Earn 50$ a day by keeping your computer ON

Have you ever thought about setting up a business online? If not, where have you been for the last 5 or 10 years? It’s the new American dream, encompassing all the usual ideas of independence, freedom, and wealth. And sometimes,... Read more

Kali Linux 2017.3 – A 3rd release in year 2017

Kali Linux is a Linux-based penetration testing operating system that aids security professionals in performing assessments in a purely native environment dedicated to security and hacking. Kali Linux is a distribution based on the Debian GNU/Linux distribution aimed at digital... Read more

Find Open Ports in Kali Linux with Netstat Utility

A port scan sends client requests to a server port addresses on a host for finding an active port. The design and operation of the Internet is based on TCP/IP. A port can have some behavior like below: Open or Accepted: The host sent... Read more

The 12 Best, Must-Have Tools For Steganography – Updated Tools

Steganography is the hiding of a secret message within an ordinary message and the extraction of it at its destination. Steganography is a technology that hides a message within an object, a text, or a picture. It is often confused with cryptography,... Read more

SQL Injection – A Complete Understanding Tutorial

SQL injection is an attack to circumvent scripts using SQL queries, as is often the case on websites, and especially for user authentication systems. [#] Introduction – SQL, or Structured Query Language, is a Standard and standardized computer pseudo-language, intended... Read more

Top 5 Vulnerability Research Websites – #CyberSecurity

1) National Vulnerability Database https://nvd.nist.gov/ NVD i.e. National Vulnerability Database is a product of NIST (National Institute of Standards and Technology) Computer Security Division which is sponsored by DHS(Dept. of Homeland Security’s). The NVD is the U.S. government repository of... Read more

77 Best SEO Tools – A Complete Package [Updated List]

SEO (Search Engine Optimization) is the activity of optimizing Web pages or whole sites in order to make them more search engine friendly, thus getting higher positions in search results. SEO is sometimes also called SEO copyrighting because most of... Read more

Do’s and Don’ts in SEO – Search Engine Optimization

The process of SEO has never been more important. Search engines, such as Google, Yahoo, and Bing, have developed an impressive ability to deliver relevant search results to a user’s queries. How well a site is ranked can mean the difference between continuous sales growth... Read more

Top 40 XSS (Cross Site Scripting) Revision Questions with Answers

The below questions and answers are designed to both measure your understanding of the concepts of XSS -Cross Site Scripting Attacks and Prevention. Q1: What is the difference between HTML Injection and XSS? A: Both of them refer to exactly... Read more

SEToolkit – Credential Harvester Attack [Tutorial]

As a penetration tester there will be times that the client requirements will be to perform social engineering attacks against their own employees in order to test if they follow the policies and the security controls of the company. After... Read more

TCP & SYN Scanning with Metasploit Framework without NMAP

Port Scan is Often done by hackers and penetration testers to identifying and discovering internal services of target host. Port Scanning is an important action for gathering more information of the target host. Today, We will see how to use... Read more

Armitage – In-depth Windows Exploitation (GUI) – 2017

It’s difficult to talk about any system in a vacuum, especially a system that is so widely deployed in so many roles as Windows in all of its flavors. To see how easily tools like Metasploit Framework can remotely exploit... Read more

WordPress pushed an emergency new update 4.8.3 – SQL Injection Bug

WordPress is one of the world’s most popular content management systems! It has been installed more than 76.5 million times. According to a report issued by Sucuri, an Internet security company, WordPress is the most hacked CMS in the world.... Read more

Capture Handshake Address with Airodump-ng and Aireplay-ng

You can easily capture the handshake address with the help of Airodump through which we’ll monitor all the wireless stations and to deauthenticate the station, we’ll use Aireplay package which both are pre-installed in Kali Linux machine. Alright, now, your... Read more

Pentesting Windows 2000/2003 Server with Metasploit Framework – Detailed Tutorial

This is a very detailed step by step tutorial on How to pentest a Remote PC (Windows 2000/2003 server) with Metasploit Framework. We’ve used Kali Linux 2017.1 and Windows 2000 server in a virtual environment (VMware Workstation). The ease of... Read more