Disable XML-RPC in WordPress with 3 different ways

XML-RPC is a remote procedure call which uses XML to to encode its calls and HTTP as a transport mechanism. XML-RPC can be called as a system which enable user to publish post…

Read more

Change WordPress Salt Keys Automatically with Salt Shaker

These days, everyone has a good reason to have a website. It’s not just large companies anymore. Individuals, families, and small or independent businesses all need to have one. Some individuals and small businesses don’t…

Read more

How to get the MAC Address – 10 Different Methods – Kali Linux

A media access control address (MAC address) of a device is a unique identifier assigned to a network interface controller (NIC) for communications at the data link layer of a network segment. MAC…

Read more

Perform DOS Attack with 5 Different Tools – 2018 Update

Typically, a Penetration Testing exercise is focused on identifying the gaps in security rather than harming a system. This is a key feature that separates a real attacker from an authorized Penetration Tester….

Read more

[Exploitation] Apache Struts OGNL Code Execution Vulnerability – CVE-2017-9791

Apache Struts Framework is one of the most popular framework for developing java based web applications and is widely used by so many big companies. Apache Struts has been started in year 2000…

Read more

25 Easy ways to speed up your website – June 2018 Tips and Tricks

There are some great resources for analyzing your site’s speed such as Google’s PageSpeed Insights, Website Grader, and GTMetrix are the most popular. All services will analyze your site and tell you where…

Read more

Protect WordPress Admin Directory – HTTP Authentication

Hacking the WordPress Core can make it very difficult to upgrade to the latest version of WordPress. Keeping WordPress current is an important step in overall web site security. If any security vulnerability is…

Read more

SQL Injection Prevention – A Practical Approach

SQL injection is a technique, used to attack data-driven applications. Using this method, hackers will try to execute their SQL statements within your application and access your database data. Here is an example…

Read more

Types of Malware – Minimal Guide

Malware is unfortunately far too common to ignore or be unaware of in this day and age. So this article should hopefully remedy some of the common questions. We guess the first one…

Read more

Useful Commands while performing Local Enumeration in UNIX

Enumeration is defined as the process of extracting user names, machine names, network resources, shares and services from a system. In this phase, the attacker creates an active connection to the system and…

Read more

CTF – Billu B0x – Walkthrough step by step

Billu:B0x VM is created by one of the most popular Indian Ethical Hacker named as “Manish Kishan Tanwar” (a.k.a Indishell Hacker) who has created so many web shells in PHP language hosted at…

Read more

PHP – Minimal Guide for Beginners

PHP is a general-purpose scripting language especially suited for Web development. It is open-source and can be deployed on all major operating systems and web servers free of charge. It is imperative, reflective and…

Read more

Computer Printer MCQ With Answers – 25 Set

1. What are the two types of paper feeder mechanisms? A. Continuous tractor feed B. Continuous form feed C. Friction feed D. Injected 2. What type of printer is most likely to use…

Read more

Important UNIX Files and their Permissions

Early Unix systems were mainly commercial commodities like most software for sale; to run the operating system, you generally had to pay for that right. In 1984 an engineer named Richard Stallman began work on…

Read more

Live Detection and Exploitation of WordPress xmlrpc.php File

Being as popular cms, it is no surprise that WordPress is often always under attack. Some 70% of Techno’s top 100 blogs are using WordPress as a Content Management System. XML-RPC on WordPress…

Read more

Installation and Configuration of Free SSL – sslforfree.com

Many aspects of our lives rely on the Internet and computers, including communications (email, cell phones, texting), transportation (traffic control signals, car engine systems, airplane navigation), government (birth/death records, social security, licensing, tax…

Read more

Palo Alto (PAN-OS) Exploitation CVE-2017-15944 – Live Demonstration

Last year, a critical remote code execution vulnerability was found in Palo Alto Network Firewalls by Philip Pettersson. Palo Alto Network Firewalls has a component called as PAN-OS whose versions 6.1.18, 7.0.18, 7.1.13,…

Read more

PHP Error Reporting – Minimal Guide

Error reporting is a good thing, right? It gives you valuable insight into why your application failed. It gives you useful information such as what happened and where it happened. This information is…

Read more

Adding a third party Module into Metasploit Framework

As we all knows, Metasploit Framework is one of the most popular exploitation framework. Often new modules and exploits are always developed for Metasploit on time to time by hackers and security researchers,…

Read more

30 Most Common Networking Interview Questions

Computer Networking Questions which we mentioned here in below article will definitely helps you to crack all kind of technical Interviews. Question 1: What is an Internet service provider? Answer: Internet service providers…

Read more

The Windows Registry – Minimal Guide

The Windows Registry is a database where all the information about a computer is stored. The Registry is used to store: Operating system configuration Application configuration information Hardware configuration information User security information Current…

Read more

Basic Understanding of UNIX File System

File systems in the UNIX family have never been very well organized. Various incompatible naming conventions are used simultaneously, and different types of files are scattered randomly around the namespace. In many cases,…

Read more