Once a web server and its services have been compromised, it is important to ensure that secure access can be maintained. This is usually accomplished with the aid of a web shell—a small program…
Read moreA Wi-Fi deauthentication attack is a type of denial-of-service attack that targets communication between a user and a Wi-Fi wireless access point. The final attack against wireless networks that we’ll evaluate is the…
Read moreESSID(Extended Service Set Identifier) is the sequence of characters that uniquely identify a wireless local area network. Hiding the ESSID is a poor method of attempting to achieve security through obscurity; unfortunately, the…
Read moreTor (www.torproject.org) is an open source implementation of the third generation onion routing that provides free access to an anonymous proxy network. Onion routing enables online anonymity by encrypting user traffic and then…
Read moreThose of us who have conducted or participated in a penetration test will understand that tools are not the only thing necessary to successfully complete a PenTest. Methodologies are essential for ensuring that…
Read moreThe following multiple-choice questions are just a Warm-up Questions for you which are as follows: 1. Why would a hacker use a proxy server? A. To create a stronger connection with the target….
Read moreWeb Application Proxies like Burp Proxy, WebScarab or Tamper Data Addon allow a security tester to intercept the requests/responses between the client HTTP application and the web server. Proxies are the fundamental for…
Read moreInternet-facing systems are constantly in danger from a variety of threats. Of these threats is a DoS attack, which involves a single system, or a DDoS attack that involves many distributed systems, as both…
Read moreNmap (Network Mapper) is a security scanner, originally written by Gordon Lyon used to discover hosts and services on a computer network, thus building a “map” of the network. Typical uses of Nmap:…
Read moreAs we all knows WannaCry has demonstrated the world’s vulnerability to ransomware which ultimately left 230,000 residents without power for as long as 6 hours and affects nearly 300,000 systems. But it may…
Read moreNMapGUI is an advanced graphical user interface for NMap network analysis tool. It allows to extend and ease the typical usage of NMap by providen a visual and fast interface with the application….
Read moreThe Open Web Application Security Project (OWASP) is an open community dedicated to enabling organizations to develop, purchase, and maintain applications and APIs that can be trusted. All the OWASP tools, documents, videos…
Read moreThere is no doubt that the advent of the Internet has sparked a revolution in how we share information as families, businesses, and world citizens. Perhaps the most important technological invention since the…
Read moreWindows 10 is one of the most stable and secured operating system ever released from Microsoft and now this time by 17th October, Microsoft rolled out Windows 10 Fall Creators Update (10 AM…
Read moreWPA2 Protocol is one of the most using protocol for Wireless networks now a days but due to latest research, WPA2 can easily be cracked and the handshake traffic can be manipulated to…
Read moreParameth is an open source tool developed by maK- (obviously a l33t name) through which you can easily find GET and POST URLs by a single command. Often when you are busting a directory…
Read morePython is an interpreted, object-oriented, high-level programming language. Python can be ran on almost any OS. While it is not native to Windows machines, it is native to most Linux distributions. The great…
Read moreOSCP(Offensive Security Certified Professional) is one of the most popular certification meant for only Penetration Testers. The fees for this certification starts from USD 800 which includes hands-on material + 30 day training…
Read moreCloudFlare is one of the most popular CDN provider who offers a complete package of WAF i.e. Web Application Firewall and DDOS Protection (Distributed Denial of Service) for websites. List of Features –…
Read more