Wednesday, October 17, 2018

How to use weevely for post-exploitation

Weevely is a stealthy and tiny command line web shell that stimulate terminal like connection. It is designed for remote server administration and penetration testing. This shell is useful for web...
hashing

Importance of Hashing in digital forensics

In an investigation, everything you have done must be able to be replicated by another person, and this is done via hashing.Hashing refers to the use of hash functions to verify that...
sql injection

SQL Injection Walkthrough

The following article will try to help beginners with SQL Injection techniques, to successfully utilize them, and to protect themselves from such attacks. Introduction SQL injection is one of the type of web...

“The Tesla Roadster Is Not the “Fastest Car in the World”

"Fastest" refers to top speed. "Quickest" refers to acceleration. They're different, and nearly everybody is getting it wrong.   Update: This post was originally published when the Tesla Model S P100D with Ludicrous...
Email

Email Security and it’s Simple Explanation

Nearly everyone with a computer uses Email, putting a lot of trust in the technology to keep information as secure as possible. Email security and the privacy of the messages is...
xss payload

How to XSS with file upload functionality

Sometimes file upload functionality is vulnerable to XSS attack if there is a lack of sanitization. User restricted area with an uploaded image or profile picture is everywhere, providing more chances...
RIPS

RIPS static source code analyser for PHP web applications

RIPS is a static code analysis tool to automatically detect vulnerabilities in a PHP web application. By parsing all source files RIPS is able to transform PHP source code into a...
dsploit

Android application every penetration tester should rely on

hello, Here we're gonna discuss android applications that can be used as a penetration testing or security auditing (APK) tools. It is very important to know about the android application hacking...

PlayerUnknown’s Battlegrounds Review

Highlights PUBG is an online multiplayer shooter It's available on PC now and Xbox One next week Technical issues make it less enjoyable than it should be PlayerUnknown’s Battlegrounds, or PUBG as...
syskey

Syskey to secure Security Accounts Management (SAM) database

SysKey is an inbuilt Windows utility that can help you secure the Security Accounts Management or SAM database. It can optionally be configured to require the user to enter the key...

LATEST NEWS

MUST READ