List of all HTTP Server Response Codes – 2017 Updated List

When you visit a web page, your computer’s web browser communicates with the web server of the website. Your web browser, also known as the client, submits a request to the web server…

Read more

SQLiv – Massive SQL Injection Scanner

SQL injection is one of the most prominent vulnerabilities for web-based applications. In last article, we’ve used viSQL through which we scanned the whole server for SQL Injection vulnerabilities with the help of…

Read more

Hack Windows/Linux using ARCANUS Framework – 100% FUD

ARCANUS is a customized payload generator/handler for penetration testing only. You can easily generate a payload for both OS i.e. Windows and Linux distributions with just a single click. The latest version of…

Read more

OWASP VBScan – A Black Box vBulletin Vulnerability Scanner

vBulletin is a professional, affordable community forum solution. It gives you an instant community that lets your users to interact, take part in discussions, ask questions, give answers and express opinions. The latest…

Read more

Scan SQL Injection vulnerability on whole server

SQL injection occurs when an application processes user-provided data to create an SQL statement without first validating the input and then submits the statement to a database server for execution. When successfully exploited, SQL injection can give…

Read more

Complete Understanding of Web Application Security – 2017

1. Vulnerabilities There are many types of attack vectors a malicious user might use to exploit a web application and when dealing with a large web site, it is often impossible to secure…

Read more

Turn Your Blog into a Money Making Business

Blog monetization has become increasingly popular over the last 10 years. While previously people used to run a blog as a side profession, it has now become a full-fledged source of income for…

Read more

Ethereum | Enigma Investment Platform Hacked – $470,000 stolen

Ethereum is the 2nd most popular cryptocurrency after the bitcoin. The current value of Ethereum for today is $321 approximately. According to latest news, an unknown hacker hacked the Enigma Website which is…

Read more

Some Disgusting Facts of Sarahah Mobile App

Within a span of just 1-2 weeks, Sarahah Mobile App has taken hold in the social media sphere having more than 10 millions Downloads only on Google Play Store. Basically Sarahah is not…

Read more

HBO war with Hackers are still going on – Twitter Hacked

Now this time, the hacker “OurMine” hacked almost all social accounts of HBO and posted a tweet – “Hi, Our?Mi?ne are here, we are just testing your security ,HBO team please contact us…

Read more

Computer Networking Questions with Answers – 30 Questions – Set 3

1. What is progressive download? Answer: Progressive download enables you to view streaming content as it is downloaded to your media player. With progressive downloads, you can watch live events as they take…

Read more

Computer Networking Questions with Answers – 30 Questions – Set 2

1. What is the difference between the ISM and SSM multicast models? Answer: With the ISM model, the routers in the network maintain source information. However, with SSM the receivers are responsible for…

Read more

Computer Networking Questions with Answers – 30 Questions – Set 1

1. In which layers of the OSI model does content networking reside? Answer: Content networking devices technically work at Layers 17, but true content networking services can be considered to reside in Layers…

Read more

Black Hat Arsenal released official Github Repository for Security Tools

Black Hat is the world’s leading information security event, providing attendees with the very latest in research, development and trends. The courses at this year’s Black Hat information security conference taught more than…

Read more

Take the Online Safety Quiz 2017

Part of Safer Internet Day, this Online Quiz invites children, young people, parents, grandparents and teachers to create a better internet together by exploring what to do in different situations that may arise…

Read more

Sniff HTTPS/FTP Packets using SSLSTRIP and DSNIFF – ARP Spoofing MITM Attack

As per Wikipedia source, In cryptography and computer security, a man-in-the-middle attack (MITM) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each…

Read more

Install Monit, a process and service monitoring tool on Kali Linux

Monit is a small Open Source utility for managing and monitoring Unix systems. Monit conducts automatic maintenance and repair and can execute meaningful causal actions in error situations. Monit package is easily available…

Read more

HTML – Questions With Answers – 176 to 200 Questions – SET 8

Q176. Why should you avoid using background images in tables in HTML e-mail? Answer – You should avoid using background images in tables in HTML e-mail because Outlook 2007 does not support them….

Read more

How to use Touch command effectively in Kali Linux

As you all knows Touch command is used to create a quick file of any extension. Touch command can be used to modify the access/modification timestamps of files. You can even create a…

Read more

Spaghetti – Web App Security Scanner Tool [Installation + Usage]

Spaghetti is a web application security scanner tool. It is designed to find various default and insecure files, configurations and misconfigurations. Spaghetti is built on python2.7 and can run on any platform which…

Read more

6 Things to do after installing Kali Linux

Kali Linux is one of the most popular open source penetration testing distribution operating system having more than 600+ hacking/testing tools pre-installed in it. It is maintained and funded by Offensive Security Ltd….

Read more