Wednesday, January 24, 2018
Zenmap GUI

How to use nmap for network mapping

Nmap (Network Mapper) is a free and open source utility for network discovery and security audit. It is useful for network inventory, managing services, and host. It uses RAW IP packets...
hashing

Importance of Hashing in digital forensics

In an investigation, everything you have done must be able to be replicated by another person, and this is done via hashing.Hashing refers to the use of hash functions to verify that...
xss payload

How to XSS with file upload functionality

Sometimes file upload functionality is vulnerable to XSS attack if there is a lack of sanitization. User restricted area with an uploaded image or profile picture is everywhere, providing more chances...
Pentesting

Pentesting Tools You Will Ever Need

One of the best ways for businesses and corporations to defend themselves is through Penetration (Pentesting). This article will provide an overview of what Pen Testing is, its benefits, and the...
Burpsuite CSRF attack

How to use non csrf token forms for DDOS

Web applications not using Anti csrf tokens may lead to denial of service attack. Yes, it is possible! With the help of intruder functionality in burp suite, it is possible to...
twitter

Twitter other application clients for android

For a long time, twitter android client just wasn't very good compared to its iOS Client. So it is best to use third party twitter clients for best use. Even though...
chrome flag

Chrome flags and Chrome urls – Part 2

Welcome to fun with chrome flags. In a previous post, I've discussed six flags which are used as per the need. Here I'll explain few settings to enhance the security of the...
dsploit

Android application every penetration tester should rely on

hello, Here we're gonna discuss android applications that can be used as a penetration testing or security auditing (APK) tools. It is very important to know about the android application hacking...
Veracrypt

Veracrypt for windows system drive encryption

VeraCrypt is a software for establishing and maintaining an on-the-fly-encrypted volume (data storage device). No data stored on an encrypted volume can be read (decrypted) without using the correct password/key file(s)...
RIPS

RIPS static source code analyser for PHP web applications

RIPS is a static code analysis tool to automatically detect vulnerabilities in a PHP web application. By parsing all source files RIPS is able to transform PHP source code into a...

LATEST NEWS

MUST READ