Rahul Jamgade
Member
Member since
Jun 6, 2006
Last active
Aug 18, 2019
Posts contributed
74
Recent posts
-
@rahul-yHGH3D • Oct 26, 2024Oct 26, 20241.7KSeries on Information Security - Weekly -Part 14
Vulnerability scanningA vulnerability is a hole or a weakness which can be a design flaw or an implementation bug, that allows an attacker to... -
@rahul-yHGH3D • Oct 26, 2024Oct 26, 20241.6KSeries on Information Security - Weekly -Part 13
The below mentioned concepts gives insight into how to identify the services and their version running on the servers so that it will help... -
@rahul-yHGH3D • Oct 26, 2024Oct 26, 20241.5KSeries on Information Security - Weekly -Part 12
Back after a long gap of 4 months. Was working on something else. But now ready for weekly details  (No breaks now) .Last... -
@rahul-yHGH3D • Oct 26, 2024Oct 26, 20241.5KSeries on Information Security - Weekly -Part 11
As a part of reconnaissance , one can use the the methods mentioned below. Websites that can be used to collect information is for... -
@rahul-yHGH3D • Oct 27, 2024Oct 27, 20241.3KSeries on Information Security -(Weekly) - Phases of Hacking- Part10
Reconnaissance types can be categorized into two types: Active reconnaissance : The attacker interacts with the system by doing ping weep, port scanning etc.... -
@rahul-yHGH3D • Oct 26, 2024Oct 26, 20241.5KSeries on Information Security -(Weekly) - Phases of Hacking- Part9
Whenever we work on any project such as computer based application development, it will have different phases such as Planning, designing , development, verification,...