Tutorials

[RCE] Exploitation of Microsoft Office/WordPad – CVE-2017-0199 [Tutorial]

A remote code execution vulnerability exists in the way that Microsoft Office and WordPad parse specially crafted files. An attacker who successfully exploited this vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Exploitation of this vulnerability […]

SEO

100+ SEO Tools For 2018 (Updated List)

Do you ever wonder why some websites seem to rank at the top search engines so easily, while other, seemingly higher-quality websites struggle to get onto the first page? Often times it’s because their primary keywords are in their domain name. In some niche and local markets that may be just about all that’s needed, […]

Tutorials

From RFI(Remote File Inclusion) to Meterpreter Shell

For many years now we’ve participated in many coding forums and discussion platforms. Perhaps one of the biggest issues we see is people using $_GET or another unfiltered variable inside of an include, include_once, require or require_once statement which is a major security risk. One of the most dangerous types of vulnerabilities we can find […]

Articles

Top 6 Web Application Vulnerability Scanners

A number of different tools exist for performing automated vulnerability scans of web applications. These scanners have the benefit of being able to test a large amount of functionality in a relatively short time, and in a typical application are often able to identify a variety of important vulnerabilities. Web application vulnerability scanners automate several of the […]

Articles

Stay Safe Online When Using Public Wi-Fi.

You’ll come across public Wi-Fi almost everywhere, in the airport, your favorite coffee shop, and hotels. While public Wi-Fi has made our lives better, it poses a lot of risks particularly security risks. Hackers have made public Wi-Fi’s their playground where they illegally acquire users’ personal information and use it to carry out their fraudulent […]

Tutorials

From Command Injection To Meterpreter Shell – Detailed Tutorial 2018

Other than XSS and SQL Injection, there are number of different attack techniques against a web application. In this tutorial,we’ll exploit the DVWA Web Application with Command Injection Attack. There are so many vulnerable web applications where players must locate and exploit vulnerabilities to progress through the story which contains various vulnerabilities like XSS, CSRF, […]

Articles

Learn JavaScript with 50+ Resources/Ebooks

S.No Name of the Book Download Link 1 jQuery Enlightenment A book for jQuery developers who have surpassed the introductory concepts. By – Cody Lindley View More 2 AngularJS Directives in Traction This eBook helps you understand how built-in directives work and teaches you to build custom directives on your own. By – Amit Gharat […]

Articles

Top 5 DNS Lookup Websites – Best Rated 2018

DNS organizes hostnames in a domain hierarchy. A domain is a collection of sites that are related in some sense because they form a proper network (e.g., all machines on a campus, or all hosts on BITNET), because they all belong to a certain organization (e.g., the U.S. government), or because they’re simply geographically close. […]