Ethical Hacking

Surface of Ethical Hacking

In 1st week, I learned the surface of ethical hacking. Before you dive into the world of hacking, we must first learn the common terms used in ethical hacking, such […]

Burp Suite Digital Certificate

This is my second project which demonstrates MiTM attack using a tool called Burp Suite. It utilizes a forged SSL to eavesdrop victim’s requested contents. The outline of this project […]

TCPdump Attack

This is my first project which demonstrates how to do eavesdropping attack using tcpdump method. tcpdump is a command line network sniffer, used to capture network packets. When you have […]