Authentication :: Cybersecurity

When users have stated their identity, it is necessary to validate that they are the rightful owners of that identity. This process of verifying or proving the user’s identification is known as authentication. “Access control process validating that the identity being claimed by a user or entity is known to the system, by comparing one (single-factor or SFA) or more (multi-factor authentication or MFA) factors of identification” Simply put, authentication is a process to prove the identity of the requestor....

December 26, 2022 Â· 2 min Â· 0xShakhawat

Hack The MAC Address

MAC address is stands Media Access Control Address It ensures that the physical address of the Computer is unique. MAC spoofing is a technique for changing a factory-assigned Media Access Control (​MAC) address of a network interface on a networked device. It’s just like taking over someone else’s identity and performing action by impersonating them. MAC Spoofing plays a major role when it comes to network hacking. MAC spoofing helps you overtake the identity of some other device in the network and plays a major role in one of the most dangerous attacks called Man-in-the Middle....

February 3, 2022 Â· 6 min Â· 0xShakhawat