Hello Everyone, my name is Rishabh Sharma. I am a cybersecurity consultant. People who are in the cybersecurity domain have crazy minds. They want to use this skill to know more about things that normal people don’t know. They feel it is a power on the internet.

In my college…

What is PII?

Personally Identifiable Information (PII) is the data that could identify a specific person and identity.

What is included in PII?

It includes Personally Identifiable Information, it varies according to your country, but usually include the following:

  • Mobile number
  • Phone number
  • Physical Address
  • Email address
  • Aadhaar number
  • Pan number
  • Salary amount
  • Social security number
  • National ID…

What is sub-domain Enumeration?

Subdomain enumeration is a process of finding subdomains for one or more domains.

Why need sub-domain enumeration?

  • Sub-domain enumeration helps to create a scope of security assessment by revealing domains/sub-domains of a target organization.
  • Sub-domain enumeration increases the chance of finding vulnerabilities.
  • The sub-domain enumeration helps us in finding the web applications that might…

Overview

SMTP Relay Phisher is a tool for testing and exploiting the SMTP Open Relay vulnerability by simulating real-world phishing attacks. This tool used for two purposes:

  1. To run the phishing campaign by command line
  2. To exploit the SMTP Open Relay vulnerability by sending phishing email

This tool used custom SMTP-cli…

Rishabh Sharma

Cyber Security Consultant

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store