Wednesday, January 24, 2018
hashing

Importance of Hashing in digital forensics

In an investigation, everything you have done must be able to be replicated by another person, and this is done via hashing.Hashing refers to the use of hash functions to verify that...
Email

Email Security and it’s Simple Explanation

Nearly everyone with a computer uses Email, putting a lot of trust in the technology to keep information as secure as possible. Email security and the privacy of the messages is...
dsploit

Android application every penetration tester should rely on

hello, Here we're gonna discuss android applications that can be used as a penetration testing or security auditing (APK) tools. It is very important to know about the android application hacking...
sqlmap

How to use sqlmap for automated database takeover

With SQLmap you can take over or dump full databases, can escalate privileges, bypass CSRF tokens, can detect XSS. It is very useful for parameter pollution or parameter fuzzing to bypass...
clonezilla

Clonezilla to clone your computer hard drive

There are plenty of backup programs out on the internet to keep your files safe, very few are capable of making an exact copy of your hard drive, complete with passwords,...
chrome flag

Chrome flags and Chrome urls – Part 2

Welcome to fun with chrome flags. In a previous post, I've discussed six flags which are used as per the need. Here I'll explain few settings to enhance the security of the...
twitter

Twitter other application clients for android

For a long time, twitter android client just wasn't very good compared to its iOS Client. So it is best to use third party twitter clients for best use. Even though...

“The Tesla Roadster Is Not the “Fastest Car in the World”

"Fastest" refers to top speed. "Quickest" refers to acceleration. They're different, and nearly everybody is getting it wrong.   Update: This post was originally published when the Tesla Model S P100D with Ludicrous...
Featured image

Chrome flags and Chrome urls – Part 1

As discussed in the previous post go to Chrome OS wiki and Welcome to fun with chrome flags. Many of the Chrome users might not aware of the capability of the chrome...
xss payload

How to XSS with file upload functionality

Sometimes file upload functionality is vulnerable to XSS attack if there is a lack of sanitization. User restricted area with an uploaded image or profile picture is everywhere, providing more chances...

LATEST NEWS

MUST READ