Tutorials

Generate & Compare Hash with Windows PowerShell

A hash is always a useful when you need to verify the integrity of any file. To check the integrity of your system, you can create a baseline of file hashes, and periodically check for changes against the baseline. Powershell makes checking the integrity of multiple files very easy by combining Get-ChildItem (or dir/ls)with Get-Filehash. […]

Articles

7 Best Python Libraries for Administrative Interfaces

Python is one of those rare languages which can claim to be both simple and powerful. Python is an easy to learn, powerful programming language. It has efficient high-level data structures and a simple but effective approach to object-oriented programming. Python’s elegant syntax and dynamic typing, together with its interpreted nature, make it an ideal language […]

Tutorials

5 Most Commonly Used Nmap Commands

Nmap supports many scanning technologies, such as: UDP, TCP connect(), TCP SYN (half-open scan), ftp proxy (bounce attack), reverse flag, ICMP, FIN, ACK scan, Xmas Tree, SYN Scan and null scan. Nmap also provides some advanced features, such as: detecting operating system types through TCP/IP stack features, secret scanning, dynamic delay and retransmission calculations, parallel […]

Tutorials

Dump All Wi-Fi Passwords with Windows PowerShell

Wireless technology has become increasingly popular as it allows you to easily access the Internet from all sorts of locations around the world without requiring a network cable. But a wireless network isn’t always secure if you don’t understand its dangers, and especially if precautions are not taken. As with any tool as versatile as […]

Articles

Top 10 Metasploit Modules for Exploitation of ShellShock Vulnerability

A vulnerability in GNU Bash could allow an unauthenticated, remote attacker to inject arbitrary commands so called as ShellShock Vulnerability. The vulnerability is due to improper processing of environment variables by the affected software. An unauthenticated, remote attacker could exploit this vulnerability by submitting malicious environment variable values to an application using Bash. Processing the […]

Articles

Database Terminology – A Minimal Guide 2018

Database A repository to store data. For example, a database might store all of the data associated with finance in a large company, information about your CD and DVD collection, or the records of an online store. Table A part of a database that stores data related to an object, thing, or activity. For example, […]

Articles

Compiled List of Common Media Types

We have compiled a full list of Internet Media Types which you can easily use while development. “Internet Media Type” is the same as a MIME type. MIME types were originally created for emails sent using the SMTP protocol. Nowadays, this standard is used in a lot of other protocols, hence the new naming convention […]

Tutorials

Exploitation of Opendreambox – Remote Code Execution

The OpenDreambox project aims to bring an open and extensible image to the Dreambox receivers and to provided viable alternatives to other images that are kept closed-source by their authors. In this OpenDreambox Project, there is a webadmin module which is vulnerable to Remote Code Execution vulnerability through which you can perform command injection via […]

Tutorials

Simple Backup Script with Cronjob

If you are using somehow a managed or unmanaged VPS server then this article will definitely helps you to create a backup of your webserver on schedule basis with the help of cronjob. In this article, we’re going to show you how to use tar for Backup Files and Directories in Linux along with automatic scheduling […]