Page 138 - Cyber Defense eMagazine for July 2020
P. 138

Encode/Decode

            Any and every pentester or hacker would have, with no  doubts, faced encoded data in their several
            hacking endeavours. Hence several of the most popular encoding/decoding schemes such as Base64,
            URL,  Brainfuck,  JS  Obfuscation,  etc  have  been  implemented.  Encryption  using  AES(Advanced
            Encryption Standard) is also provided as depicted in Fig 6.




















            Fig 6: AES Encryption



            Auxiliary Features/Mechanisms

            The several auxiliary mechanisms intertwined are:

               ●  Captcha Breaker
               ●  Strong Password Generator
               ●  File Scanning
               ●  Email Sender
               ●  Time and Weather
               ●  News
               ●  AI you can converse with



            Conclusion

            At  present,  Cyber-crimes  have  emerged  more  dangerous  than  ever  before,  embodying  menacing
            hackers from all around the globe. It is therefore, high-time that Cyber security is accommodated in the
            front seat, enabling us to fight back. The above documented approach of implementation of the security
            policies are but a small step in aiding Ethical Hackers. Hopefully, this article succeeded in portraying “a
            method” to embrace the countermeasures and security mechanisms.










            Cyber Defense eMagazine –July 2020 Edition                                                                                                                                                                                                                         138
            Copyright © 2020, Cyber Defense Magazine.  All rights reserved worldwide.
   133   134   135   136   137   138   139   140   141   142   143