Commit Graph

51 Commits (40c3d9948756a5d0af169b876ba56c891c01f91a)

Author SHA1 Message Date
sjoh29 c267b7029b Added "Hybrid Cryptography" to article (#32898)
Added and defined Hybrid Cryptography
2019-07-03 09:46:10 -05:00
Giovanni G 0931ff6387 added information about Signal (#31151)
Added information regarding the application called Signal
2019-06-27 23:01:28 -07:00
Nils ecc22cc9aa Added tailgaiting as example (#30985)
Added a (short description) of tailgating under the Some examples of Social Engineering hacks, as it is another form of these.
2019-06-25 10:08:48 -07:00
Andrew Mackie 8786caf103 Fixed typos and changed some wording for clarity. (#28926) 2019-06-25 14:40:22 +07:00
Francois ec255f2d80 Add Section and Information on Packet Sniffing. (#27069)
* Create index.md

Basic introduction to Packet Sniffing and simple ways to protect against it.

* fix: made into paragraphs
2019-06-24 15:14:38 -07:00
Josh 76fe08fbdb Added info on nmap and Zenmap (#24718)
* Added info on nmap and Zenmap

Added the text: " (Network Mapper) which is a open source utility to assist with network discovery and security auditing. There is also a  graphical user interface called Zenmap. These are useful tools with functions allowing a user to obtain.."

* fix: closed li element
2019-03-23 17:07:02 -07:00
Josh ca79848de2 Added common cryptographic hash functions (#24722)
Added text: "Some hashing techniques include: SHA (Secure Hash Algorithm), HAVAL, MD5 (message-digest algorithm), TIGER, and Whirlpool."
2019-03-22 15:48:09 +05:30
dannyalexander87 72d9b1c7fc Update index.md (#31358)
only added another example of white hat hackers "pentesters"
2019-03-07 19:14:06 -08:00
jballi17 5f2d8abc24 index.md minor spelling fixes (#31199)
changed "breches" to "breaches"
changed "self-infliced" to "self-inflicted"
changed "understadn" to "understand"
2019-03-07 19:12:43 -08:00
tasosmazis 32f14743e6 edited typos (#29122) 2019-03-07 19:12:20 -08:00
Josh aa82e7f9f3 Added description of the "CIA Triad" (#24707)
Added the text: "The CIA triad is a model used in Information Security to build sound policy. The acronym "CIA" stands for Confidentiality, Integrity, and Availability. These three items are the most important components of security."
2019-03-07 19:10:52 -08:00
The Archangel 1b4ce7e188 Changed bug bounty URL (#27457)
Pointed it back at the guide for the "Bug Bounty" category instead of wikipedia. Will move the wikipedia link to the bug bounty page.
2019-03-04 17:00:01 -08:00
okiwoki 341327281d added two additional attacks (#33881) 2019-02-19 06:50:30 -05:00
ananya a0992342d2 Add text (#29183) 2019-02-19 06:00:19 -05:00
GentlemanlyHippo 0df20f3e79 Add hardware flaws as a way to attack (#26607)
* Add hardware flaws

* Grammar fix
2019-02-19 01:23:45 -05:00
Tim Sparks 7872dda58b change conceling to concealing (#35237) 2019-02-15 17:10:59 -08:00
Lipis 86b8cee810 Replace Github with GitHub (#34971) 2019-02-12 00:46:34 -08:00
okiwoki 82d4496325 Added additional information on bug bounty prizes (#33887) 2019-02-11 16:30:29 -08:00
GentlemanlyHippo 7ce2fe78f2 Expanded what trojan looks like (#26613) 2019-02-05 14:46:41 -05:00
yaganub 81cc40bfee removed "history of the" from line 12 (#23728)
I think it makes it read better. I think path might be a better word than history but you've used that in parentheses as an alternative for route.
2019-01-24 13:38:58 -05:00
Nils 7021d60d5e Added bug bounty links (#30732)
Links to bug bounty program overviews, and a link to githubs own bug bounty ;)
2019-01-18 18:14:59 -06:00
okiwoki 2f596c93f6 Updated some grammer and spelling (#33867) 2019-01-18 17:57:47 -06:00
LuDaBear 14c9b20887 Added More Info (#26690)
Added links to an article on Facebooks ImageMagick Bug Bounty on forbes and to the official Bug Bounty Wikipedia page
2019-01-12 06:39:32 -05:00
GentlemanlyHippo 78488260e8 Fixed usecases to use cases (#26617) 2019-01-08 12:36:36 -05:00
GentlemanlyHippo 9e6a92fc58 added missing space (#26612)
in between network communication(line 15)
2019-01-07 13:57:36 -05:00
Ashwin P a7f37ac240 Added Info on Invisible Internet Project. (#24090)
* Added Info on Invisible Internet Project.

* Used correct formatting and added more information
2019-01-04 23:50:56 -05:00
Piyush Bajaj feb1fe7330 Update index.md (#25083)
* Update index.md

* Fixed heading levels
2018-12-19 03:09:56 -05:00
Josh 6657fa149a Added sentence clarifying legal requirements (#24712)
Added the text: "Penetration testing without authorization is illegal, so it is very important to have this signed agreement before starting any work."
2018-12-16 19:30:31 -05:00
yaganub 21bf1120f7 Updated several lines to make more concise (#24781)
and refine the definitions of the CIA triad. Updated some of the examples under each one as well.
2018-12-13 22:42:21 -05:00
yaganub fa670c8e76 updated line 9 to be more concise (#24761)
added "you can use"
2018-12-13 21:36:01 -05:00
Josh d54116a891 Added additional tools (#24731)
Added the following tools:

6. Maltego
7. Recon-ng
8. Dmitry
9. Sparta
2018-12-13 21:24:12 -05:00
nyp a8e9ec1c9d sentence structure change (#24488) 2018-12-10 18:38:16 -05:00
Seamus b997dd32b5 Update index.md (#27313)
Added just a tad about VPN's
2018-12-05 15:19:03 -08:00
yaganub 6a443a398d Updated to clarify and add list of companies (#24220)
* Updated to clarify and add list of companies

Changed line 7 to read reward instead of money because not all companies offer monetary rewards. Added a section on notable companies and a link to a site that compiles a more extensive list of companies.

* Update index.md
2018-11-26 20:09:04 +00:00
cmachugh2 81ef8c38fd added extra type of cyberattack (#22834) 2018-11-23 04:30:14 +07:00
wh1t3fang 3fec128b4a Add more info about I2p (#21813)
* Add more info about I2p

* Removed stub and fixed formatting
2018-11-18 18:25:10 -05:00
wh1t3fang 8c167bb589 Added info about Squid Proxy (#21971) 2018-11-17 18:23:53 -07:00
wh1t3fang c5bb395362 Added Signal app icon (#21911)
* Added Signal app icon

* changed link to GFM link, used smaller image from wikimedia
2018-11-17 11:49:16 -07:00
Rohith c3d2903d78 Add topic "wireshark feature" (#21460)
* Add topic "wireshark feature"

* corrected casing, spelling, grammar
2018-11-14 06:52:21 -06:00
Rohith ad678a10ce Add the topic "penetration testing tool" to the article (#21240)
short note on kali linux
2018-11-08 11:12:16 +00:00
Nadir Fayazov a949d24271 feat: Add article about VPNs (#20512) 2018-11-01 13:42:08 -04:00
Alexander King 5ddafff633 Fixed grammatical errors (#33115) 2018-11-01 11:35:47 -04:00
sjoh29 a08f252c71 Added 419 Scam for examples in the article (#32987)
Added 419 scams and definition of the examples in the article.
2018-10-31 16:51:45 -05:00
wh1t3fang 119719735d Added information about OONI (#21876)
Added information about Tor efforts to detect network censorship around the world.
2018-10-29 15:15:40 -07:00
Eric Hodges 146e24017a Removed "how" in first paragraph (#20424) 2018-10-29 01:27:49 -04:00
seanakng 56334fd964 Basic information on security tools (#20139)
Added basic information on security tools
2018-10-27 18:00:40 +07:00
Jakub Michalak a740f04bf4 Update security/vpn/index.md (#25594) 2018-10-24 01:28:43 +05:30
Mihirraj Dixit 9094978529 Fix(guide): Add ways to filter packets with tools 2018-10-21 14:30:01 -04:00
Mihirraj Dixit 6648cdcca9 Fix(guide): Add two more protocol attacks 2018-10-21 14:28:42 -04:00
Mihirraj Dixit 25c6fa4044 Added the Industrial Iot Based DDOS attacks (#19020) 2018-10-20 11:02:57 +09:00