED: Sudo stands for either “substitute user do” or “super user do” "root" (aka "superuser") is the name of the system administrator account. Root user has user id 0 and nominally has unlimited privileges. Root can access any file, run any program, execute any system call, and modify any setting. The "sudo" command lets you execute commands with superuser privileges as long as your user id is in the sudoers file, giving you the necessary authorization. Enable Root Login and Set Kali Root Password: Check Login User                                                   whoami                                                   sudo apt update       ...

Windows Like Linux

Image
  Windowsfx 11 Windows Like Linux A whole Linux Flavored like Windows 11 Meet The “Unique Linux OS” That Looks Shockingly Similar To “Windows 11” Its a g ateway into “ Linux for Windows users” , or merely an “ Ubuntu clone” with a clever Windows skin ! For the most part, it honestly feels like using Windows 11 until anyone start digging deep into customization menus or the bundled software store. Windowsfx 11 Characteristics: Kernel Linux 5.11 LTS. Base package: Ubuntu 20.04 LTS Neon. Desktop environment: KDE Plasma / Cinnamon / WxDesktop Windows executable support: Fx (build) Wine 6 for .exe and .msi. Tema: Linuxfx WxDesktop Windows 11 Theme. Voice assistants: Helloa and Google. Windowsfx 11 Versions: There are two different versions anyone can use, the free or the professional version .  The free edition includes all operational features and a 30-day trial of  all WxDesktop resources .  The professional edition ($20) includes: All operational features. WxDesktop ...

Wireshark and its Filters

Image
  Powerful Wireshark Filters ip.addr == x.x.x.x ip.src == x.x.x.x ip.dst == x.x.x.x ip.addr == x.x.x.x && ip.addr == x.x.x.x  ip.src == xxxx && ip.dst == xxxx http or dns tcp.port==xxx udp.port==xxx tcp.srcport==80 && tcp.dstport==80 tcp contains xxx e.g.   tcp contains google http.request tcp.port eq 25 or icmp