Page 138 - Cyber Defense eMagazine for July 2020
P. 138
Encode/Decode
Any and every pentester or hacker would have, with no doubts, faced encoded data in their several
hacking endeavours. Hence several of the most popular encoding/decoding schemes such as Base64,
URL, Brainfuck, JS Obfuscation, etc have been implemented. Encryption using AES(Advanced
Encryption Standard) is also provided as depicted in Fig 6.
Fig 6: AES Encryption
Auxiliary Features/Mechanisms
The several auxiliary mechanisms intertwined are:
● Captcha Breaker
● Strong Password Generator
● File Scanning
● Email Sender
● Time and Weather
● News
● AI you can converse with
Conclusion
At present, Cyber-crimes have emerged more dangerous than ever before, embodying menacing
hackers from all around the globe. It is therefore, high-time that Cyber security is accommodated in the
front seat, enabling us to fight back. The above documented approach of implementation of the security
policies are but a small step in aiding Ethical Hackers. Hopefully, this article succeeded in portraying “a
method” to embrace the countermeasures and security mechanisms.
Cyber Defense eMagazine –July 2020 Edition 138
Copyright © 2020, Cyber Defense Magazine. All rights reserved worldwide.