EvilGinx – how to simulate a Man in the Middle attack?

EvilGinx – how to simulate a Man in the Middle attack?
Phishing has become the most popular vector of attack.Many attackers use the man-in-the-middle technique. This means that the attacker mediates the communication between the user and the server. This tactic, allows the attacker to bypass 2FA authentication with an app, SMS or one-time code. There is software available on the market to simulate such an attack.. One…

PowerShell – detecting and removing unused user profiles

Today I'm going to share a script that detects user profiles on the server that have not been used for a certain number of days (e.g. 60) and deletes them automatically to free up space and keep the server tidy. The script is run on a Windows server. You can customize the number of days after which…

Christmas cleaning – take care of your devices

Christmass time is a time of reflection, tidying up, and preparing for the new year. So why limit cleaning to your home? In the digital age, our devices are as important a part of daily life as the physical spaces we occupy. This is the perfect moment to organize your digital world. Doing so will improve data…

10 tips to avoid being scammed during holiday online shopping

The Christmass season is a time of joy, but it’s also a period of intense preparations, including shopping for gifts. More and more people turn to online shopping for convenience and time savings. Unfortunately, this season is also a prime opportunity for scammers who exploit our inattention and the pressure of holiday deadlines. So, how can you…

PowerShell – summary system report

I present to you a PowerShell script that uses can be useful for monitoring system resources and checking the current configuration. The script saves the data in a table and generates a diagnostic report, which is useful for administering larger environments or analyzing problems. This script does: CPU and RAM monitoring Analysis of free disk space. Verification…

Ideas for unique gifts related to cyber security – part 2

Another set of gift ideas for your Christmass shopping 1. SSD with built-in hardware encryption For whom? For individuals storing sensitive data, from business documents to family photos.Why? Drives like the Samsung T7 Touch, equipped with AES 256-bit encryption and a fingerprint reader, offer both fast access and enhanced security. 2. USB password generator For whom? For…

Ideas for unique gifts related to cyber security – part 1

Christmas is getting closer and closer, and if you want to surprise your loved ones with something unconventional, practical and…. secure, I've prepared a list of cyber security inspirations. These ideas are unusual, but sure to be appreciated by technology fans and privacy-minded individuals. 1. Hardware U2F/FIDO2 key - YubiKey For whom? For anyone who uses online…

How to use Microsoft Secure Score to assess Office 365 security?

Microsoft Secure Score is a tool developed by Microsoft and designed to help organizations assess and improve the level of security in the Office 365 environment. It is an indicator of the level of security of our tenant and can be considered as a guide that indicates the actions to be taken to improve security. What is…

How to check if a link is safe? Practical tips

Every day, we receive countless emails and browse many websites – this has become a norm. However, with this convenience also comes risk. Links can lead to malicious websites, viruses, or even phishing attempts. So, how can you check if a link you're about to click is safe? In this article, we'll discuss several practical steps to…

PowerShell – script for monitoring website availability

PowerShell – script for monitoring website availability
Sometimes we want to know the availability of web applications. To do this, we need a system that will query specific addresses at regular intervals. But what if such a system doesn't exist, and we need to verify it for testing purposes? I’ve prepared a short and simple script for such needs, which, given a list of…