List of all HTTP Server Response Codes – 2017 Updated List

When you visit a web page, your computer’s web browser communicates with the web server of the website. Your web browser, also known as the client, submits a request to the web server for web page to be delivered. The... Read more

SQLiv – Massive SQL Injection Scanner

SQL injection is one of the most prominent vulnerabilities for web-based applications. In last article, we’ve used viSQL through which we scanned the whole server for SQL Injection vulnerabilities with the help of Crawling and Reverse IP domain check feature.... Read more

Hack Windows/Linux using ARCANUS Framework – 100% FUD

ARCANUS is a customized payload generator/handler for penetration testing only. You can easily generate a payload for both OS i.e. Windows and Linux distributions with just a single click. The latest version of ARCANUS FRAMEWORK is 1.5.6. Previously we discussed... Read more

OWASP VBScan – A Black Box vBulletin Vulnerability Scanner

vBulletin is a professional, affordable community forum solution. It gives you an instant community that lets your users to interact, take part in discussions, ask questions, give answers and express opinions. The latest version of vBulletin is vBulletin 5 Connect... Read more

Scan SQL Injection vulnerability on whole server

SQL injection occurs when an application processes user-provided data to create an SQL statement without first validating the input and then submits the statement to a database server for execution. When successfully exploited, SQL injection can give an attacker the means to access back-end database... Read more

Complete Understanding of Web Application Security – 2017

1. Vulnerabilities There are many types of attack vectors a malicious user might use to exploit a web application and when dealing with a large web site, it is often impossible to secure all possible vulnerabilities prior to publishing it... Read more

Turn Your Blog into a Money Making Business

Blog monetization has become increasingly popular over the last 10 years. While previously people used to run a blog as a side profession, it has now become a full-fledged source of income for many bloggers round the globe. If you... Read more

Ethereum | Enigma Investment Platform Hacked – $470,000 stolen

Ethereum is the 2nd most popular cryptocurrency after the bitcoin. The current value of Ethereum for today is $321 approximately. According to latest news, an unknown hacker hacked the Enigma Website which is a cryptocurrency investment platform. According to reports,... Read more

Some Disgusting Facts of Sarahah Mobile App

Within a span of just 1-2 weeks, Sarahah Mobile App has taken hold in the social media sphere having more than 10 millions Downloads only on Google Play Store. Basically Sarahah is not only the first anonymous messaging app. Sarahah’s... Read more

HBO war with Hackers are still going on – Twitter Hacked

Now this time, the hacker “OurMine” hacked almost all social accounts of HBO and posted a tweet – “Hi, Our?Mi?ne are here, we are just testing your security ,HBO team please contact us to upgrade the security – ourmine .org... Read more

Computer Networking Questions with Answers – 30 Questions – Set 3

1. What is progressive download? Answer: Progressive download enables you to view streaming content as it is downloaded to your media player. With progressive downloads, you can watch live events as they take place. In addition, you do not have... Read more

Computer Networking Questions with Answers – 30 Questions – Set 2

1. What is the difference between the ISM and SSM multicast models? Answer: With the ISM model, the routers in the network maintain source information. However, with SSM the receivers are responsible for specifying the desired source. The receiver application... Read more

Computer Networking Questions with Answers – 30 Questions – Set 1

1. In which layers of the OSI model does content networking reside? Answer: Content networking devices technically work at Layers 17, but true content networking services can be considered to reside in Layers 57 of the OSI model. 2. What... Read more

Black Hat Arsenal released official Github Repository for Security Tools

Black Hat is the world’s leading information security event, providing attendees with the very latest in research, development and trends. The courses at this year’s Black Hat information security conference taught more than 3,500 people how to hack and now... Read more

Take the Online Safety Quiz 2017

Part of Safer Internet Day, this Online Quiz invites children, young people, parents, grandparents and teachers to create a better internet together by exploring what to do in different situations that may arise online. With the aim of helping everyone... Read more

Sniff HTTPS/FTP Packets using SSLSTRIP and DSNIFF – ARP Spoofing MITM Attack

As per Wikipedia source, In cryptography and computer security, a man-in-the-middle attack (MITM) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other. A MITM attack (a type of... Read more

Install Monit, a process and service monitoring tool on Kali Linux

Monit is a small Open Source utility for managing and monitoring Unix systems. Monit conducts automatic maintenance and repair and can execute meaningful causal actions in error situations. Monit package is easily available for all Unix/Linux/OpenBSD/OSX/FreeBSD distributions. You can use... Read more

HTML – Questions With Answers – 176 to 200 Questions – SET 8

Q176. Why should you avoid using background images in tables in HTML e-mail? Answer – You should avoid using background images in tables in HTML e-mail because Outlook 2007 does not support them. Q177. Fill in the blank: _____________ applications... Read more

How to use Touch command effectively in Kali Linux

As you all knows Touch command is used to create a quick file of any extension. Touch command can be used to modify the access/modification timestamps of files. You can even create a simple blank file with the help of... Read more