Skip to content
Hello Please engage with us
Register Lost Password Log In
Nasni Consultants

Information and Communications Technology Solutions and Engineering Consultancy

  • Home
  • Portfolio
  • Trending Technology News
  • Contact Us
  • Your Feedback
Menu Close
  • Home
  • Portfolio
  • Trending Technology News
  • Contact Us
  • Your Feedback

tips,tools

  1. Home>
  2. tips,tools
Read more about the article SSL/TLS History: Discovering Service Encryption

SSL/TLS History: Discovering Service Encryption

  • Post author:Diran Taofeek Folami
  • Post published:September 17, 2020
  • Post category:Cybersecurity
  • Post last modified:September 17, 2020

Secure socket layers (SSL) and its evolutionary descendant, Transport Level Security (TLS), are the most widely used protocols for ensuring confidentiality among service information exchanges. Despite this fact, their implementation…

Continue ReadingSSL/TLS History: Discovering Service Encryption
Read more about the article dnsmap: an Old-School Network Recon Tool

dnsmap: an Old-School Network Recon Tool

  • Post author:Diran Taofeek Folami
  • Post published:September 8, 2020
  • Post category:Cybersecurity
  • Post last modified:September 8, 2020

Installing Kali Linux or any other pentesting distro reveals the massive amount of tools in today’s infosec landscape that make the work of researchers, analysts and other security professionals easier,…

Continue Readingdnsmap: an Old-School Network Recon Tool
Read more about the article Recon-ng: An Open Source Reconnaissance Tool

Recon-ng: An Open Source Reconnaissance Tool

  • Post author:Diran Taofeek Folami
  • Post published:August 13, 2020
  • Post category:Cybersecurity
  • Post last modified:August 13, 2020

This kind of tool really enhances your toolbox when realizing an attack surface analysis against a desired target. Additionally, it provides a development interface that enables you to create your…

Continue ReadingRecon-ng: An Open Source Reconnaissance Tool
Read more about the article Top 10 Internet Search Engines Used by Hackers

Top 10 Internet Search Engines Used by Hackers

  • Post author:Diran Taofeek Folami
  • Post published:July 14, 2020
  • Post category:Cybersecurity
  • Post last modified:July 14, 2020

Security professionals often need to quickly look up and correlate data during OSINT, reconnaissance, discovering vulnerabilities, finding security breaches in networks, and more. Fortunately, there are search engines in their…

Continue ReadingTop 10 Internet Search Engines Used by Hackers
Read more about the article DMitry: Diving Into an Old-School Information Gathering Tool

DMitry: Diving Into an Old-School Information Gathering Tool

  • Post author:Diran Taofeek Folami
  • Post published:July 9, 2020
  • Post category:Cybersecurity
  • Post last modified:July 9, 2020

Let’s answer these questions today, by running DMitry along with our own SurfaceBrowser™️ enterprise tool. We’ll find out what happens when information is extracted from different sources so they can…

Continue ReadingDMitry: Diving Into an Old-School Information Gathering Tool
Read more about the article Top 30+ Best Blue Team Tools

Top 30+ Best Blue Team Tools

  • Post author:Diran Taofeek Folami
  • Post published:July 2, 2020
  • Post category:Cybersecurity
  • Post last modified:July 2, 2020

After exploring our red team tools and phishing tools collections, it’s time to spend some time in the blue shoes. We have searched, tested and aggregated a list of the…

Continue ReadingTop 30+ Best Blue Team Tools
Read more about the article Attack Surface Analysis: APT “à la carte”

Attack Surface Analysis: APT “à la carte”

  • Post author:Diran Taofeek Folami
  • Post published:June 25, 2020
  • Post category:Cybersecurity
  • Post last modified:June 25, 2020

This picture shows someone’s intentions in broad daylight, but it’s also easy to get information related to an office’s WiFi access points from a stealthier position, let’s say from inside…

Continue ReadingAttack Surface Analysis: APT “à la carte”
Read more about the article Phishing Toolkit: Top 20 Best Phishing Tools

Phishing Toolkit: Top 20 Best Phishing Tools

  • Post author:Diran Taofeek Folami
  • Post published:June 9, 2020
  • Post category:Cybersecurity
  • Post last modified:June 9, 2020

While it’s a well-known concept, we’ve recently seen the growing sophistication of phishing campaigns, making detecting phishing domains harder, increase of spear phishing in APT attacks, and the increasing use…

Continue ReadingPhishing Toolkit: Top 20 Best Phishing Tools


Categories

  • 5G (1,068)
  • Big Data (215)
  • Broadband/ Network (11)
  • Chemical Engineering (11)
  • Cloud Computing (20)
  • Computer Aided Process Equipment Design (1)
  • Contracts Management (1)
  • Cybersecurity (2,353)
  • Emerging Technologies (23)
  • Engineering (2)
  • Environment (184)
  • Fluid Handling and Processing (1,860)
  • GDPR (25)
  • Hospital Management (1)
  • Hotel Management (2)
  • Information Technology (2,981)
  • Innovation (222)
  • Internet of Things (34)
  • IT/Technology General (147)
  • Lifestyle (1,363)
  • Multimedia, Content & Apps (5)
  • Network Management (6)
  • Office Management (2)
  • Online Learning (292)
  • Open Source (1,160)
  • Payroll Management (1)
  • Personnel Management (1)
  • Policy/ Regulatory Reform (1)
  • Process Control (1)
  • Quality Assurance (1)
  • Research & Development (21)
  • Sales Information Management (1)
  • School Records Management (1)
  • Science and Technology (6,487)
  • Smart Cities (10)
  • SMEs/Entrepreneurship (4)
  • Software Development (39)
  • Sustainable Development Goals (1)
  • Technology (2,111)
  • Travel (1)
  • Web Apps Development (110)
  • Website Design and Development (110)

Tags

%G (1037) 5G (1069) AI (78) AI & ML (136) Aircraft (189) A Little Sunshine (306) Apple (158) Architecture (335) Around The Home (63) artificial intelligence (380) Automotive (596) Beverage Industry (130) Bicycles (275) Big Data (223) Big Story (75) Biology (179) Blog (237) Body&Mind (152) Case Studies (431) Cloud (230) cloud security (84) Commentary (76) Company News (180) Consumer Tech (147) CXO (269) Cybersecurity (145) Data Breaches (79) Developer (388) Drones (85) Emerging Trends (71) Energy (161) Environment (168) Ericsson (94) Español (225) Flow Control and Measurement (395) Gas Processing (82) generative ai (76) Good Thinking (84) Google (165) Hardware (106) Health&Wellbeing (304) Home Banner (147) Home Entertainment (136) Huawei (65) Innovation (177) Innovations (611) International (183) Latest Warnings (115) Level Control and Measurement (128) Lifestyle (1306) Linux (90) Marine (117) Market Updates (106) Materials (142) Medical (590) microsoft (313) Military (117) Mobile Technology (94) Mobility (117) Motorcycles (154) Music (82) Ne'er-Do-Well News (204) networking (121) News (448) Oil Processing (67) Open Source (438) Outdoors (312) payroll (125) payroll software (67) Photography (111) Pressure Control and Measurement (79) Process and Control Valves (293) Project Management (134) Pumps and Pumping Systems (386) Radar Trends (64) Ransomware (1665) robotics (155) Science (1987) security (408) Signals (94) Software (826) Space (316) Syndicated (17068) Tech & Work (201) Tech News (320) Technology (1224) The Coming Storm (141) Thought Leaders (78) Time to Patch (78) Tiny Houses (145) Top News (308) Top Products (83) TR Academy (71) Transport (1450) Urban Transport (99) Wastewater Process (120) Water Processing (101) Wearables (124) Web Design (92) Web Fraud 2.0 (128)

Archives

Copyright - WordPress Theme by OceanWP

Copyright © 2025 Nasni Consultants Ltd. All Rights Reserved


This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settings AcceptRead MoreReject
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT