The Dark Web is a part of the Internet where a user can anonymously access non-indexed content using various encryption methods. Although the Dark Web is popularly associated with illegal activities, the dark web is also used by the intelligence community, whistleblowers, the media and ordinary citizens whose communication may be controlled or restricted by…
All posts by nehemiahvisionmi
How to protect yourself from ARP spoofing?
There are several tools available to protect against ARP spoofing: Static ARP records are the easiest way to protect against ARP spoofing. This entry is entered manually, preventing the device from automatically changing the ARP cache. Remember, this method can only be used for some records (for example, standard gateway addresses), and client nodes still…
How to get into the Dark Web?
A special browser is required to access the dark web. The most popular are the Tor browser and I2P (Invisible Internet Project), which specializes in anonymous hosting of sites on the Dark Web. After installation, the browser works like a regular web browser. However, the user will not find the desired material immediately. The addresses…
What is ARP spoofing and how to protect yourself from it?
Address Resolution Protocol (ARP) spoofing or ARP spoofing is a network attack that hackers use to intercept data. After carrying out this attack, the attacker tricks the device and intercepts messages. How to protect yourself from such an attack? Let’s figure it out! A little bit about the ARP protocol and its substitution To understand…
Privilege escalation by deleting arbitrary files — and other interesting techniques
If an arbitrary file was deleted on behalf of the NT AUTHORITY\SYSTEM account, we are talking about a system hack and a denial of service incident. This article discusses interesting techniques related to deleting arbitrary files and folders and other seemingly ineffective primitives of file system operation. Difficulties with deleting arbitrary files When deleting arbitrary…