Articles on Tools
- Networking A Close Look at PayPal Overpayment Scams That Target Craigslist Sellers PayPal overpayment scams target Craigslist sellers using fake payment notifications that ask victims to wire funds to a third-party "pickup agent." Scammers craft stories about working in rural areas...
- Tools Generating Domain Name Variations Used in Phishing Attacks Phishing attackers register domain names similar to targeted organizations using techniques like bitsquatting, homoglyphs, letter repetition, transposition, and typos. Tools like dnstwist and...
- Malware Conversation With a Tech Support Scammer Tech support scammers use scareware web pages to convince visitors their PCs are infected, then employ consultative sales tactics when victims call for help. Representatives use legitimate remote...
- Malware Analysis Contemplating Malware Vaccination via Infection Markers Some malware checks for infection markers like mutexes, registry keys, or processes to avoid infecting systems twice. Preemptively creating these markers can vaccinate systems against specific...
- Tools Experimenting with Honeypots Using the Modern Honey Network The Modern Honey Network (MHN) simplifies deploying and managing low-interaction honeypots like Cowrie, Dionaea, and Wordpot through a web-based interface. Installing MHN on an inexpensive cloud VM...
- Communication How to Become a Better Technical Writer Strong writing skills are essential for IT professionals because people will judge the quality of technical work based on how well it's communicated. Improving requires deliberate practice through...