Top

Naushad CEH, CHFI, MTA, ITIL

InfoSec (MSc, Ph.D Student) I am an IT Security Professional with expertise in Cyber Security Operations, Cyber Defence, Malware Analysis, Threat Analysis, Incident Response, 0-Day Hunter and Forensic investigator [SOC TeamLead]

About me

About Me

I am a senior Cyber Security leader, an advocate of Cyber Criminology and understands the motives of a hackers strategy and response methodologies. I’m a highly motivated security specialist with a consistent record of going the extra mile to meet objectives with demonstrable experience to effectively detect, prevent, and respond to cyber threats against infrastructures.

43 65 72 74 69 66 69 65 64 20 45 74 68 69 63 61 6c 20 48 61 63 6b 65 72

|-Red Team-|-SOC Lead-|

|| Computer Forensic Analyst || Information Security Analyst || Vulnerability Detective || Network Examiner || Digital Data Interpreter ||
|| Digital Intelligence Tactical Solutions Developer || Cyber Criminology || Criminal Science ||

-CV-INFOSEC

Geek Traits

My first web designing team was formed in 1997. I started my first web development of Web Directories, Forums, Blogs, E-commerce, CMS and Static & Dynamic websites using multiple programming languages such as HTML, PHP, Python, JSP, ASP, C++ and Macromedia Flash etc. As a webmaster, I taught my web development team how to securely build websites using STLC (Software Testing Life Cycle) methodology and how it should be implemented from the foundation of any code building.

Code reviewing practice was the core of my web design principle and I had a special interest in networking and infrastructure security. As a versatile individual with extensive experience of vulnerability detection, prevention and incident response in all areas of the web domain including in-house web hosting infrastructure, all hands-on.

MyCV

MyCV

I am not desperate to leave my current job but am keeping my eyes out for new opportunities.: |=See more=|

I am not desperate to leave my current job but am keeping my eyes out for new opportunities.: |=See more=|

3C 70 20 63 6C 61 73 73 3D 22 70 31 22 3E 49 20 61 6D 20 6E 6F 74 20 64 65 73 70 65 72 61 74 65 20 74 6F 20 6C 65 61 76 65 20 6D 79 20 63 75 72 72 65 6E 74 20 6A 6F 62 20 62 75 74 20 61 6D 20 6B 65 65 70 69 6E 67 20 6D 79 20 65 79 65 73 20 6F 75 74 20 66 6F 72 20 6E 65 77 20 6F 70 70 6F 72 74 75 6E 69 74 69 65 73 2E 3A 20 3C 61 20 68 72 65 66 3D 22 68 74 74 70 73 3A 2F 2F 77 77 77 2E 6E 61 75 73 68 61 64 2E 63 6F 2E 75 6B 2F 6D 79 63 76 2F 22 3E 7C 3D 53 65 65 20 6D 6F 72 65 3D 7C 3C 2F 61 3E 3C 2F 70 3E
3C 70 20 63 6C 61 73 73 3D 22 70 31 22 3E 49 20 61 6D 20 6E 6F 74 20 64 65 73 70 65 72 61 74 65 20 74 6F 20 6C 65 61 76 65 20 6D 79 20 63 75 72 72 65 6E 74 20 6A 6F 62 20 62 75 74 20 61 6D 20 6B 65 65 70 69 6E 67 20 6D 79 20 65 79 65 73 20 6F 75 74 20 66 6F 72 20 6E 65 77 20 6F 70 70 6F 72 74 75 6E 69 74 69 65 73 2E 3A 20 3C 61 20 68 72 65 66 3D 22 68 74 74 70 73 3A 2F 2F 77 77 77 2E 6E 61 75 73 68 61 64 2E 63 6F 2E 75 6B 2F 6D 79 63 76 2F 22 3E 7C 3D 53 65 65 20 6D 6F 72 65 3D 7C 3C 2F 61 3E 3C 2F 70 3E
Decrypt
Hail MaryToolkit

Hail MaryToolkit

My Hail Mary toolkit have 3 type of attack mode (Research work ongoing) Attack mode 1: Will able to break WPA2 encryption scheme. Key to the kingdom is to tricking the 4-way handshake, This is achieved by manipulating and replaying cryptographic handshake messages in a fundamental way. Attack mode 2: Detect Long-range RFID’s over 100-120m. Attack mode 3: Long-range scanner for contactless smart card (Its embedded integrated circuits can store (and sometimes process) data and communicate with a terminal via 13.56-MHz)

WannaCry Ransomware

WannaCry Ransomware

I am proud to have co-authored this book. Wannacry Ransomware Crowd Source Intelligence, A free resource created by the global cyber community and This is not the end but rather just the beginning of life-impacting cyber attacks. To download this document and to keep abreast of such initiatives and continue receiving reports and guidance papers please Download here

Cyber Immune System

Darktrace Experience

Darktrace is a world leader in Enterprise Immune System technology for cyber security. Using new machine learning techniques based on the biological principles of the human immune system, Darktrace addresses the challenge of detecting previously unidentified cyber threats, irrespective of their origin.

What Is Red Teaming?

What Is Red Teaming?

Defined loosely, red teaming is the practice of viewing a problem from an adversary or competitor’s perspective. The goal of most red teams is to enhance decision making, either by specifying the adversary’s preferences and strategies or by simply acting as a devil’s advocate. Red Team provides a more realistic picture of the security readiness than exercises, role playing, or announced assessments. The Red Team may trigger active controls and countermeasures within a given operational environment.
Defined loosely, red teaming is the practice of viewing a problem from an adversary or competitor’s perspective. The goal of most red teams is to enhance decision making, either by specifying the adversary’s preferences and strategies or by simply acting as a devil’s advocate. Red Team provides a more realistic picture of the security readiness than exercises, role playing, or announced assessments. The Red Team may trigger active controls and countermeasures within a given operational environment.
44 65 66 69 6E 65 64 20 6C 6F 6F 73 65 6C 79 2C 20 72 65 64 20 74 65 61 6D 69 6E 67 20 69 73 20 74 68 65 20 70 72 61 63 74 69 63 65 20 6F 66 20 76 69 65 77 69 6E 67 20 61 20 70 72 6F 62 6C 65 6D 20 66 72 6F 6D 20 61 6E 20 61 64 76 65 72 73 61 72 79 20 6F 72 20 63 6F 6D 70 65 74 69 74 6F 72 E2 80 99 73 20 70 65 72 73 70 65 63 74 69 76 65 2E 20 54 68 65 20 67 6F 61 6C 20 6F 66 20 6D 6F 73 74 20 72 65 64 20 74 65 61 6D 73 20 69 73 20 74 6F 20 65 6E 68 61 6E 63 65 20 64 65 63 69 73 69 6F 6E 20 6D 61 6B 69 6E 67 2C 20 65 69 74 68 65 72 20 62 79 20 73 70 65 63 69 66 79 69 6E 67 20 74 68 65 20 61 64 76 65 72 73 61 72 79 E2 80 99 73 20 70 72 65 66 65 72 65 6E 63 65 73 20 61 6E 64 20 73 74 72 61 74 65 67 69 65 73 20 6F 72 20 62 79 20 73 69 6D 70 6C 79 20 61 63 74 69 6E 67 20 61 73 20 61 20 64 65 76 69 6C E2 80 99 73 20 61 64 76 6F 63 61 74 65 2E 20 52 65 64 20 54 65 61 6D 20 70 72 6F 76 69 64 65 73 20 61 20 6D 6F 72 65 20 72 65 61 6C 69 73 74 69 63 20 70 69 63 74 75 72 65 20 6F 66 20 74 68 65 20 73 65 63 75 72 69 74 79 20 72 65 61 64 69 6E 65 73 73 20 74 68 61 6E 20 65 78 65 72 63 69 73 65 73 2C 20 72 6F 6C 65 20 70 6C 61 79 69 6E 67 2C 20 6F 72 20 61 6E 6E 6F 75 6E 63 65 64 20 61 73 73 65 73 73 6D 65 6E 74 73 2E 20 54 68 65 20 52 65 64 20 54 65 61 6D 20 6D 61 79 20 74 72 69 67 67 65 72 20 61 63 74 69 76 65 20 63 6F 6E 74 72 6F 6C 73 20 61 6E 64 20 63 6F 75 6E 74 65 72 6D 65 61 73 75 72 65 73 20 77 69 74 68 69 6E 20 61 20 67 69 76 65 6E 20 6F 70 65 72 61 74 69 6F 6E 61 6C 20 65 6E 76 69 72 6F 6E 6D 65 6E 74 2E
44 65 66 69 6E 65 64 20 6C 6F 6F 73 65 6C 79 2C 20 72 65 64 20 74 65 61 6D 69 6E 67 20 69 73 20 74 68 65 20 70 72 61 63 74 69 63 65 20 6F 66 20 76 69 65 77 69 6E 67 20 61 20 70 72 6F 62 6C 65 6D 20 66 72 6F 6D 20 61 6E 20 61 64 76 65 72 73 61 72 79 20 6F 72 20 63 6F 6D 70 65 74 69 74 6F 72 E2 80 99 73 20 70 65 72 73 70 65 63 74 69 76 65 2E 20 54 68 65 20 67 6F 61 6C 20 6F 66 20 6D 6F 73 74 20 72 65 64 20 74 65 61 6D 73 20 69 73 20 74 6F 20 65 6E 68 61 6E 63 65 20 64 65 63 69 73 69 6F 6E 20 6D 61 6B 69 6E 67 2C 20 65 69 74 68 65 72 20 62 79 20 73 70 65 63 69 66 79 69 6E 67 20 74 68 65 20 61 64 76 65 72 73 61 72 79 E2 80 99 73 20 70 72 65 66 65 72 65 6E 63 65 73 20 61 6E 64 20 73 74 72 61 74 65 67 69 65 73 20 6F 72 20 62 79 20 73 69 6D 70 6C 79 20 61 63 74 69 6E 67 20 61 73 20 61 20 64 65 76 69 6C E2 80 99 73 20 61 64 76 6F 63 61 74 65 2E 20 52 65 64 20 54 65 61 6D 20 70 72 6F 76 69 64 65 73 20 61 20 6D 6F 72 65 20 72 65 61 6C 69 73 74 69 63 20 70 69 63 74 75 72 65 20 6F 66 20 74 68 65 20 73 65 63 75 72 69 74 79 20 72 65 61 64 69 6E 65 73 73 20 74 68 61 6E 20 65 78 65 72 63 69 73 65 73 2C 20 72 6F 6C 65 20 70 6C 61 79 69 6E 67 2C 20 6F 72 20 61 6E 6E 6F 75 6E 63 65 64 20 61 73 73 65 73 73 6D 65 6E 74 73 2E 20 54 68 65 20 52 65 64 20 54 65 61 6D 20 6D 61 79 20 74 72 69 67 67 65 72 20 61 63 74 69 76 65 20 63 6F 6E 74 72 6F 6C 73 20 61 6E 64 20 63 6F 75 6E 74 65 72 6D 65 61 73 75 72 65 73 20 77 69 74 68 69 6E 20 61 20 67 69 76 65 6E 20 6F 70 65 72 61 74 69 6F 6E 61 6C 20 65 6E 76 69 72 6F 6E 6D 65 6E 74 2E
Decrypt
Fifty Shades of Grey PenTest Lab

Fifty Shades of Grey PenTest Lab

It is an art to performing a pen-test. There are various penetration testing methods available. Pen-testing should be an integral part of product SDLC cycle, and You need an Integrated Penetration Testing Tools and a Lab, ReadMore: CyberLab

It is an art to performing a pen-test. There are various penetration testing methods available. Pen-testing should be an integral part of product SDLC cycle, and You need an Integrated Penetration Testing Tools and a Lab, ReadMore: CyberLab

3C 70 20 73 74 79 6C 65 3D 22 74 65 78 74 2D 61 6C 69 67 6E 3A 20 6A 75 73 74 69 66 79 3B 22 3E 49 74 20 69 73 20 61 6E 20 61 72 74 20 74 6F 20 70 65 72 66 6F 72 6D 69 6E 67 20 61 20 70 65 6E 2D 74 65 73 74 2E 20 54 68 65 72 65 20 61 72 65 20 76 61 72 69 6F 75 73 20 70 65 6E 65 74 72 61 74 69 6F 6E 20 74 65 73 74 69 6E 67 20 6D 65 74 68 6F 64 73 20 61 76 61 69 6C 61 62 6C 65 2E 20 50 65 6E 2D 74 65 73 74 69 6E 67 20 73 68 6F 75 6C 64 20 62 65 20 61 6E 20 69 6E 74 65 67 72 61 6C 20 70 61 72 74 20 6F 66 20 70 72 6F 64 75 63 74 20 53 44 4C 43 20 63 79 63 6C 65 2C 20 61 6E 64 20 59 6F 75 20 6E 65 65 64 20 61 6E 20 49 6E 74 65 67 72 61 74 65 64 20 50 65 6E 65 74 72 61 74 69 6F 6E 20 54 65 73 74 69 6E 67 20 54 6F 6F 6C 73 20 61 6E 64 20 61 20 4C 61 62 2C C2 A0 3C 65 6D 3E 52 65 61 64 4D 6F 72 65 3A 3C 2F 65 6D 3E C2 A0 3C 61 20 68 72 65 66 3D 22 68 74 74 70 3A 2F 2F 6E 61 75 73 68 61 64 2E 63 6F 2E 75 6B 2F 70 6F 72 74 66 6F 6C 69 6F 2F 70 65 6E 74 65 73 74 69 6E 67 2D 6C 61 62 2F 22 3E 43 79 62 65 72 4C 61 62 3C 2F 61 3E 3C 2F 70 3E
3C 70 20 73 74 79 6C 65 3D 22 74 65 78 74 2D 61 6C 69 67 6E 3A 20 6A 75 73 74 69 66 79 3B 22 3E 49 74 20 69 73 20 61 6E 20 61 72 74 20 74 6F 20 70 65 72 66 6F 72 6D 69 6E 67 20 61 20 70 65 6E 2D 74 65 73 74 2E 20 54 68 65 72 65 20 61 72 65 20 76 61 72 69 6F 75 73 20 70 65 6E 65 74 72 61 74 69 6F 6E 20 74 65 73 74 69 6E 67 20 6D 65 74 68 6F 64 73 20 61 76 61 69 6C 61 62 6C 65 2E 20 50 65 6E 2D 74 65 73 74 69 6E 67 20 73 68 6F 75 6C 64 20 62 65 20 61 6E 20 69 6E 74 65 67 72 61 6C 20 70 61 72 74 20 6F 66 20 70 72 6F 64 75 63 74 20 53 44 4C 43 20 63 79 63 6C 65 2C 20 61 6E 64 20 59 6F 75 20 6E 65 65 64 20 61 6E 20 49 6E 74 65 67 72 61 74 65 64 20 50 65 6E 65 74 72 61 74 69 6F 6E 20 54 65 73 74 69 6E 67 20 54 6F 6F 6C 73 20 61 6E 64 20 61 20 4C 61 62 2C C2 A0 3C 65 6D 3E 52 65 61 64 4D 6F 72 65 3A 3C 2F 65 6D 3E C2 A0 3C 61 20 68 72 65 66 3D 22 68 74 74 70 3A 2F 2F 6E 61 75 73 68 61 64 2E 63 6F 2E 75 6B 2F 70 6F 72 74 66 6F 6C 69 6F 2F 70 65 6E 74 65 73 74 69 6E 67 2D 6C 61 62 2F 22 3E 43 79 62 65 72 4C 61 62 3C 2F 61 3E 3C 2F 70 3E
Decrypt

Decoding Petya Ransomware

Seems I have a decoder for #Petya, but it works only if the system was not rebooted after the infection. Petya Ransomware eats your hard drives.

Petya ransomware eats your hard drives

p2

Ransomware is evolving — fast. The new versions of ransomware use strong asymmetrical encryption with long keys so that files cannot be decrypted without the key. The bad guys have started using TOR and payments in bitcoins for the sake of staying totally anonymous. And now there is Petya ransomware which in a certain sense encrypts the whole hard drive all at once instead of encrypting files one by one.

Metasploit

Metasploit

PUT YOUR DEFENSES TO THE TEST, OFFENSIVE SECURITY TEAMS

The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development. Knowing the adversary’s moves helps you better prepare your defenses. Metasploit, backed by a community of 200,000 users and contributors, gives you that insight. It’s the most impactful penetration testing solution on the planet. With it, uncover weaknesses in your defenses, focus on the highest risks, and improve your security outcomes.

Cloud Cybersecurity Platform

CloudLock delivers security for any cloud application and platform, including IaaS, PaaS, and IDaaS and orchestrates security across your existing investments. CloudLock is a frictionless solution that protects cloud applications and provides codeless security for custom-built apps. From crowd-sourced security analytics across billions of data points to advanced machine learning, to the data scientist-led CyberLab, CloudLock provides actionable CyberSecurity intelligence across an organization’s entire cloud infrastructure.

BurpSuite Pro

BurpSuite Pro

BurpSuite Pro is an integrated platform for performing security testing of web applications. Its various tools work seamlessly together to support the entire testing process, from initial mapping and analysis of an application’s attack surface, through to finding and exploiting security vulnerabilities.

Arbor DDoS Solutions!

The Evolution of DDoS Attacks
Arbor solutions offer full protection and simplified network management on all interconnected environments. They provide a bigger and better overview, actionnable information and proven protection, ensuring that network threats are detected and neutralised. Availibility of the network is thus guaranteed.

Arbor_Cloud_for_Service_Providers_FINAL

Akamai Intelligent Platform

Akamai Intelligent Platform

Akamai’s content delivery network- CDN is one of the world’s largest distributed computing platforms, Akamai’s Network Operations Command Center (NOCC) is used for proactive monitoring and troubleshooting of all servers in the global Akamai network. The NOCC provides real time statistics of Akamai’s web traffic. The traffic metrics update automatically and provide a view of the Internet traffic conditions on Akamai’s servers and customer websites.
akamai

Elastica CloudSOC platform

Elastica CloudSOC platform

The Elastica CloudSOC platform enables companies to confidently leverage cloud applications and services while staying safe, secure and compliant. Leveraging advanced data science and machine learning, CloudSOC taps real-time user traffic, native SaaS APIs and other data sources to provide a single pane of glass for monitoring and controlling your SaaS apps.

NATO Cyber Defence

NATO Cyber Defence

Cyber Defence Pledge

Cyber threats and attacks are becoming more common, sophisticated and damaging. The Alliance is faced with an evolving complex threat environment. State and non-state actors can use cyber attacks in the context of military operations. In recent events, cyber attacks have been part of hybrid warfare. Read More

InfoSec Events

InfoSec Events

See more about the top security events I have attended. Conferences are important events in almost every industry, giving professionals the opportunity to learn about new developments, get valuable insights from leading experts, and network with other professionals. In few fields do conferences play as important a role as they do in information security. This ever-changing industry places high demands on professionals to stay abreast of the latest best practices, trends, and research findings that impact their day-to-day responsibilities and help them perform at their best. See more

0day Exploit for Windows 10 RCE

Call Offensive Security

Call Offsec they are the very best!..Information Security Training, Ethical Hacking Certifications, Virtual Labs and Penetration Testing Services from Offensive Security, the creators of Kali Linux.

HackTheBOX -Challenge

Hack The Box is an online platform allowing you to test your penetration testing skills and exchange ideas and methodologies with other members of similar interests. It contains several challenges that are constantly updated. Some of them simulating real world scenarios and some of them leaning more towards a CTF style of challenge.

SQL Injection In-Flight Entertainment System

The following videos show real vulnerability tests performed in such a way that they presented no risk.
Potential Impacts:
So how far can an attacker go by chaining and exploiting vulnerabilities in an In-Flight Enterntainment system? There’s no generic response to this, but let’s try to dissect some potential general case scenarios by introducing some additional context (nonspecific to a particular company or system unless stated).

Bypass Credit Card check -In-Flight System

The following videos show real vulnerability tests performed in such a way that they presented no risk.

Cyberlympic ‘Ethical Hacking’ World Championship

Cyberlympic ‘Ethical Hacking’ World Championship

Hackers in the world competed in the Global CyberLympics final during Cyber Security Week in The Hague. This is an international hacking competition aimed at improving the level of national cyber security and strengthening international cooperation. “The competition this year was at the highest level we’ve ever seen due to the relevance of the challenges such as credit card cloning and cryptocurrency mining. The whole event had such amazing energy since it was in the middle of Cyber Security Week here in The Hague. Read More: https://www.naushad.co.uk/2017/10/30/cyberlympic/

GDPR Audit Checklist

GDPR Audit Checklist

The first steps towards GDPR compliance are understanding your obligations, what your current processes are and identifying any gaps. Undertaking a data protection audit is essential to achieving compliance. This checklist is intended to provide a starting point, rather than providing an exhaustive audit. Download full PDF here

More..

Library

Here is my personally built and tested collection of incident response playbook reference guide – first aid tips and preparation guidance to limit damage and protect your mission. A critical principle of medicine applies equally well to cybersecurity incident responses – Do No Harm. Organisations face many pitfalls that can dramatically increase the negative impact of an incident. These guides are designed to help CSIRT (Computer Security Incident Response Team) manage a cybersecurity incident while avoiding common errors, increasing both the effectiveness and efficiency of your incident response efforts.

Blocking Tor proxy

Blocking Tor proxy users to your Linux server, . One of the main reasons is improved security, Here we show a way to make the server appear offline only for Tor users (by sending a TCP RST packet to close the connection). ReadMore

Hacker Business Models

An Inside Look at Business Models of Hackers, The industrialized hackers are intent on one goal--making money. They also know the basic rules of the business of increasing revenues while cutting costs.

Phishing Incident Response

Incident response runbook (aka. playbook, “use case”) is a written guidance for identifying, containing, eradicating and recovering from cyber security incidents.

Defend DDoS Attacks

DDoS attacks are making the headlines but if you architect your infrastructure right at the DNS layer, you can significantly reduce the impact. ReadMore

IT Guys Life in Hell

Pentesting: Exploiting:  how the system reacts to an attack, which weak spots exist that could be breached if any, and what data could be stolen from an active system.

NotPetya Ransomware Outbreak

As I expected, On June 27, several organizations in Europe reported ransomware infecting their systems,!. The Wisdom of Crowds Intelligence Full Report -it's not over yet!

Crowd Sourced Intelligence Doc

WannaCry stopped? No, this is just the beginning. Warm up! Expect more!. Full Report All say that the threat is stopped, but this is untrue. «Kill Switch» only slowed its progress.

MobileSEC Testing Guide

The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security testing and reverse engineering PlayBook

High Performance DoS Analyzer

DOS/DDoS Load Analyser built on top of multiple packet capture engines (NetFlow, IPFIX, sFLOW, SnabbSwitch, Netmap, PF_RING, PCAP).  Detect networks sending/receiving large volumes of packets

Penetration Testing Framework

osA penetration tester’s job is to demonstrate and document a flaw in security. In a normal situation, a pen tester will perform reconnaissance to find some vulnerabilities

SSH Server Auditing: ssh-audit

sshSSH Audit is a tool for ssh server auditing. Features: Banner grab, Detect SSH1 protocol and zlib compression; * gather key-exchange, encryption & message authentication etc..

Search Machine Since: 1999

My Own Search Engine (Crawler / Spider) 1st developed in 1999 for the Data mining, Text search, Large document collections, Media Monitoring, Text analytics & Document Analysis

USB Anti Forensic Tool: USBdeath

Anti-forensic tool that writes udev rules for known usb devices and do some things at unknown usb device insertion or specific usb device removal.

Information Sensitivity Policy

Information-Sensitivity-PolicyThe Information Sensitivity Policy is intended to help employees in determining appropriate technical security measures which are available for electronic

Secure Unified Communication

Unified communications infrastructure threats and defense strategies and cost savings for businesses. White paper written by Naushad and Gabriela 

Securing VoIP

In this White paper I outlined different approaches to VoIP security and best practices to ensure infrastructure security is intact for making VoIP security a reality by Naushad MSc - Assignment

Modern Disaster Recovery Tools

No More Excuses -I'm Building my own a Modern Disaster Recovery toolkit, How to monitor your strategy to alert you to moves, adds, and changes that may break your plan

Avoid the WPA Wireless Attack

The latest crack in wireless security, specifically, the Wi-Fi Protected Access (WPA) security standard, can threaten the safety of enterprise networks and company information or data

Security on Throughput of IEEEE

Effect of Security on Throughput of IEEE802.11b/g Protocols. Opportunistic Encryption (O-E): In this paper, I propose a framework called O-E that uses an acceptable signal to noise ratio.

GDPR will require 28,000 DPOs

European Union data protection rules will require the appointment of 28,000 data protection officers (DPOs) in the next two years in Europe alone, according to a study.

9 Important Fact:Colocation

With applications supporting your key customer interactions and business functions, all aspects of your IT infrastructure must be scrutinised - including your colocation provider.

NMAP DeepDive

Nmap is a great tool for discovering the network services and ports that your server is exposing to the network. In this guide, I will show you some of the hidden features of the NMAP

CCISO Table of Contents

EC-Council’s CCISO Program has certified leading information security professionals around the world. A core group of high-level information security executives

9 Important Fact:Colocation

With applications supporting your key customer interactions and business functions, all aspects of your IT infrastructure must be scrutinised - including your colocation provider.

Top 100 Hacking Books

This list for everyone who is interested in ethical hacking, beginners or professionals both. These top 100 hacking books pdf list is created based on the public reviews given for the books.

Cyberthreat Defence Report

An organization’s own staff is its biggest cyber security weakness, a new survey from CyberEdge Group claims.

Blog

The challenges security managers face never stand still. Threats change, new technologies appear, global conflicts arise, economic cycles drive business change – the trends in each of these areas have a profound and complex impact on successful security strategies. Here is my personal blog will highlight and analyse emerging security trends and discuss new data from worldwide-and-deepweb, government sources, the security community and security events. Find the meaningful events and predictions amidst all the hype and noise.

2018
23 Apr

List of Free Hacking books PDF. Ethical Hacking, Hacking books pdf, Hacking ebooks free download, hacking ebooks collection, Best Hacking eBooks. This list for everyone who is interested in ethical hacking, beginners or professionals both. These top 100 hacking books[…]

26 Mar

Here is my personal collection of IP addresses engaging in abusive behavior on the networks, for webmasters and sysadmins to block IP addresses engaging in abusive behavior on their networks.

25 Mar

Live webinar: http://goo.gl/VVKxS3 Way back in 2000 it was common practice to spend considerable time configuring and tinkering the plumbing of what we today call cyberspace. The technology was embryonic, immature and often hours were spent ensuring nothing broke and[…]

12 Mar

Basic rate-limiting middleware for Express. Use to limit repeated requests to public APIs and/or endpoints such as password reset. A brute-force protection middleware for express routes that rate-limits incoming requests, increasing the delay with each request in a fibonacci-like sequence[…]

7 Feb

The first steps towards GDPR compliance are understanding your obligations, what your current processes are and identifying any gaps. Undertaking a data protection audit is essential to achieving compliance. This checklist is intended to provide a starting point, rather than[…]

2017
30 Oct

Today, the best hackers in the world competed in the Global CyberLympics final during Cyber Security Week in The Hague. This is an international online hacking competition aimed at improving the level of national cyber security and strengthening international cooperation[…]

5 Oct

There is no excerpt because this is a protected post.

26 Sep

Why is Ubuntu desktop download (17.04) redirecting me to a supposedly known malicious domain/mirror? Google Safe Browsing recently detected malware on mirror.scalabledns.com. Websites that are normally safe are sometimes infected with malware. Read More: https://transparencyreport.google.com/safe-browsing/search?url=http:%2F%2Fmirror.scalabledns.com%2Fubuntu-releases%2F17.04%2Fubuntu-17.04-desktop-amd64.iso

29 May

Nmap is a great tool for discovering the network services and ports that your server is exposing to the network. In this guide, we will discuss some basic information, network scanning and advanced techniques covers how to use one of[…]

28 May

The recent WannaCry ransomware attack not only affected computers and billboards but actually impacted human life on a mass scale as hundreds of operations had to be delayed or cancelled. Organisations continue to suffer from external and internal attacks yet[…]

Contact Me

Leave a message

Urgent Enquiries

If need to get in touch urgently, Please contact my emergency help line

Email: hello@naushad.co.uk

Twitter: @Naushad_IT

Skype: Nash_IT

Linkedin Twitter