How to Use nmap to Find Devices on Your Network

Today I will show you how to use nmap to find devices on your network. Knowing which devices are available on a network is the first step to both attacking and defending your systems. It is important to identify unauthorized, or ‘rogue’, devices in order to maintain a high level of network security. Knowing which […]

How to Use John the Ripper

In this article we describe how to crack password hashes with John the Ripper (JtR). It is not unheard of to come across a file containing password hashes during a penetration testing engagement. This can be a gold mine if you can crack the password hashes. John the Ripper is a fantastic tool for ripping […]

How to Create a Kali Linux Bootable Usb

Welcome back to our next tutorial. Today we will be creating a Kali Linux bootable USB. If you would install Kali Linux locally, check out our tutorial on Installing Kali Linux in VirtualBox. Go ahead and start the download as it will take some time on slower connections. Grab the Kali Linux Live ISO from […]

How to Install MySQL on Mac

Welcome back to another SecuringNinja tutorial. No cyber security researcher should be with out a database to practice their skills on, or just to store tons of relational data. Today we will show you how to install MySQL on a Mac. Having a local database is perfect for running websites locally, or for providing persistent […]

7 Types of Cyber Attacks That Could Be Targeting You Right Now!

Welcome back to another informative article by SecuringNinja. Today we will explain the 7 most common types of cyber attacks that cyber criminals use everyday. Fear not, we will also share tips and tricks to protect against these types of cyber attacks.  Cyber criminals are continuously evolving their tactics and coming up with ever more […]

Install Kali Linux in VirtualBox on Mac

Today we cover how to install Kali Linux in Virtualbox on Mac. In the tutorial below we explain all the steps needed to install Kali Linux in VirtualBox on a Mac. We also answer common questions and provide solutions to common problems people face while trying to install Kali Linux in VirtualBox on Mac. After […]

U.S. Prosecutors Charge Chinese Military Officers in 2017 Equifax Breach

United States prosecutors charge 4 Chinese military officers with the 2017 Equifax hacking. The indictment charges the officers with the theft of the personal information of over 148 million individuals. Additionally, the indictment charges them with stealing trade secrets from Equifax servers. Unpatched and Avoidable According to a 2018 study by Congress, “such a breach […]

Fast Flux DNS: What is it? How does it work?

Cyber criminals are using ever sneakier tactics to avoid detection of their botnets and C&C servers. One such tactic botnet masters are using is fast-flux DNS. Fast-flux DNS was originally implemented by the Storm Worm botnet masters in 2007. Since then, numerous malware variants have used fast-flux DNS to avoid detection by the authorities. Fast-flux […]

The Ultimate Resource for the Security Intelligence Community has Launched!

We can not believe the day has finally come! After months in the making we are proud to officially launch the ultimate security blog. Each week will bring you the latest news and updates in cybersecurity, personal security, and the latest cyber breach news. Our team of writers is passionate about security and keeps their […]

Inside a Brute Force Router Takeover

Routers provide access to the Internet for millions of users, but hackers are also using routers to gain access into your home network. In this article I expose the dangers of default credentials by performing a brute force router takeover. Many modern home routers offer a remote management feature, and luckily router manufacturers have stopped […]