CyberHunting.com

Welcome to CyberHunting.com web page, a community of security researchers. Providing information related to cyber threat hunting, penetration testing, bug bounty, security awareness and best practices information security.

CyberHunting.com

Publish your Article here.

Sponsors.

Investment News

New Domain For Sale

Latest News

  • University of Chicago Self-Driving Lab Automates Quantum Computing Experiments
    Inside the Self-Driving Lab Revolutionizing Quantum Computing Quantum computing has long been heralded as the next frontier in computational power, promising to solve problems that are intractable for classical machines. Yet, the complexity of setting up, calibrating, and interpreting quantum experiments has slowed down progress. Now, researchers at the University of Chicago are changing the
  • Legendary Long Island Developer Wilbur Breslin Dies at 99
    A Storied Legacy in Real Estate The real estate world mourns the loss of one of its most influential figures: legendary Long Island developer Wilbur Breslin, who passed away peacefully at the age of 99. His remarkable career spanned over half a century, during which he reshaped the suburban landscape of Long Island and redefined
  • How Judges Use AI to Draft Rulings and Prepare Hearings
    Harnessing AI to Streamline Judicial Workflows In recent years, Artificial Intelligence (AI) has transcended its novelty status to become an essential tool in various professional domains. The judiciary is no exception. From drafting rulings to preparing hearings, judges and their clerks are leveraging advanced AI platforms to optimize time-consuming processes, ensure consistency, and manage vast
  • AI-Written Novels: Why Writers Matter More Than Ever
    The Age of AI in Fiction The publishing world is witnessing a profound shift. Advancements in machine learning and natural language processing have given rise to AI-written novels that can draft chapters, develop characters, and even mimic specific authors’ styles. While these innovations generate headlines, they also raise vital questions about the future of storytelling
  • Tulsa’s Utica Square Sold to Real Estate Equity Firm
    Exciting New Ownership for Utica Square in Tulsa In a landmark deal that underscores the resilience and appeal of Tulsa’s premier retail destination, Utica Square has officially been sold to a prominent real estate equity firm. This transaction not only marks a new era for the upscale open-air shopping center but also signals confidence in
Text graphic promoting 'One-Stop Business Funding' from InvestmentCenter.com
Logo for Investment Center featuring the words 'Funding Machine' and a graph with an upward trend on a green background.

Start learning the Penetration Testing Execution Standard (PTEST) and Cyber Kill Chain.

Penetration Testing Execution Standard (PTEST)

  1. Pre-interaction
  2. Intelligence Gathering
  3. Threat Modelling
  4. Vulnerability Assessment
  5. Exploit
  6. Post-exploit
  7. Reporting

Cyber Kill Chain

  1. Reconnaissance
  2. Weaponization
  3. Delivery
  4. Exploitation
  5. Installation
  6. Command and Control
  7. Actions on objectives.

Featured Image by Cristiana Gilardi.

You also should know about the Advanced Persistent Threats (APT) LifeCycle

  1. Define Target
  2. Intelligence Gathering. Reconnaissance, Research Infrastructure, Employee, etc.
  3. Test for detection
  4. Deployment
  5. Establish outbound connection. Efficient, Resilient and Stealth
  6. Exfiltrate Data
  7. Remain un-detected.

Examples of APT Characteristics.

  1. Zero-Day Exploit or a custom crafted malware design for specific target.
  2. Social Engineering is still one of the effective and useful tool to get information about the target.
  3. Low and slow fashion to blend in with normal activities.
  4. Keep in mind APT is for Advanced (special malware), Persistent (repetition and multiple delivery) and Threats ( looking for every vulnerabilities )

Learn simply watching Videos I personally created listed below.

Thank you.

Follow me at Twitter: @KINGnet Web: https://KING.net


Discover more from QUE.com

Subscribe to get the latest posts sent to your email.

Founder & CEO, EM @QUE.COM

Founder, QUE.COM Artificial Intelligence and Machine Learning. Founder, Yehey.com a Shout for Joy! MAJ.COM Management of Assets and Joint Ventures. More at KING.NET Ideas to Life | Network of Innovation

kingdotnet has 2796 posts and counting.See all posts by kingdotnet

One thought on “CyberHunting.com

Leave a Reply

Discover more from QUE.com

Subscribe now to keep reading and get access to the full archive.

Continue reading

Discover more from QUE.com

Subscribe now to keep reading and get access to the full archive.

Continue reading