$1.2 Billion Worth of Cryptocurrencies Stolen – 2018 Update

According to the reports, approx 14% of the BTC and ETHER supply have been compromised by the hackers in less than a decade, said by Lex Sokolin, Director of Autonomous Research LLP. When…

Read more

More than 40,000 customers affected by Credit Card Breach, OnePlus Admits

So OnePlus has finally admits that more than 40,000 user’s credit card details have been breached and used in multiple fraudulent transactions who made purchases on its official website in the period of…

Read more

Wireless DOS Attack with Bash Script – Deauthentication Attack

As we’ve discussed earlier, that how we actually deauthenticate a wireless device with the help of aircrack-ng tool suite package by flooding a network with deauthenticate packets. To deauthenticate any wireless device/router/client, its…

Read more

How to install and use Ngrok – Complete Guide 2018

Ngrok is one of the most popular tunnel service platform through which you can easily expose your local servers which is behind NATs/Firewalls to the public internet over secure tunnels. It connects to…

Read more

Reverse Shell between two Linux machines

Today we’re are going to show you how to make a reverse shell of any Linux machine. Here in this scenario, we are using two linux based VMs, One is Kali Linux(2017.2) and…

Read more

Decompile an Android Application with Dex2jar and Jd-GUI

For decompiling an android application, the open source tool which we’ll use is “dex2jar“. Download Link – Dex2jar.zip (Extract in any location) Sample Application – yeahhub.apk (Download & Extract/Move into dex2jar folder) About…

Read more

Top 8 Forensics Tools – 2018 Update

1. Autospy Autopsy is a digital forensics platform and graphical interface to The Sleuth Kit and other digital forensics tools. It can be used by law enforcement, military, and corporate examiners to investigate…

Read more

Top 5 Wireless Penetration Testing Tools

Anyone can, with the right equipment, access wireless networks (wireless local area networks, wlan’s). After all, there is no physical barrier that makes break-in attempts more difficult, as is the case with wired…

Read more

Best 16 Penetration Testing Books – 2018 Update

A penetration test is very different and much more intrusive than a simple vulnerability analysis. It consists mainly of furthering the vulnerability analysis by exploiting the vulnerabilities discovered during the latter. Unmistakably, the…

Read more

Top 5 Reverse Engineering Books – 2018 Update

Reverse-engineering is especially important with computer hardware and software. Programs are written in a language, say C, C++ or Java, that’s understandable by other programmers. But to run on a computer, they have…

Read more

Top 10 Penetration Testing Distributions – 2018 Update

For those who are interested in learning how to do Penetration Testing, there are many tools and operating  systems are available, but very few targets to practice against safely – not to mention…

Read more

Top 4 Network Vulnerability Scanners

Network scanning refers to the use of a computer network to gather information regarding computing systems. Network scanning is mainly used for security assessment, system maintenance, and also for performing attacks by hackers….

Read more

List of all Vulnerability Databases Resources – 2018 Compilation

1. Common Vulnerabilities and Exposures (CVE)  CVE (Common Vulnerability and Exposures) is a list of entries, each containing an identification number, a description, and at least one public reference – for publicly known…

Read more

Best 19 Tools used for Reverse Engineering – 2018 Update

1. Nudge4j Nudge4j is a tiny piece of Java code to make your Java application accessible to the browser. It’s meant for use during development to provide an environment for experimenting with code…

Read more

List of all 31 Information Security Conferences all around the globe

A conference is a meeting of people who “confer” about a topic. Conference types include: Convention (meeting), meeting of a, usually large, group of individuals and/or companies in a certain field; Academic conference,…

Read more

Best 3 Malware Analysis Books – 2018 Update

1. Practical Malware Analysis: A Hands-On Guide to Dissecting Malicious Software 1st Edition Amazon Buy Link – https://www.amazon.com/Practical-Malware-Analysis-Hands-Dissecting/dp/1593272901 Price – $28.78 (Paperback) & $34.35 (Kindle) Rating – 4.5 out of 5 Nostarch Link – https://nostarch.com/malware…

Read more

Top 7 tools used for Solving Web Challenges

Security testing is the process of assessing and testing a system/application to discover security risks and vulnerabilities of the system and its data. There is no universal terminology but for our purposes, we…

Read more

Penetration Testing Resources – 2018 Compilation

A Penetration test is the process of actively evaluating company’s information security measures. Security measures are actively analyzed for design weakness, technical flaws and vulnerabilities. The results are delivered comprehensively in a report,…

Read more

4 Best Network Analysis Books – 2018 Update

Nowhere is the term hacker more misconstrued than in the network security field. This is understandable because the very same tools that network security professionals use to probe the robustness of their own…

Read more

Subdomain Bruteforcing with SubBrute

SubBrute is one of the most popular sub-domain brute forcing tool through which we can easily enumerate the best possible sub-domains of any domain along with all DNS records. It is one of…

Read more

Crack WPA2-PSK with Aircrack – Dictionary Attack Method

WPA/WPA2 vastly improves the security of wireless networks; however, the extra protection comes at the price of added complexity to the protocol. Although WPA was developed with security in mind, it does have its own…

Read more