Tutorials

Install DVWA (Damn Vulnerable Web Application) in Kali Linux – Detailed Tutorial

Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is damn defenseless. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, help web developers better understand the processes of securing web applications and aid teachers/students to teach/learn web application security in […]

Latest Articles

Seven ways to kill it with social media marketing

Digital marketing has come a long way since the prominence of social media as a powerful tool in the practice …
Read More

Top 15 IT Security Interview Questions For Infosec

There are certain requirements that you must meet in order to be an effective penetration tester in a infosec job …
Read More

Install DVWA (Damn Vulnerable Web Application) in Kali Linux – Detailed Tutorial

Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is damn defenseless. Its main goals are to be …
Read More

Simple Random Password Generator – Command Line (LINUX)

A brute-force attack is when all possible keys are checked against encrypted data until the right key is found. Brute-force …
Read More

Test Your Internet Speed With Command Line Tool

Would you like to know how fast your internet connection is? This can be done with an internet speed test …
Read More

19 Useful NMAP Commands You Should Know

Network Mapper (Nmap) is one of the most effective and functional tools in Kali Linux. Nmap can be used to perform …
Read More

HTTP PUT Method Exploitation with Put2Win (Meterpreter Shell)

From previous article, we came across to different actions performed by HTTP methods where we had described the role of …
Read More

10 Most Popular Useful Kali Linux Hacking Tools

Kali is the latest and greatest version of the ever popular Backtrack Linux penetration testing distribution. The creators of the …
Read More

Windows MCQ – 1 to 20 With Answers

1. Device A has been configured for IRQ 3. Which of the following devices will Device A potentially conflict with? …
Read More

List of Vulnerable Web/Mobile/OS Projects – 2018 Update

Testers usually maintain a library of the current and historical operating systems. When testing Microsoft operating systems, Windows XP is …
Read More

Loading...