Network traffic analysis using Wireshark

September 23, 2021 | Irfan Shakeel
Irfan Shakeel

Irfan Shakeel


Irfan Shakeel is the founder of and creates future cyber security professionals by offering quality cyber security education at EH Academy. You can connect with him on Twitter (@irfaanshakeel) and LinkedIn.

September 23, 2021 | Irfan Shakeel

Network traffic analysis using Wireshark

This blog was written by an independent guest blogger. Network traffic analysis is the routine task of various job roles, such as network administrator, network defenders, incident responders and others. Wireshark plays a vital role during the traffic analysis; it comes pre-installed in many Linux OS’s, for instance, Kali. otherwise, it is available to download from the…

September 14, 2021 | Irfan Shakeel

A guide to OWASP’s secure coding

This blog was written by an independent guest blogger. Modern organizations rely heavily on software and systems. Secure coding standards are significant, as they give some assurance that software installed on the organization’s system is protected from security flaws. These security standards, when used correctly, can avoid, identify, and remove loopholes that might jeopardize software integrity. Furthermore, whether…

August 30, 2021 | Irfan Shakeel

Quantum threat to cryptography and how to overcome this

This blog was written by an independent guest blogger. We are familiar with quantum computing; know that it enables devices to do computations at an utterly inconceivable rate. It facilitates incredible advancements in technology. Ironically, quantum systems can make modern impenetrable cryptography hackable within seconds. Currently, quantum computers pose a high threat to the cryptography that underlies the safety of…

August 18, 2021 | Irfan Shakeel

Practical maritime OSINT

This blog was written by an independent guest blogger. Advancing telecommunications positively affects the maritime industry. The industry is more organized and well-connected; however, the rising technology brings new challenges and vulnerabilities. Although flags and semaphores are still applicable in some cases, most communications are radio-based. Vessel traffic service (VTS) tracks maritime traffic similar to what the air traffic controller…

July 28, 2021 | Irfan Shakeel

5 critical aspects of Attack Surface Management (ASM)

This blog was written by an independent guest blogger. Modern technologies and work flexibilities, such as cloud computing, work-from-anywhere, remote employees connecting to the internal network, and so on, enhance the organizations' operation and provide ease of management. Consequently, they impact the organizations' security controls and introduce additional attack surfaces or opportunities for intruders to attack.  This situation demands…

June 16, 2021 | Irfan Shakeel

How Zero Trust architecture improves the organization’s network security

This blog was written by an independent guest blogger. In the cybersecurity field, Zero Trust is becoming a widely used model. Data breaches taught organizations to stay cautious regarding security, especially when it comes to information protection - and a Zero Trust model may be the best option. Nobody, including clients inside the firewall, should be trusted,  per Zero…

June 8, 2021 | Irfan Shakeel

Magic in Cybersecurity: Magic links to replace the password

This blog was written by an independent guest blogger. These days, magic links are in the air. They are becoming an intriguing means to strengthen digital security without inconveniencing users. This article discusses magic links, their magical function, and their potential benefits for a corporation. Magic links Magic links are authorized URLs that carry a token which grants accessibility to…

April 6, 2021 | Irfan Shakeel

Use AI to fight AI-powered cyber-attacks

This blog was written by an independent guest blogger "AI is likely to be either the best or worst thing to happen to humanity.” ~Stephen Hawking Cyber-attacks are commonly viewed as one of the most severe risks to worldwide security. Cyber-attacks are not the same as they were five years back in aspects of availability and efficiency. Improved technology…

September 19, 2019 | Irfan Shakeel

Role of Cyber Threat Intelligence Analysts in an Organization

Threat intelligence is evidence-based information, including context, mechanisms, indicators of compromise, implications and actionable advice, about existing or emerging hazards to assets. Threat intelligence allows IT professionals to make decisions and take action accordingly. Historically, intelligence tactics, techniques, and procedures as well as various types of intelligence operations existed long before cyberspace was conceived. Intelligence often seen as “offensive…

March 6, 2019 | Irfan Shakeel

How Does Whonix Make Kali Linux Anonymous & How to Prevent It?

The Internet was not designed with anonymity in mind, but things have changed. Anonymity has become a necessary and legitimate objective in many applications (browsing the internet, chatting, sending instant messages etc.). The main reason for this is that even if traffic is encrypted, only the content is encrypted. It is still possible to know the source and destination of…

January 7, 2019 | Irfan Shakeel

How to Build an Effective Threat Intelligence Team

Cyber threats are rapidly evolving due to broadening motivations behind attacks, and the increased sophistication of attacks themselves. Protecting organizations from cyber threats often requires expertise available outside the organization. For security professionals and executives, threat intelligence is the information that expands your visibility into cyber threats beyond the physical edge of your network. Conducting threat intelligence that is significant…

October 24, 2017 | Irfan Shakeel

Achieving Online Anonymity Using Tails OS

Achieving anonymity while browsing the internet is the main concern for many people; everybody wants to make their communications secure and private. However, few in the world have really achieved this objective and many are still facing difficulties and trying different techniques to achieve online privacy. The InfoSec community has produced various tools and techniques that utilize the TOR network…