I want to perform a man in the middle attack in Iot using burpsuite is it possible [closed]
I want to perform a man in the middle attack in Iot using burpsuite for intercepting the traffic between the iot devices and the broker how can I do it
Collaborate Disseminate
I want to perform a man in the middle attack in Iot using burpsuite for intercepting the traffic between the iot devices and the broker how can I do it
What causes credential failure after running a Nexpose scan?
what is the possible solution
Continue reading why am i getting credential failure after running a scan in Nexpose?
What is the solution when a Nexpose discovery scan takes 0 seconds or runs for 0 seconds?
The vulnerability scanning tool(Rapid7) did not scan or pick up any assets.
During my work day, I came upon a website that had a popup that identified the company I work for(basically saying "contact us X company"). This website was never previously visited, cookies were blocked and the company I work fo… Continue reading How can websites fingerprint the company I work for?
I am new to IT certificate world, I have 3 questions that have not found on google yet or not sure:
I am a Software Developer in a NGFW Router company that works on cybersecurity related work(Certificate, TLS, FIPS-CC). I think I am worki… Continue reading CISSP certificate: Is 5 years cybersecurity developer experience count?
In recent weeks I have seen a handful of senior employees in my organization receive a confirmation email from Wester Union for a new account creation. The issue is that none of these users have created a WU account.
I have verified all li… Continue reading Potential Western Union Scam – Account Registration
In the diagram below, I have two options for authenticating into a protected resource. Both options use an Identity & Access Management (IDM) tool (in this case keycloak) to store credentials and present as a JWT once properly authenti… Continue reading Should IDM be private or exposed for app login?
I’m deploying software that is licensed based on uniquely identifiable computer characteristics. I am wondering about the Manufacturer-assigned serial number of an internal fixed hard-disk.
To be clear, I am not referring to the Volume S… Continue reading Manufacturer-assigned hard-disk serial number as licensing ID
I joined a group on groups.io and recently when cleaning my inbox, I checked a whole page as spam including a mail from that group. Seconds later I received an email that my membership to that group was cancelled and got an email to reacti… Continue reading Email groups intruding behavior [closed]
Let me prefix this by saying I am aware of how HTML e-mails can implement trackers and other malicious content, however this question is quite specific.
Consider a service where a company can register its users, and on certain events, an e… Continue reading Are user customizable HTML e-mails secure?