Veitias Social Network Club Veitias Social Network Club
Search Results
See All Results
  • Join
    Sign In
    Sign Up
    Search

Search

Discover new people, create new connections and make new friends

  • News Feed
  • EXPLORE
  • Pages
  • Groups
  • Events
  • Blogs
  • Marketplace
  • Funding
  • Offers
  • Jobs
  • Movies
  • Games
  • Developers
  • Posts
  • Articles
  • Users
  • Pages
  • Groups
  • Events
  • Nandini Verma
    2025-11-07 06:23:23 - Translate -
    How Hackers Gather Data | Footprinting Explained Step-by-Step

    In this video, we’ll walk you through:
    What is Footprinting and why it’s important
    Passive vs Active Footprinting
    Common tools like Whois, NSLookup, Maltego, and Shodan

    Watch Here: https://youtu.be/UnCtcMCcSPE?si=hDbFlcU4Rg72nLu7

    #Footprinting #EthicalHacking #InformationGathering #CyberSecurityAwareness #Reconnaissance #InfosecTrain #OSINT #HackingTechniques #CyberSecurityTraining #PenetrationTesting
    How Hackers Gather Data | Footprinting Explained Step-by-Step In this video, we’ll walk you through: βœ… What is Footprinting and why it’s important βœ… Passive vs Active Footprinting βœ… Common tools like Whois, NSLookup, Maltego, and Shodan Watch Here: https://youtu.be/UnCtcMCcSPE?si=hDbFlcU4Rg72nLu7 #Footprinting #EthicalHacking #InformationGathering #CyberSecurityAwareness #Reconnaissance #InfosecTrain #OSINT #HackingTechniques #CyberSecurityTraining #PenetrationTesting
    0 Comments 0 Shares 6778 Views 0 Reviews
    Please log in to like, share and comment!
  • Nandini Verma
    2025-03-04 06:56:00 - Translate -
    Advanced Penetration Testing: A Deep Dive - Master the Art of Ethical Hacking! [1/2]

    π€π πžπ§ππš 𝐟𝐨𝐫 𝐭𝐑𝐞 𝐌𝐚𝐬𝐭𝐞𝐫𝐜π₯𝐚𝐬𝐬
    𝐏𝐚𝐫𝐭 𝟏 : π’πœπ«π’π©π­π’π§π  𝐟𝐨𝐫 π‡πšπœπ€πžπ«π¬
    Understanding the bash environment
    Introduction to variables
    Using functions
    Creating scripts to automate the tasks like scanning

    Watch Here: https://www.youtube.com/watch?v=Jtysh1hPduQ

    #EthicalHacking #PenetrationTesting #CyberSecurityTips #AdvancedHacking #HackingTechniques #EthicalHackerGuide #VulnerabilityExploitation #PenTestingMastery #infosectrain
    Advanced Penetration Testing: A Deep Dive - Master the Art of Ethical Hacking! [1/2] ➑️ π€π πžπ§ππš 𝐟𝐨𝐫 𝐭𝐑𝐞 𝐌𝐚𝐬𝐭𝐞𝐫𝐜π₯𝐚𝐬𝐬 𝐏𝐚𝐫𝐭 𝟏 : π’πœπ«π’π©π­π’π§π  𝐟𝐨𝐫 π‡πšπœπ€πžπ«π¬ πŸ‘‰ Understanding the bash environment πŸ‘‰ Introduction to variables πŸ‘‰ Using functions πŸ‘‰ Creating scripts to automate the tasks like scanning Watch Here: https://www.youtube.com/watch?v=Jtysh1hPduQ #EthicalHacking #PenetrationTesting #CyberSecurityTips #AdvancedHacking #HackingTechniques #EthicalHackerGuide #VulnerabilityExploitation #PenTestingMastery #infosectrain
    0 Comments 0 Shares 17650 Views 0 Reviews
    Please log in to like, share and comment!
  • Infosec Train
    2025-02-26 07:49:49 - Translate -
    Advanced Penetration Testing: A Deep Dive—Master the Art of Ethical Hacking! [1/2]

    Advanced Penetration Testing: A Deep Dive (Part 1)—Master the Art of Ethical Hacking!" In this first part of the series, you will uncover expert tips, methods, and tools used by professional ethical hackers to assess and secure systems.

    Watch Now: https://www.youtube.com/watch?v=Jtysh1hPduQ

    #EthicalHacking #PenetrationTesting #CyberSecurityTips #AdvancedHacking #HackingTechniques #EthicalHackerGuide #CyberThreats #NetworkSecurity #VulnerabilityExploitation #PenTestingMastery
    Advanced Penetration Testing: A Deep Dive—Master the Art of Ethical Hacking! [1/2] Advanced Penetration Testing: A Deep Dive (Part 1)—Master the Art of Ethical Hacking!" In this first part of the series, you will uncover expert tips, methods, and tools used by professional ethical hackers to assess and secure systems. Watch Now: https://www.youtube.com/watch?v=Jtysh1hPduQ #EthicalHacking #PenetrationTesting #CyberSecurityTips #AdvancedHacking #HackingTechniques #EthicalHackerGuide #CyberThreats #NetworkSecurity #VulnerabilityExploitation #PenTestingMastery
    0 Comments 0 Shares 20027 Views 0 Reviews
    Please log in to like, share and comment!
  • Nandini Verma shared a link
    2025-02-20 07:16:50 - Translate -
    Trojan Malware Tactics: Understanding the Key Concepts Behind the Malware

    Read Here: https://www.infosectrain.com/blog/trojan-malware-tactics-understanding-the-key-concepts-behind-the-malware/

    #TrojanMalware #CyberSecurity #MalwareAnalysis #CyberThreats #EthicalHacking #InfoSec #MalwareTactics #TrojanVirus #HackingTechniques #CyberAttack #ThreatIntelligence #CyberDefense #Ransomware #infosectrain
    Trojan Malware Tactics: Understanding the Key Concepts Behind the Malware Read Here: https://www.infosectrain.com/blog/trojan-malware-tactics-understanding-the-key-concepts-behind-the-malware/ #TrojanMalware #CyberSecurity #MalwareAnalysis #CyberThreats #EthicalHacking #InfoSec #MalwareTactics #TrojanVirus #HackingTechniques #CyberAttack #ThreatIntelligence #CyberDefense #Ransomware #infosectrain
    WWW.INFOSECTRAIN.COM
    Trojan Malware Tactics: Understanding the Key Concepts Behind the Malware
    In cybersecurity, understanding the threats is just as important as defending against them. Let’s understand one of the most malicious types of cyber threats: Trojans.
    0 Comments 0 Shares 16749 Views 0 Reviews
    Please log in to like, share and comment!
  • Infosec Train added a photo
    2025-02-04 13:08:55 - Translate -
    HOW DoS ATTACK WORKS?

    As the attack comes from a single source, it is generally easier to identify and block compared to the more complex Distributed Denial of Service (DDoS) attack, which involves multiple sources. The primary goal is to overwhelm and disrupt the system rather than to steal data.

    More Info: https://www.infosectrain.com/blog/demystified-ceh-module-10-denial-of-service-attack/

    #DoSAttack #CyberSecurity #DenialOfService #NetworkSecurity #CyberThreats #DoSPrevention #ThreatMitigation #ITSecurity #HackingTechniques #CyberDefense
    HOW DoS ATTACK WORKS? As the attack comes from a single source, it is generally easier to identify and block compared to the more complex Distributed Denial of Service (DDoS) attack, which involves multiple sources. The primary goal is to overwhelm and disrupt the system rather than to steal data. More Info: https://www.infosectrain.com/blog/demystified-ceh-module-10-denial-of-service-attack/ #DoSAttack #CyberSecurity #DenialOfService #NetworkSecurity #CyberThreats #DoSPrevention #ThreatMitigation #ITSecurity #HackingTechniques #CyberDefense
    0 Comments 0 Shares 10539 Views 0 Reviews
    Please log in to like, share and comment!
  • Infosec Train
    2025-01-28 06:41:56 - Translate -
    Advanced Penetration Testing: A Deep Dive - Master the Art of Ethical Hacking! [1/2]

    Advanced Penetration Testing: A Deep Dive (part 1) - Master the Art of Ethical Hacking!" takes you on a detailed journey into the world of advanced hacking techniques and cybersecurity. In this first part of the series, you will uncover expert tips, methods, and tools used by professional ethical hackers to assess and secure systems

    Watch Now - https://www.youtube.com/watch?v=Jtysh1hPduQ&t=64s

    #EthicalHacking #PenetrationTesting #CyberSecurityTips #AdvancedHacking #HackingTechniques #EthicalHackerGuide #CyberThreats
    Advanced Penetration Testing: A Deep Dive - Master the Art of Ethical Hacking! [1/2] Advanced Penetration Testing: A Deep Dive (part 1) - Master the Art of Ethical Hacking!" takes you on a detailed journey into the world of advanced hacking techniques and cybersecurity. In this first part of the series, you will uncover expert tips, methods, and tools used by professional ethical hackers to assess and secure systems Watch Now - https://www.youtube.com/watch?v=Jtysh1hPduQ&t=64s #EthicalHacking #PenetrationTesting #CyberSecurityTips #AdvancedHacking #HackingTechniques #EthicalHackerGuide #CyberThreats
    0 Comments 0 Shares 8946 Views 0 Reviews
    Please log in to like, share and comment!
  • Nandini Verma
    2025-01-27 05:58:49 - Translate -
    Advanced Penetration Testing: A Deep Dive - Master the Art of Ethical Hacking!

    π€π πžπ§ππš 𝐟𝐨𝐫 𝐭𝐑𝐞 𝐌𝐚𝐬𝐭𝐞𝐫𝐜π₯𝐚𝐬𝐬
    𝐏𝐚𝐫𝐭 𝟏 : π’πœπ«π’π©π­π’π§π  𝐟𝐨𝐫 π‡πšπœπ€πžπ«π¬
    Understanding the bash environment
    Introduction to variables
    Using functions
    Creating scripts to automate the tasks like scanning

    Watch Here: https://www.youtube.com/watch?v=Jtysh1hPduQ&t=64s

    #EthicalHacking #PenetrationTesting #CyberSecurityTips #AdvancedHacking #HackingTechniques #EthicalHackerGuide #CyberThreats #NetworkSecurity #VulnerabilityExploitation #PenTestingMastery #infosectrain
    Advanced Penetration Testing: A Deep Dive - Master the Art of Ethical Hacking! ➑️ π€π πžπ§ππš 𝐟𝐨𝐫 𝐭𝐑𝐞 𝐌𝐚𝐬𝐭𝐞𝐫𝐜π₯𝐚𝐬𝐬 𝐏𝐚𝐫𝐭 𝟏 : π’πœπ«π’π©π­π’π§π  𝐟𝐨𝐫 π‡πšπœπ€πžπ«π¬ πŸ‘‰ Understanding the bash environment πŸ‘‰ Introduction to variables πŸ‘‰ Using functions πŸ‘‰ Creating scripts to automate the tasks like scanning Watch Here: https://www.youtube.com/watch?v=Jtysh1hPduQ&t=64s #EthicalHacking #PenetrationTesting #CyberSecurityTips #AdvancedHacking #HackingTechniques #EthicalHackerGuide #CyberThreats #NetworkSecurity #VulnerabilityExploitation #PenTestingMastery #infosectrain
    0 Comments 0 Shares 13791 Views 0 Reviews
    Please log in to like, share and comment!
  • Nandini Verma shared a link
    2024-03-22 11:09:50 - Translate -
    Types of Network Scanning for Ethical Hacking

    In the world of cybersecurity, ethical hacking plays a crucial role in identifying vulnerabilities and securing systems from potential threats. One of the key techniques used in ethical hacking is network scanning, which involves probing a network to discover active hosts, open ports, and services running on those ports. Understanding the different types of network scanning is essential for ethical hackers to conduct thorough security assessments and protect sensitive information from cyber attacks.

    Read Here: https://medium.com/@Infosec-Train/types-of-network-scanning-for-ethical-hacking-254de2876091

    #NetworkScanningMethods #EthicalHackingTechniques #CybersecurityScans #NetworkSecurity #EthicalHacking101 #NetworkVulnerability #InfoSecScanning #HackersToolkit #PenetrationTesting #SecurityAssessment #CyberDefense ο»Ώ#infosectrainο»Ώ #learntorise
    Types of Network Scanning for Ethical Hacking In the world of cybersecurity, ethical hacking plays a crucial role in identifying vulnerabilities and securing systems from potential threats. One of the key techniques used in ethical hacking is network scanning, which involves probing a network to discover active hosts, open ports, and services running on those ports. Understanding the different types of network scanning is essential for ethical hackers to conduct thorough security assessments and protect sensitive information from cyber attacks. Read Here: https://medium.com/@Infosec-Train/types-of-network-scanning-for-ethical-hacking-254de2876091 #NetworkScanningMethods #EthicalHackingTechniques #CybersecurityScans #NetworkSecurity #EthicalHacking101 #NetworkVulnerability #InfoSecScanning #HackersToolkit #PenetrationTesting #SecurityAssessment #CyberDefense ο»Ώ#infosectrainο»Ώ #learntorise
    MEDIUM.COM
    Types of Network Scanning for Ethical Hacking
    Network scanning for ethical hacking is essential as it helps identify potential vulnerabilities, misconfigurations, and weaknesses in a…
    0 Comments 0 Shares 16973 Views 0 Reviews
    Please log in to like, share and comment!
  • Nandini Verma shared a link
    2024-02-23 07:31:26 - Translate -
    What is Google Hacking Database (GHDB)?

    Have you ever thought about how much information is out there on the internet? and how it can be accessed, used, and in some cases, misused? The Google Hacking Database is a collection of search queries, also known as Google Dorks, that can be used to find sensitive information exposed on the internet. GHDB is a resource for cybersecurity professionals and ethical hackers to uncover sensitive information. It provides search queries and techniques to find publicly accessible data.

    Read Here: https://infosec-train.blogspot.com/2023/12/what-is-google-hacking-database-ghdb.html

    #GHDB #GoogleHackingDatabase #InfoSecResearch #GoogleDorking #GoogleHacking #WebSecurity #CyberSecurity #OSINT #OpenSourceIntelligence #GoogleQueries #InfoSecTools #GHDBExplained #DigitalSecurity #TechHacking #SearchQueries #WebVulnerabilities #HackingTechniques #SecurityResearch #TechDiscovery #InfoSecInsights #GoogleSearch #CyberAwareness #ExploitationTesting #infosectrain #learntorise
    What is Google Hacking Database (GHDB)? Have you ever thought about how much information is out there on the internet? and how it can be accessed, used, and in some cases, misused? The Google Hacking Database is a collection of search queries, also known as Google Dorks, that can be used to find sensitive information exposed on the internet. GHDB is a resource for cybersecurity professionals and ethical hackers to uncover sensitive information. It provides search queries and techniques to find publicly accessible data. Read Here: https://infosec-train.blogspot.com/2023/12/what-is-google-hacking-database-ghdb.html #GHDB #GoogleHackingDatabase #InfoSecResearch #GoogleDorking #GoogleHacking #WebSecurity #CyberSecurity #OSINT #OpenSourceIntelligence #GoogleQueries #InfoSecTools #GHDBExplained #DigitalSecurity #TechHacking #SearchQueries #WebVulnerabilities #HackingTechniques #SecurityResearch #TechDiscovery #InfoSecInsights #GoogleSearch #CyberAwareness #ExploitationTesting #infosectrain #learntorise
    INFOSEC-TRAIN.BLOGSPOT.COM
    What is Google Hacking Database (GHDB)?
    In an age where data is highly valuable, knowing how our digital footprints or online activities can be monitored or how our data can be acc...
    0 Comments 0 Shares 18827 Views 0 Reviews
    Please log in to like, share and comment!
© 2026 Veitias Social Network Club English
English Arabic French Spanish Portuguese Deutsch Turkish Dutch Italiano Russian Romaian Portuguese (Brazil) Greek
About Terms Privacy Contact Us Directory