Tutorials

[RCE] Exploitation of Microsoft Office/WordPad – CVE-2017-0199 [Tutorial]

A remote code execution vulnerability exists in the way that Microsoft Office and WordPad parse specially crafted files. An attacker who successfully exploited this vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Exploitation of this vulnerability […]

Latest Articles

How to Secure your Wi-Fi Network in 10 Steps

Internet users are widely using Wi-Fi devices to access Internet. Every year millions of wireless based devices are sold in …
Read More

Top 10 WordPress Plugins for Blog Monetization

The beauty of WordPress is its extensibility. Some of the WordPress lead developers have said that the most exciting WordPress …
Read More

Top 5 Online Ethical Hacking Platforms – 2018 Update

The most visible features of a Web application that intruders will note and immediately seek to exploit are vulnerabilities in …
Read More

[RCE] Exploitation of Microsoft Office/WordPad – CVE-2017-0199 [Tutorial]

A remote code execution vulnerability exists in the way that Microsoft Office and WordPad parse specially crafted files. An attacker …
Read More

100+ SEO Tools For 2018 (Updated List)

Do you ever wonder why some websites seem to rank at the top search engines so easily, while other, seemingly …
Read More

From Command Execution to Meterpreter Reverse Shell with Commix

Command injection is an attack in which the goal is execution of arbitrary commands on the host operating system via …
Read More

From RFI(Remote File Inclusion) to Meterpreter Shell

For many years now we’ve participated in many coding forums and discussion platforms. Perhaps one of the biggest issues we …
Read More

JAVA RMI (Remote Method Invocation) Exploitation with Metasploit Framework

The Java Remote Method Invocation, or Java RMI, is a mechanism that allows an object that exists in one Java …
Read More

Top 6 Web Application Vulnerability Scanners

A number of different tools exist for performing automated vulnerability scans of web applications. These scanners have the benefit of …
Read More

Stay Safe Online When Using Public Wi-Fi.

You’ll come across public Wi-Fi almost everywhere, in the airport, your favorite coffee shop, and hotels. While public Wi-Fi has …
Read More

From Command Injection To Meterpreter Shell – Detailed Tutorial 2018

Other than XSS and SQL Injection, there are number of different attack techniques against a web application. In this tutorial,we’ll …
Read More

Top 20 Hacking Books To Read Before You Die

Looking to buy best hacking and security books? We have short listed some of the highly recommended books for beginners …
Read More

Learn JavaScript with 50+ Resources/Ebooks

S.No Name of the Book Download Link 1 jQuery Enlightenment A book for jQuery developers who have surpassed the introductory …
Read More

Loading...