Este artigo foi escrito em contexto universitário.

Esta aplicação está dividida em duas partes. A parte de apresentação do conteúdo (front-end) e a parte que vai buscar o conteúdo (back-end).


Aqui é usado node.js, uma framework de javascript. Está parte está dividida em dois ficheiros, um index e um routes. O index permite que a aplicação seja executada e que vá buscar outros ficheiros como é o caso do routes. O routes.js por sua vez, permite que sejam criados os endpoints com a informação para que esta seja tratada.


Aqui podemos ver o serviço express a ser criado. Este serviço é o que permite que a…

The first step for an hacker to attack a network that he doesn’t know is to make a FootPrint.

What is FootPrinting?

In computer security this technique is used when a hacker wants to gather information about a network or a person. So we can say that this is the pre-attack phase, it’s like homework.

Types of FootPrinting

Hackers may have two approaches: active and passive. In the case of an active approach, they use tools that might trigger the Intrusion Detection System (IDS), for example performing a nmap (ping sweep).

The following article was written for college purposes.

What is Metasploit?

The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development. It is owned by Boston, Massachusetts-based security company Rapid7.

Its best-known sub-project is the open-source Metasploit Framework, a tool for developing and executing exploit code against a remote target machine. Other important sub-projects include the Opcode Database, shellcode archive and related research.

Finding vulnerabilities

Mapping the network

First let’s use nmap to map our network. After you find your IP address I went to metasploit and typed:


This command will store the…

The following article was written for college purposes.

What is Node.js?

Besides what most people think Node isn’t a programming language, it’s actually a Javascript runtime environment that executes JavaScript code outside a web browser.

It’s (mostly) developed in the back-end to create a web page with dynamic content.

What is MVC?

The Model View Controller is a design that divides the application into three main logical components, and we will be using it in this app.

The model is the central component of the pattern. It is the application’s dynamic data structure, independent of the user interface. …

The following article was written for college purposes.

What is Wireshark?

Wireshark is the world’s foremost and widely-used network protocol analyzer. It lets you see what’s happening on your network at a microscopic level and is the de facto (and often de jure) standard across many commercial and non-profit enterprises, government agencies, and educational institutions. Wireshark development thrives thanks to the volunteer contributions of networking experts around the globe and is the continuation of a project started by Gerald Combs in 1998.

What it is used for?

Wireshark is a data capturing program that “understands” the structure (encapsulation) of different networking protocols. …

The following article was written for college purposes.

This tool will help you discover hosts and services on a computer network by sending packets and analyzing the responses. Nmap is not only used for hackers but also by network administrators for tasks such as network inventory or monitoring host or service uptime.

This are some examples how to use this powerful tool:

Host discovery

You can easily map a network and discover how many and which machines are up.

nmap -sP <network>

What is Hadoop?

Apache Hadoop is a collection of open-source software utilities that facilitates using a network of many computers to solve problems involving massive amounts of data and computation. It provides a software framework for distributed storage and processing of big data using the MapReduce programming model. Hadoop was originally designed for computer clusters built from commodity hardware, which is still the common use. It has since also found use on clusters of higher-end hardware. All the modules in Hadoop are designed with a fundamental assumption that hardware failures are common occurrences and should be automatically handled by the framework.

Architecture of a multi-node cluster

A small…

This might be your solution to browse the internet without giving away your identity that easily.

Tor is the most known browser in the game of anonymous browsing, but what if you don’t to give up your favorite browser? Easy!

First step

Install tor and privoxy. Don’t forget to update your Linux first!

sudo apt-get updatesudo apt-get install tor privoxy

Second step

After the installation you have to edit the configuration file located in /etc/privoxy/config.

sudo /etc/privoxysudo nano config

Add this line to the file. This SOCK will connect your requests to the internet.

forward-socks5 /

Bernardo Rocha

Cybersecuity student at Guarda, Portugal.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store