0
Skip to Content
LayerUpCyber
Blogs
About
Contact
LayerUpCyber
Blogs
About
Contact
Blogs
About
Contact
lex wykes 25/08/2024 lex wykes 25/08/2024

Installing and Using Scapy for Active Reconnaissance in Penetration Testing

Read More
lex wykes 08/08/2024 lex wykes 08/08/2024

Understanding Common Vulnerabilities and Exposures (CVE)

Read More
lex wykes 12/06/2024 lex wykes 12/06/2024

Understanding Aircrack-ng Suite: Installation and Usage

Read More
lex wykes 01/06/2024 lex wykes 01/06/2024

Exploring Netcat: Installation and usage

Read More
lex wykes 01/05/2024 lex wykes 01/05/2024

Exploring Nmap: Installation and Usage

Read More
lex wykes 01/04/2024 lex wykes 01/04/2024

Denial of Service Attacks: Understanding and Mitigating the Threat

Read More
lex wykes 01/03/2024 lex wykes 01/03/2024

Exploring Metasploit: Installation and Usage

Read More
lex wykes 01/02/2024 lex wykes 01/02/2024

Understanding the OWASP Top 10: A Guide for Developers

Read More
lex wykes 01/01/2024 lex wykes 01/01/2024

The Crucial Role of Communication in Penetration Testing

Read More
lex wykes 01/11/2023 lex wykes 01/11/2023

Securing the Internet of Things (IoT): Understanding Vulnerabilities and Mitigation Strategies

Read More
lex wykes 01/08/2023 lex wykes 01/08/2023

Understanding Backdoors: Bind Shells and Reverse Shells

It all begins with an idea.

Read More
lex wykes 01/07/2023 lex wykes 01/07/2023

Understanding Post-Exploitation Tools: Mimikatz, Empire, and BloodHound

It all begins with an idea.

Read More
lex wykes 01/06/2023 lex wykes 01/06/2023

Understanding Social Engineering: Methods and Mitigation

Read More
lex wykes 01/05/2023 lex wykes 01/05/2023

Comparing Microsoft's Defender with other Vulnerability Management Tools

Comparing Microsoft's Defender with Top Industry Vulnerability Management Tools

Read More

LayerUpCyber