Paolo Ronco
PORTFOLIO
In the increasingly connected world of technology, network and system security is of paramount importance. To ensure the protection of your digital assets, it is essential to understand your network topology and identify potential vulnerabilities. Read more
In today's increasingly digital world, Wi-Fi network security is essential to protect sensitive data and ensure reliable connections. In this article, we'll explore a dangerous attack known as the "Evil Twin" using a captive portal. Read more
In today's increasingly connected world, Wi-Fi network security has become paramount. The growing dependence on internet connectivity has made it essential to protect home and business networks from potential threats. In this article, I will share Read more
Hydra is a penetration testing tool used to test the security of systems and networks. It is designed to conduct brute force attacks and includes password cracking capabilities for various authentication protocols. It is widely used Read more
Developing a website using code requires web programming skills, in-depth knowledge of languages like HTML, CSS, JavaScript, and others, along with familiarity with servers, FTP, and other tools. This detailed guide will walk you through the process. Read more
In the vast landscape of wireless networks, understanding and analyzing the various surrounding networks is crucial to ensuring security and efficiency. Kismet, a widely used wireless network analysis tool, offers detailed and in-depth insights into Wi-Fi networks. Read more
prevent potential threats and vulnerabilities. One of the most valuable resources for assessing and improving the security of a system is Lynis, a powerful and versatile tool for analyzing security on Linux operating systems such as Kali Linux.
What is it? Read more
Integrated into my digital arsenal on Kali Linux, Wireshark has become my trusted companion for exploring network traffic, analyzing communications, and identifying potential threats. This article will explore how I've leveraged Wireshark for security purposes. Read more
In my ongoing journey through the cybersecurity landscape, one formidable weapon I've employed is John the Ripper, a powerful password cracking tool. Integrated into my digital arsenal on Kali Linux, John the Ripper has become Read more
In my technological journey, I have faced intriguing challenges that have tested my cybersecurity skills. Among the most used tools, Metasploitable and Kali Linux have emerged as key pillars in my digital arsenal.
Metasploitable: A Read more