Posts

Showing posts from April, 2018

Card Skimming

Image
What does  Card Skimming  mean? Card skimming is the illegal copying of information from the magnetic strips found on credit and debit cards. Card skimming is considered a more direct version of a phishing scam. Store clerks who skim cards may do so by having customers swipe their cards more than once, or by taking the card to another location within the store. Card skimming may also occur when a perpetrator rigs an ATM with a card skimmer. The end result of card skimming is unauthorized access to finances through the technique of illegal copying of debit and credit cards How It Actually WOrks.... Credit card skimming is a type of credit card theft where crooks use a small device to steal credit card information in an otherwise legitimate credit or debit card transaction. When a credit or debit card is swiped through a skimmer, the device captures and stores all the details stored in the card's magnetic stripe. The stripe contains the credit card

NMAP From Beginner To Advance

Image
Network Mapped (Nmap) is a network scanning and host detection tool that is very useful during several steps of penetration testing. Nmap is not limited to merely gathering information and enumeration, but it is also powerful utility that can be used as a vulnerability detector or a security scanner. So Nmap is a multipurpose tool, and it can be run on many different operating systems including Windows, Linux, BSD, and Mac. Nmap is a very powerful utility that can be used to: Detect the live host on the network (host discovery) Detect the open ports on the host (port discovery or enumeration) Detect the software and the version to the respective port (service discovery) Detect the operating system, hardware address, and the software version Detect the vulnerability and security holes (Nmap scripts) Nmap is a very common tool, and it is available for both the command line interface and the graphical user interface. The objective of this article is to create a handbook that co