Secure your Cpanel/WHM Server with 9 Easy Ways

WHM or Web Host Manager is a powerful program that permits administrative access to cPanel backend and also enables the user with more flexibility and control while managing some very popular resource intensive…

Read more

15 Things You Need to Know About Maintaining The Logs

The following are some of the legal issues involved with creating and using logs that organizations and investigators must keep in mind: Logs must be created reasonably contemporaneously with the event under investigation….

Read more

Understanding C++ and OOPs with an Example – Minimal Guide 2018

Each person can have his own reason for programming but it is one of the best ways to gain a deep understanding of computers and computer technology. Learning to program makes you understand…

Read more

How To Get 5TB Free Cloud Storage Lifetime – 100% Working Method

There are a handful of cloud storage services that you can choose from: Google Drive, Dropbox and OneDrive are some of the major players in this market. They offer various competitive features in…

Read more

Fantastic PHP Related Books – 2018 Update

PHP is a recursive acronym that stands for PHP: Hypertext Preprocessor; this is in the naming style of GNU, which stands for GNU’s Not Unix and which began this odd trend. The name…

Read more

Computer RAM Questions with Answers – MCQ – 20 Set

1. Which of the following types of memory is used for cache memory? A. SRAM B. DRAM C. EDO RAM D. SDRAM 2. How many bits make up the data path of a…

Read more

Source Code Hosting Resources – 2018 Compilation

A source code repository is a file archive and web hosting facility where a large amount of source code, for software or for web pages, is kept, either publicly or privately. They are…

Read more

Most Popular Free Bootstrap Admin Panels [Free Download]

The Web has been around for more than 20 years now, experiencing euphoric early expansion, an economic-driven bust, an innovation-driven rebirth, and constant evolution along the way. One thing is certain: the Web…

Read more

334 Security fixes – Oracle issued Critical Patch Update

Oracle pushes a critical patch update for multiple security vulnerabilities which are usually cummulative but also affects so many other components. Oracle is working on Critical Patch Update since year 2014 and till…

Read more

How to Fully Anonymize Your Linux System with Tor using Nipe

Tor enables users to surf the Internet, chat and send instant messages anonymously, and is used by a wide variety of people for both Licit and Illicit purposes. Tor has, for example, been…

Read more

Send Fake Mail using SETOOLKIT [Kali Linux]

The information security environment has changed vastly over the years. Now, in spite of having security policies, compliance, and infrastructure security elements such as firewalls, IDS/IPS, proxies, and honey pots deployed inside every organization, we hear…

Read more

Certificate Transparency Monitoring – Facebook’s New Tool

Certificate Transparency is an open framework which helps log, audit and monitor publicly-trusted TLS certificates on the Internet. This new tool which is developed by Facebook lets you search for certificates issued for…

Read more

Sniff HTTP Post Data with Wireshark

Wireshark is a graphical network protocol analyzer that lets us take a deep dive into the individual packets moving around the network. Wireshark can be used to capture Ethernet, wireless, Bluetooth, and many…

Read more

Hack Wi-Fi Settings of Windows Machine Remotely [After Meterpreter]

The Metasploit framework is well known in the realm of exploit development. It is a standalone tool for security researchers, penetration testers and IDS/IPS developers. As of now, it has 1700+ exploit definitions…

Read more

Host Header Attack – Practical Exploitation and Prevention

The “HOST” header is part of the http protocol, vulnerable applications are vulnerable because they insert the value of this header into the application code without proper validation, this means not only applications…

Read more

Exploit Windows with Malicious MS-OFFICE File [Metasploit Framework]

Metasploit has for years supported encoding payloads into VBA code. (VBA, or Visual Basic for Applications, is the language that Microsoft Office macros are written in.) Macros are great for pentesters, since they…

Read more

Create a Fake AP with DNSMASQ and HOSTAPD [Kali Linux]

Do you ever think twice before connecting to a free public wireless hotspot at a coffee shop, airport, or hotel? Did you ever stop to wonder if the public Wi-Fi hotspot you just…

Read more

Sniffing with Rogue Access Point [DNSMASQ and TCPFLOW]

Wireless networking is a complex field.With countless standards, protocols, and implementations, it is not uncommon for administrators to encounter configuration issues that require sophisticated troubleshooting and analysis mechanisms. Traditional network sniffing on an Ethernet network…

Read more

Live Packet Sniffing with Python [Search][Post Data]

A sniffer is a program that monitors data traveling over a network. Unauthorized sniffers are dangerous to network security because they are difficult to detect and can be inserted almost anywhere, which makes…

Read more

TTFB (Time to First Byte) – Calculation with Dev Tools and Curl

It is crucial to understand the phases in which resources are gathered over the network. All Network resources are considered resources. As they are retired over the network, resources have distinct life cycles…

Read more