Author: Lipson Thomas Philip

Lipson Thomas Philip is a student of Masters in Network and Information Security at Griffith College, Limerick. He has done an internship in Cyber Cell, Gurugram 2021. His motive is to learn on a daily basis. As somebody said "Never stop learning". You learn new things knowing or unknowingly and as your life changes day by day.

Understanding Custom Domains in Cyberattacks Hackers often register brand‑aligned or innocuous custom domains (like microsoft‑updates‑secure.com) to craft emails that appear legitimate. These domains come with new domain age, untainted reputation, and control over DNS records. Hackers can make emails appear authenticated to filters by setting SPF and DKIM, even in cases where trust has not yet been established. New registries often aren’t on block lists. That fresh status helps these domains slip through spam filters and threat intelligence checks that rely heavily on historical data. Google Workspace Trial Accounts – A Hacker’s Playground The 14-day Google Workspace trial provides attackers…

Read More

NIST Cybersecurity Framework 2.0 is a set of best practices and guidelines designed to help organisations understand, manage, and reduce their cybersecurity risk. It was created by the US National Institute of Standards and Technology (NIST). It’s a go-to framework for any-sized organisation, from small to large, without needing much technical background. For a non-technical business owner, the framework can break down a complex topic into something manageable. For example, the NIST Cybersecurity Framework 2.0 works like a GPS that provides directions to help you reach your destination. In cybersecurity, it provides a step-by-step process for the safety of data…

Read More

In an era where cyber threats are increasingly refined, phishing remains one of the most prevalent and dangerous attack vectors. Gophish is an open-source framework that enables launching phishing campaigns. This framework helps organisations assess their employee’s training effectiveness to determine if they will be successful. The purpose of these programs is to strengthen human defences by testing and training staff members on how to identify and reply to questionable emails. This framework has an MIT license, which allows users to use it for free. From setup to advanced setups, this technical guide covers every aspect of GoPhish to make…

Read More

In the digital age, users increasingly prefer to conduct various activities online, including making friends, shopping, watching movies, and banking. These online facilities offer convenience but also carry a significant risk. One of the main risks is a Phishing attack. Phishing sounds and works exactly like Fishing. But how? Fishing means catching fish. How will it be similar to Phishing? Let me explain…. In Fishing, a person goes to the river and catches fish with a fishing rod. The person will lure the fish using worms as bait attached to the fishing rod. The fish will be hooked on the…

Read More

The Cyber Kill Chain is a step-by-step process for identifying and stopping an attacker’s activity. Lockheed Martin created this framework in 2011. The steps of the Cyber Kill Chain illustrate the duration of advanced persistent threats (APTs) and the sequence of events that unfold. Typically, these types of attacks operate a combination of malware, ransomware, Trojans, spoofing, and social engineering tactics to achieve their objectives. Security teams currently utilize Cyber Kill Chain framework to map threats to specific phases, which enables them to prioritize defenses and identify vulnerabilities. In this article, we outline the framework for each step and explain…

Read More

In cybersecurity, information is essential, and nothing can be done without knowing who the target is. Reader: What kind of information are you talking about?Me: The kind you didn’t know was out there.Reader: Really? So how do I find it?Me: With Google.Reader: Just Google? That simple?Me: Not exactly. It’s called Google Dorking. What is Google Dorking really? You know about Google, a simple search engine. Am I right? You think yes, but it’s about mastering the art of search to narrow down from millions of search results to thousands. Google Dorking is also known as Google Hacking. We will utilize…

Read More

Penetration testing is one of the complex topics in the cyber security world. cURL is a simple and yet powerful tool. This hidden command-line tool is critical for debugging, modifying, and attacking web applications. When applied skillfully, cURL can bypass Web Application Firewalls (WAFs), test authentication mechanisms, manipulate headers, and perform other advanced tasks. This article delves deep into how penetration testers use cURL to outsmart even the most secure defenses. Understanding cURL cURL is a command-line utility used to transfer data from a server to a computer system. This tool supports a range of internet protocols, including HTTP, HTTPS,…

Read More

If you’re just getting started with ethical hacking or network troubleshooting, Nmap should be one of the first tools you master. Nmap, or Network Mapper, is an open-source, very flexible application used by Linux systems and network administrators. It is frequently used for network exploration, security scanning, auditing, and discovering open ports on remote computers.0 Nmap can detect active hosts, operating systems, packet filters, and open ports on distant computers. In this guide, we’ll walk through 30 practical Nmap commands that you can start using right away — with clear explanations so you understand what each one does. Why 28…

Read More

Monitoring and managing disk usage is important for any Linux user, including Windows and Mac users. The traditional du (disk usage) command was available. While the du command was functional, using or checking the disk’s usage was not easy. Now, we have a new way to analyze disk usage using a new tool/command known as ncdu. This command easily finds directories or software, which is hogging space. It doesn’t matter if you’re a system admin, developer, or casual user; this tool can save you time and frustration. This article will walk you through what ncdu is, how it works, and…

Read More

Introduction Splunk’s power lies in its ability to surface data when and where you need it. However, if your home screen is a mess or your preferences aren’t set, you’re wasting time every time you log in. Setting the right home dashboard and preferences is more than convenience—it’s productivity, clarity, and speed. What is the Home App in Splunk? The Home App is the launchpad users see upon logging into Splunk. By default, it might show a generic welcome screen or a list of apps. But it can be customized to display a specific dashboard tailored to your needs. Think…

Read More