Huu Nguyen (Eric)inCyberNIQBlock Malicious Activities using pfSense — part 1 — DNSBL (step by step)This article is the first one in a series about Using pfSense to block malicious activities. This first article will show you how to block…Jul 18, 20211Jul 18, 20211
Huu Nguyen (Eric)inCyberNIQLinux Privilege Escalation with SUID filesHow hackers can gain root access easily by taking advantage of SUID files? Many destructive actions will be taken from there.Jul 1, 20212Jul 1, 20212
Huu Nguyen (Eric)inCyberNIQHow to change MAC address on NIC and start capture the network trafficAs a cybersecurity learner, you may want to play around with your NIC (Network Interface Card) and nearby wireless network. I listed below…Jun 27, 2021Jun 27, 2021
Huu Nguyen (Eric)How to change MAC address on NIC and start capture the network trafficAs a cybersecurity learner, you may want to play around with your NIC (Network Interface Card) and nearby wireless network. I listed below…Jun 14, 20211Jun 14, 20211