Database Terminology – A Minimal Guide 2018

Database A repository to store data. For example, a database might store all of the data associated with finance in a large company, information about your CD and DVD collection, or the records…

Read more

Privilege Escalation with PowerShell Empire and SETOOLKIT [Kali Linux]

In a previous tutorial, we used PowerShell Empire v2.3.0 for post exploitation of Windows Operating System. The same can also be done with one of the most popular toolkit named as Social Engineering Toolkit (SETOOLKIT) which…

Read more

Compiled List of Common Media Types

We have compiled a full list of Internet Media Types which you can easily use while development. “Internet Media Type” is the same as a MIME type. MIME types were originally created for…

Read more

Exploitation of Opendreambox – Remote Code Execution

The OpenDreambox project aims to bring an open and extensible image to the Dreambox receivers and to provided viable alternatives to other images that are kept closed-source by their authors. In this OpenDreambox…

Read more

Change Password Forcefully on Next Login (LINUX)

Password is a key or a Secret word or a string of characters which is used to protect your assets or information from others in the cyber world. It is used for authentication,…

Read more

How to check rDNS (Reverse DNS) with Command Line Tools

rDNS or Reverse DNS is just the opposite of fDNS or Forward DNS. rDNS simply maps the address with hostname. Typically, the DNS is used to determine what IP address is associated with…

Read more

Simple Backup Script with Cronjob

If you are using somehow a managed or unmanaged VPS server then this article will definitely helps you to create a backup of your webserver on schedule basis with the help of cronjob….

Read more

Top 5 Image Optimization Plugins for WordPress

SEO is sometimes also called SEO copyrighting because most of the techniques that are used to promote sites in search engines deal with text and images. Videos, images, and infographics are best ways to…

Read more

Top 8 Online Free Image Compression Tools

The psychology of image search is different from regular searches. Image searchers are usually more patient. At the same time, they are pickier. Therefore, optimizing your images makes sense. The added benefit of…

Read more

How To Set Custom Error Page in Apache Tomcat Server

A 404 error is an HTTP status code that means that the page you were trying to reach on a website couldn’t be found on their server. At some point, a visitor is…

Read more

20 Useful Tar Commands For Extraction and Compression

The Linux tar command stands for tap archive, is not a compressed file and commonly called as a collection (which contains the contents of many files) of a single file. Tar is the…

Read more

Getting Reverse Shell with PHP, Python, Perl and Bash

As part of a security audit, evaluation, and “pentesting“, a command execution vulnerability may be discovered (RCE – Remote Command Execution). The listener quickly needs to have a full interactive shell depending on…

Read more

Top 10 cURL Commands Which You Need To Know

cURL is the magical utility that allows developers to download a URL’s content, explore response headers, get stock quotes, confirm our GZip encoding is working, and much more. One more great usage of…

Read more

Top 5 Useful Netstat Commands on Windows

Netstat is a built in command line tool that provides you with information about TCP connections, network statistics and IP routing table. As it is built in, there is nothing to download. It…

Read more

Top 9 Ping Command Examples in Linux

To check the host the alive or not, we always use PING Command. The “ping” command is built into both Windows and UNIX machines as a universal way of testing network response time and…

Read more

Evil Twin Attack with DNSMASQ – Wireless WPA2-PSK Cracking

Ever heard of an evil twin AP? An evil twin AP is like a rogue access point. The attacker creates a fake wireless AP to lure users into thinking it’s a trusted wireless…

Read more

[Top 50] 404 Codepen Error Pages – Free Download

A 404 Page Error or Not Found error is displayed when you go to a page that doesn’t exist within an active website. One of the most common errors you can come across…

Read more

Linux System Reconnaissance [Top Linux Commands]

In the early 90’s GNU/Linux systems consisted of little more than a beta – quality Linux kernel and a small collection of software ported from the GNU project. It was a true hacker’s…

Read more

Report Bulk Malicious URLs to Windows Defender Security Intelligence (WDSI)

Windows Defender Security Intelligence (WDSI), formerly known as Microsoft Malware Protection Center (MMPC), is committed to helping Microsoft customers. With Windows Defender Security Intelligence (WDSI) you can explore in-depth threat encyclopedia for information…

Read more

Drupal 7 Exploitation with Metasploit Framework [SQL Injection]

Drupal 7 includes a database abstraction API to ensure that queries executed against the database are sanitized to prevent SQL injection attacks. A vulnerability in this API allows an attacker to send specially…

Read more

File Recovery using Foremost [Kali Linux]

Foremost is a console program to recover files based on their headers, footers, and internal data structures. This process is commonly referred to as data carving. Foremost can work on image files, such…

Read more

Post Exploitation with PowerShell Empire 2.3.0 [Detailed Tutorial]

The post exploitation phase begins after you have compromised one or more systems but you’re not even close to being done yet. Post exploitation is always a critical component in any penetration test….

Read more