Wireless networks were first introduced in 1991. The wireless networking is an invention that makes it possible to transfer data packets over standard network protocols: the only difference is that it uses radio…
Read more
As you all knows, Kali Linux is one of the most popular penetration testing operating system having more than 400+ hacking tools pre-installed in it. Kali is the latest and greatest version of…
Read more
Previously we exploited a SQL injection vulnerable website with one of the most popular automated tool called as SQLMAP and now in this article, we’ll try to exploit the similar vulnerable website manually…
Read more
WP-Grab-Info is an open source tool through which you can easily detect the WordPress Version, Username, Theme Name and Plugins List. Install WP-Grab-Info in Kali Linux – To install this above said tool,…
Read more
Hello geeks, today we’ll show you some basic SQL Injection techniques with the help of Python and SQLMap. SQL injection is one of the most critical vulnerabilities till now and is still included…
Read more
Security is a state in which we ensure a proper gap between the threats and assets of an organization. We try to either move assets far away from threats or we try to…
Read more
The LaZagne project (A password recovery tool) is an open source application used to retrieve lots of passwords stored on a local computer. Each software stores its passwords using different techniques (plaintext, APIs, custom…
Read more
SQL injection is one of the most prominent vulnerabilities for web-based applications. In last article, we’ve used viSQL through which we scanned the whole server for SQL Injection vulnerabilities with the help of…
Read more
vBulletin is a professional, affordable community forum solution. It gives you an instant community that lets your users to interact, take part in discussions, ask questions, give answers and express opinions. The latest…
Read more
SQL injection occurs when an application processes user-provided data to create an SQL statement without first validating the input and then submits the statement to a database server for execution. When successfully exploited, SQL injection can give…
Read more
As per Wikipedia source, In cryptography and computer security, a man-in-the-middle attack (MITM) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each…
Read more
Monit is a small Open Source utility for managing and monitoring Unix systems. Monit conducts automatic maintenance and repair and can execute meaningful causal actions in error situations. Monit package is easily available…
Read more
As you all knows Touch command is used to create a quick file of any extension. Touch command can be used to modify the access/modification timestamps of files. You can even create a…
Read more
Spaghetti is a web application security scanner tool. It is designed to find various default and insecure files, configurations and misconfigurations. Spaghetti is built on python2.7 and can run on any platform which…
Read more
testssl.sh is pretty much portable/compatible. It is working on every Linux, Mac OS X, FreeBSD distribution, on MSYS2/Cygwin (slow). testssl.sh is a free command line tool which checks a server’s service on any…
Read more