HBO war with Hackers are still going on – Twitter Hacked

Now this time, the hacker “OurMine” hacked almost all social accounts of HBO and posted a tweet – “Hi, Our?Mi?ne are here, we are just testing your security ,HBO team please contact us…

Read more

Computer Networking Questions with Answers – 30 Questions – Set 3

1. What is progressive download? Answer: Progressive download enables you to view streaming content as it is downloaded to your media player. With progressive downloads, you can watch live events as they take…

Read more

Computer Networking Questions with Answers – 30 Questions – Set 2

1. What is the difference between the ISM and SSM multicast models? Answer: With the ISM model, the routers in the network maintain source information. However, with SSM the receivers are responsible for…

Read more

Computer Networking Questions with Answers – 30 Questions – Set 1

1. In which layers of the OSI model does content networking reside? Answer: Content networking devices technically work at Layers 17, but true content networking services can be considered to reside in Layers…

Read more

Black Hat Arsenal released official Github Repository for Security Tools

Black Hat is the world’s leading information security event, providing attendees with the very latest in research, development and trends. The courses at this year’s Black Hat information security conference taught more than…

Read more

Take the Online Safety Quiz 2017

Part of Safer Internet Day, this Online Quiz invites children, young people, parents, grandparents and teachers to create a better internet together by exploring what to do in different situations that may arise…

Read more

Sniff HTTPS/FTP Packets using SSLSTRIP and DSNIFF – ARP Spoofing MITM Attack

As per Wikipedia source, In cryptography and computer security, a man-in-the-middle attack (MITM) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each…

Read more

Install Monit, a process and service monitoring tool on Kali Linux

Monit is a small Open Source utility for managing and monitoring Unix systems. Monit conducts automatic maintenance and repair and can execute meaningful causal actions in error situations. Monit package is easily available…

Read more

HTML – Questions With Answers – 176 to 200 Questions – SET 8

Q176. Why should you avoid using background images in tables in HTML e-mail? Answer – You should avoid using background images in tables in HTML e-mail because Outlook 2007 does not support them….

Read more

How to use Touch command effectively in Kali Linux

As you all knows Touch command is used to create a quick file of any extension. Touch command can be used to modify the access/modification timestamps of files. You can even create a…

Read more

Spaghetti – Web App Security Scanner Tool [Installation + Usage]

Spaghetti is a web application security scanner tool. It is designed to find various default and insecure files, configurations and misconfigurations. Spaghetti is built on python2.7 and can run on any platform which…

Read more

6 Things to do after installing Kali Linux

Kali Linux is one of the most popular open source penetration testing distribution operating system having more than 600+ hacking/testing tools pre-installed in it. It is maintained and funded by Offensive Security Ltd….

Read more

Creating an undetectable payload using Veil-Evasion Toolkit

In previous tutorials, we used msfvenom for generating various payloads but now a days AV companies coded a signature for the templates these schemes uses so to bypass AV, today we’ll use another…

Read more

HBO agreed to pay $250,000 as a ransom but Hackers denied to accept

Last month, the HBO hackers claimed that, they’ve stole around 1.5TB of data from HBO which includes the upcoming episodes of “Ballers” and “Room 104” and a script of 4th episode of “Game…

Read more

Testing all SSL Vulnerabilities with TestSSL Script

testssl.sh is pretty much portable/compatible. It is working on every Linux, Mac OS X, FreeBSD distribution, on MSYS2/Cygwin (slow). testssl.sh is a free command line tool which checks a server’s service on any…

Read more

Top 65 OWASP Cheat Sheet Collections – ALL IN ONE

A cheat sheet is a concise set of notes used for quick reference. The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific web application…

Read more

Super Nintendo Entertainment System – The Best 15 Games to Remember the Childhood

After the release of the 8-bit Nintendo Family Computer (Famicom) console in Japan in the summer of 1983, which was cheaper than the Sega and Atari consoles and allowed to download the game…

Read more

Arrest Mystery of Marcus Hutchins – a WannaCry Hero

For the last few weeks Marcus Hutchins has been in Las Vegas attending a security conference, and on holiday. On Wednesday he was arrested on the flight home due to an indictment made…

Read more

Welcome to “Send.firefox.com” a test experiment by Mozilla

Mozilla just launched a file sharing site named as “Send.firefox.com” through which you can easily send a file from one person to another. Basically its a file sharing experiment which allows you to…

Read more

How to use Netcat for Listening, Banner Grabbing and Transferring Files

Netcat is one of those few tools like nmap, Metasploit, Wireshark and few others that every hacker should be familiar with. It is simple, elegant and has a multitude of uses. For instance,…

Read more

MSFVENOM – All payload examples – Cheatsheet 2017

Msfvenom is a Metasploit Standalone Payload Generator which is a replacement of msfpayload and msfencode. Through msfvenom, you can generate any kind of shellcode/payload depending upon the platform/OS you want to hack. Often…

Read more

Meterpreter Useful Top 60 Commands List – 2017 Update

Meterpreter is an advanced, dynamically extensible payload that uses in-memory DLL injection stagers and is extended over the network at runtime. It communicates over the stager socket and provides a comprehensive client-side Ruby…

Read more