Web for Pentester – Cross Site Scripting Solutions with Screenshots

Before to starting, we’ll setup a virtual pentesting lab with the help of Web For Pentester toolkit which is totally based on Debian OS. As you all knows most of the web applications…

Read more

Setup Honeypot in Kali Linux with Pentbox

Well with the help of honeypot, you can easily monitor your own OS and can track every activity of the hacker or you can say that, its the best way to hack the…

Read more

How to use Steghide and StegoSuite Steganography Tools in Kali Linux

Well Steganography is one of the oldest technique used to hide data in a image, hide image into image and hide data in a video/audio etc. “You can easily hide any kind of…

Read more

Lalin – A Pentester’s Toolkit 2017

Lalin means Lazy Linux Toolkit. With the help of Lalin script, you can install so many penetration tools with just one click. The Lalin script is the advanced version of LazyKali script and…

Read more

Generate 100% FUD Backdoor with TheFatRat – Windows 10 Exploitation

As you all knows, Windows 10 is the latest edition of Microsoft having great security features but what if someone send a trojan/virus/backdoor/payload which is 100% FUD (Fully Undetectable) ? So basically, with…

Read more

Hack Android using Metasploit over LAN/WAN

In this article, we’ll be discuss about the exploitation of Android devices such as Tablets/Phones/Emulators etc using one of the most popular exploitation framework called as Metasploit Framework and MSFvenom. Here, we will…

Read more

Detection and Exploitation of OpenSSL Heartbleed Vulnerability using NMAP and METASPLOIT

In this article we will discuss how to detect and exploit systems that are vulnerable to the OpenSSL-Heartbleed vulnerability using Nmap and Metasploit on Kali Linux. Around 200000+ servers are still vulnerable to…

Read more

How to install Searchsploit in Kali Linux – An Exploit-DB Search Tool

Exploit-DB is one of the most popular platform for their collection of exploits and whitepapers related to Linux/Windows/Assembly/Web/DOS etc. Exploit-DB is the ultimate archive of exploits, shellcode, and security whitepapers. You can easily…

Read more

HTML – Questions With Answers – 151 to 175 Questions – SET 7

Q151. Fill in the blank: ____________ tags surround each item in a select menu. Answer – option tags surround each item in a select menu. Q152. True/False: The fieldset tag is used to…

Read more

How to identify the Operating System using PING Command

Well as you all knows, To identify the name of OS(Operating System) using Nmap is very easy, but you can also identify the OS name with the help of Ping Command. For Linux…

Read more

Top 16 SEO Performance Factors for better Optimization

A web page is composed of multiple features. There are so many SEO tools are also available through which you can also boost your SEO ranking in short manner. Here are the ones…

Read more

Malware evasion techniques – 2017 Update

Technology advances have significantly changed our lives during the past decade. We rely on computers of various sorts for even the simplest of daily tasks and become stressed when they are not available…

Read more

How to deal with Petya Ransomware – Prevention Tips 2017

As you all knows, recently Petya Ransomware comes into existence and affected more than 65+ countries. Many organizations in Europe and the US have been affected by this ransomware attack. Although its not…

Read more

After Wannacry, Now its Petya Ransomware hits worldwide

As you all knows Wannacry or Wcry Ransomware already created a havoc across the globe and now within the span of just 2 months, a new ransomware named as Petya Ransomware hits globally…

Read more

HTML – Questions With Answers – 126 to 150 Questions – SET 6

Q126. True/False: To add a caption to a table, you use the caption attribute in the opening table tag. Answer – False. Q127. If you include a thead or a tfoot group in…

Read more

How to start a website – Complete Guide 2017

Whether you want to start a website for fun or to make money, you’ll first have to learn how to make a website. Making a website is not difficult at all. In fact…

Read more

Interesting to look out top 100 richest bitcoin addresses

Bitcoin is a form of digital currency, created and held electronically. No one controls it. Bitcoins aren’t printed, like dollars or euros – they’re produced by people, and increasingly businesses, running computers all…

Read more

HTML – Questions With Answers – 101 to 125 Questions – SET 5

Q101. True/False: A link to a multimedia file is the same as any other link because it also uses the a tag. Answer – True. Q102. What is the purpose of the param…

Read more

9 Steps to Ensure your organization is secure

To protect your business, an end-to-end security strategy that encompasses these many considerations is a must. Defining and communication your board’s information Risk Regime is central to your organization’s overall cyber security strategy….

Read more

3 Bitcoin Addresses has been identified – Ransomware Attack 12 May 2017

An recent ransomware attack that affected more than 100k+ systems on Friday(12th May 2017) has spread to 90+ countries, locking doctors in the U.K. out of patient records at NHS. The attack has…

Read more

Microsoft Security Update 14 May 2017 Released after Ransomware Attack

Microsoft has provided a security update for all customers to protect Windows platforms that are in custom support only, including Windows XP, Windows 8, and Windows Server 2003. And if you are using…

Read more