Tools

10 SEO tools all small businesses need in 2018

SEO is undeniably one of the most popular concepts online, gaining attention from experts, developers, website owners, brand, and companies. As website owners strive to be noticed online by the right kind of audience, SEO’s best practices keep changing, not to mention, the needs of the target audience. Also Read: 77 Best SEO Tools Since […]

Tutorials

ShellShock Vulnerability Exploitation With HTTP Request

In a previous tutorial, we used Metasploit Framework to gain a low-level shell on the target system by exploiting the ShellShock vulnerability. The same can also be done by sending a HTTP Request with Wget and Curl. In order to exploit the ShellShock bug, the following steps need to occur: you must get the target […]

Tutorials

ShellShock Vulnerability Exploitation With Metasploit Framework

Previously we’ve well explained the Heartbleed Vulnerability which already created so much havoc and now we’ll show you a live exploitation of ShellShock Vulnerability (CVE-2014-6271) with Metasploit Framework. ShellShock Vulnerability also called Bash Bug Vulnerability which already affects thousands of Linux/Unix operating systems. This vulnerability has originally discovered by Stephane Chazelas. Essentially, ShellShock works by […]

Tutorials

How To Install WaveBox in Kali Linux – [Email Client]

WaveBox is one of the best Email Client for especially Linux distributions but also comes for Windows OS and MacOS which bringing Gmail, Hotmail, Inbox, Outlook etc into a configurable client. Wavebox is built using Electron, React and Flux and supports more than 1100+ applications. The Latest version of WaveBox is v3.14.10beta (As checked per Dated […]

Tech Articles

10 Cool Netstat Commands You Need to Know

Netstat is truly a very overlooked tool for network troubleshooting so I believe that it would be beneficial to post all of the switches and options available with NETSTAT. Netstat displays protocol statistics and current TCP/IP network connections. Netstat can be run in any version of Windows/Linux by opening a Command window and using the […]

Tutorials

Webacoo – Web Backdoor Generator Tool [Kali Linux]

WeBaCoo (Web Backdoor Cookie) is a web backdoor script-kit, aiming to provide a stealth terminal-like connection over HTTP between client and web server. It is a post exploitation tool capable to maintain access to a compromised web server. WeBaCoo was designed to operate under the radar of modern up-to-dated AV, NIDS, IPS, Network Firewalls and […]

Tech Articles

All About HTTP Headers – Detailed Guide 2018

Headers and methods work together to determine what clients and servers do. This article quickly sketches the purposes of the standard HTTP headers and some headers that are not explicitly defined in the HTTP/1.1 specification (RFC 2616). There are headers that are specific for each type of message and headers that are more general in […]

Tech Articles

1xx, 2xx, 3xx, 4xx and 5xx HTTP Status Codes

HTTP status codes are classified into 5 broad categories. The status codes provide an easy way for clients to understand the results of their transactions. As methods tell the server what to do, status codes tell the client what happened. Status codes live in the start lines of responses. For example, in the line “HTTP/1.1 […]

Tutorials

Analyzing Deauthentication Packets with Wireshark

Regardless of whether you are reading a packet capture from a stored file or from a live interface on a Windows or Linux host, Wireshark’s analysis features are nearly identical. Wireshark offers many useful features for analyzing wireless traffic, including detailed protocol dissectors, powerful display filters, customizable display properties, and the ability to decrypt wireless traffic. Let’s start […]

Tech Articles

List of Security Related RSS Feeds – Bookmark 2018

RSS (Rich Site Summary; originally RDF Site Summary; often called Really Simple Syndication) is a type of web feed which allows users to access updates to online content in a standardized, computer-readable format. RSS is written in the Internet coding language known as XML (eXtensible Markup Language), which is why you see RSS buttons commonly […]

Tech Articles

Important Links – Report Phishing Links & Suspicious Emails

Phishing has emerged as an effective method to steal the personal and confidential data of users. It is an Internet scam that tricks users into divulging their personal and confidential information by making false statements and enticing offers. Phishers can attack users through mass mailings to millions of e-mail addresses around the world. A successful phishing […]

Tutorials

Find Geolocation with Seeker with High Accuracy – Kali Linux 2018

With the help of Seeker which is an open source python script, you can easily find the geolocation of any device with high accuracy along with device information like Resolution, OS Name, Browser, Public IP, Platform etc. Seeker uses Ngrok (for tunnelling) and creates a fake apache web server (on SSL) which asks for location […]

Tutorials

File Upload Exploitation and Its Prevention – Detailed Guide 2018

Well as you all knows that, file upload control is always at major risk for developers because there are N number of ways to bypass this control and an attacker can easily upload any malicious file to the server. Once the malicious file got uploaded to server, an attacker can easily gain the control of […]