1xx, 2xx, 3xx, 4xx and 5xx HTTP Status Codes

HTTP status codes are classified into 5 broad categories. The status codes provide an easy way for clients to understand the results of their transactions. As methods tell the server what to do,…

Read more

Analyzing Deauthentication Packets with Wireshark

Regardless of whether you are reading a packet capture from a stored file or from a live interface on a Windows or Linux host, Wireshark’s analysis features are nearly identical. Wireshark offers many useful…

Read more

List of Security Related RSS Feeds – Bookmark 2018

RSS (Rich Site Summary; originally RDF Site Summary; often called Really Simple Syndication) is a type of web feed which allows users to access updates to online content in a standardized, computer-readable format….

Read more

Important Links – Report Phishing Links & Suspicious Emails

Phishing has emerged as an effective method to steal the personal and confidential data of users. It is an Internet scam that tricks users into divulging their personal and confidential information by making…

Read more

Find Geolocation with Seeker with High Accuracy – Kali Linux 2018

With the help of Seeker which is an open source python script, you can easily find the geolocation of any device with high accuracy along with device information like Resolution, OS Name, Browser,…

Read more

File Upload Exploitation and Its Prevention – Detailed Guide 2018

Well as you all knows that, file upload control is always at major risk for developers because there are N number of ways to bypass this control and an attacker can easily upload…

Read more

Exploitation of WPA/WPA2-PSK with WiFiBroot – Kali Linux 2018

These days, wireless networks are everywhere. With users being on the go like never before, having to remain stationary because of having to plug into an Ethernet cable to gain Internet access is not…

Read more

Apache Java Struts2 Rest Plugin Exploitation – CVE-2017–9805

Today, we’ll show you the Remote code exploitation of Apache Struts2 Rest Plugin with XML Exploit. Apache published this advisory about this RCE  vulnerability by 5th September 2017 under CVE-2017-9805. The REST Plugin is…

Read more

Install Apache Tomcat in Kali Linux – Tutorial 2018

In this tutorial, we’ll show you how to install Apache Tomcat 8.5.32 on Kali Linux. Apache Tomcat which is an open source Java Servlet implementation developed by Apache Software Foundation and used by…

Read more

Anonymity of SQLMAP with TOR Proxy – Kali Linux 2018

In a previous tutorial, we discussed how to use SQLMAP for exploitation of websites and in this, we’ll discuss more about anonymity which definitely adds an extra layer of protection between you and…

Read more

Encryption and Decryption of Files in Linux with GnuPG

GnuPG is a complete and free implementation of the OpenPGP standard as defined by RFC4880 (also known as PGP). GnuPG allows you to encrypt and sign your data and communications; it features a…

Read more

Interesting Things To Know About CorelDraw Graphics Suite

CorelDraw has for long been the primary option for most graphic designers. Unless you have been away from earth over the last two decades or so, you have heard someone mention the name…

Read more

Connect Wi-Fi Network From Terminal – Kali Linux

Today, Wireless Network has become more and more present in open area or large companies and security enhancement is needed to control authentication and confidentiality. The 802.11 Working Group introduced the 802.11i amendment as…

Read more

Set IP Address in Linux – Static / DHCP

When you write a letter to someone, you usually put a complete address on the envelope specifying the country, state, and Zip Code. After you put it in the mailbox, the post office…

Read more

Node.js Deserialization Attack – Detailed Tutorial 2018

Node.js is a Javascript runtime. It encapsulates the Google V8 engine. The Google V8 engine quickly runs Javascript with high performance. Node.js optimizes certain special cases and provides substitute APIs, which enables the…

Read more

Top 10 Linux System Monitoring and Performance Tools

System performance analytics seems to be a frequent question on forums and mailing lists. Finding out why something is slow is generally nontrivial as there are many factors to consider. It’s really very tough…

Read more

List of All Bash Redirections – Linux Cheatsheet 2018

Before a command is executed, its input and output may be redirected using a special notation interpreted by the shell. Redirection allows commands’ file handles to be duplicated, opened, closed, made to refer…

Read more

List of All Bash CTRL and ALT Key Shortcuts – Linux 2018

Bash, which is the default shell in Linux contains a whole lot of key bindings which makes it really easy to use. The most commonly used shortcuts are listed below: Also Read: Bash External…

Read more

List of All Bash Inbuilt Variables – Linux 2018

Bash is the standard shell on most Linux distributions. However, there are other Linux shells available and there’s no requirement that Bash should be present on any particular distribution. The Bash shell is open source…

Read more

List of All Bash External Variables – Linux 2018

In last article, we discussed out Bash Environment Variables which always play an important role in Bash Shell Scripting and here in this article, we listed out all Bash External Variables which you…

Read more

List of All Bash Environment Variables – Linux 2018

A shell is a program that runs operating system commands. Bash has more than 50 predefined variables.These variables, created when Bash is first started, provide information about the Bash session and can be used…

Read more