Open in app

Sign In

Write

Sign In

Azhar Ghafoor
Azhar Ghafoor

8 Followers

Home

About

Pinned

A Practical Approach of Phishing Detection Using Email Header

What is phishing? One of the most common attack vectors used by cybercriminals is phishing emails. They might be used to deliver a malicious payload or steal account information from their target. It happens when an attacker poses as a reliable source and convinces the victim to engage with a spoofed email, instant…

Phishing

4 min read

A Practical Approach of Phishing Detection Using Email Header
A Practical Approach of Phishing Detection Using Email Header
Phishing

4 min read


Aug 24, 2022

Effective Subdomain Crawling using Python

Crawling to discover subdomains of any domain If you want to test a website’s security and hack into it, you must be able to examine the whole web application as well as all of the provided capabilities and technologies in order to find a flaw that will allow you to…

Crawling

3 min read

Effective Subdomain Crawling using Python
Effective Subdomain Crawling using Python
Crawling

3 min read


Aug 22, 2022

Installing a Virtual Machine (vmdk) on VMware Workstation

Creating a Workstation virtual machine using existing VMDK virtual disks — The base of this article is very common questions that are what is a virtual machine? why do we use it? how to use it? do we need new hardware resources such as a new laptop, pc or other computer systems to use it? and so on. …

Vmware

5 min read

Installing a Virtual Machine (vmdk) on VMware Workstation
Installing a Virtual Machine (vmdk) on VMware Workstation
Vmware

5 min read


Jun 18, 2022

Deception Systems— An Innovative Honeyed Setup to Catch Adversaries

A geotagging-enabled deception system to increase the number of attackers and attacks by challenging attackers’ skills and by motivating them to come up with new and advanced techniques to bypass decoyed security barriers to seize critical (honeyed) documents, ultimately helping us to understand those new attacks. — According to Attivo Networks, “Deception gives defenders the ability to learn about attackers in the same way attackers try to learn about their targets. Once an organization knows an attacker is in the network, it can observe the attacker’s behaviors and patterns. …

Honeypot

6 min read

Deception Systems— An Innovative Honeyed Setup to Catch Adversaries
Deception Systems— An Innovative Honeyed Setup to Catch Adversaries
Honeypot

6 min read


Jun 4, 2022

Email Stealer — how hackers steal emails from outlook

Stealing all emails from the victim’s machine without leaving any footprints of the attack — AAccording to one projection [1], approximately 3.8 billion email accounts were in use in 2019. The number is expected to exceed half of the global population by 2022, with almost 300 billion emails being transmitted daily. You’ve probably heard of Gmail, Outlook, and Apple Mail. These are all email applications…

Email

3 min read

Email Stealer — how hackers steal emails from outlook
Email Stealer — how hackers steal emails from outlook
Email

3 min read


Apr 27, 2022

Extraction of Emails & Header Information from Outlook in Order to Detect Phishing Attacks

Note: Section-1 of this article described the prerequisites for this topic; please read it before proceeding with this part. Before delving into the practical demonstration of the work, it is necessary to examine the modules that I utilized in this project. This whole procedure is done out on Windows-10 using…

Phishing

4 min read

Extraction of Emails & Header Information from Outlook in Order to Detect Phishing Attacks
Extraction of Emails & Header Information from Outlook in Order to Detect Phishing Attacks
Phishing

4 min read

Azhar Ghafoor

Azhar Ghafoor

8 Followers

Cybersecurity Researcher | Ethical Hacking | Data Analyst

Following
  • Neh Patel

    Neh Patel

  • Adam Geitgey

    Adam Geitgey

  • Mybridge

    Mybridge

  • >>> import python

    >>> import python

See all (14)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams