HTML – Questions With Answers – 201 to 225 Questions – SET 9

Q201. What two words should be avoided as link labels on a web page? Answer – “Click here” should be avoided as link labels on a web page. Q202. Fill in the blank:…

Read more

IIS Server Hardening – Banner Grabbing Prevention Techniques

IIS (Internet Information Server) is one of the most powerful web servers from Microsoft that is used to host your Web application. IIS has it’s own Process Engine to handle the request. So,…

Read more

Advanced Error Based SQL Injection Exploitation – Manually

Previously we exploited a SQL injection vulnerable website with one of the most popular automated tool called as SQLMAP and now in this article, we’ll try to exploit the similar vulnerable website manually…

Read more

Change Windows Password of Remote PC via METASPLOIT

To change windows password, the first step is to hack that system via Metasploit framework and it always depends upon the target OS, like which version your target is using. In this article,…

Read more

What we know so far about cryptographic vulnerabilities

Weak or home-grown algorithms A common mistake developers make is to use weak or flawed encryption/hashing algorithms. For example, many developers use md5 or sha1 as their hashing algorithm of choice. Using a…

Read more

Freaky! Join Samsung Bug Bounty Program – $200,000 Reward

A bug bounty program is a deal offered by many websites and software developers by which individuals can receive recognition and compensation for reporting bugs, especially those pertaining to exploits and vulnerabilities. And…

Read more

Detect WordPress User/Version/Theme/Plugins with WP-Grab-Info Tool

WP-Grab-Info is an open source tool through which you can easily detect the WordPress Version, Username, Theme Name and Plugins List. Install WP-Grab-Info in Kali Linux – To install this above said tool,…

Read more

Live SQL Injection Exploitation with SQLMap – A Detailed Guide

Hello geeks, today we’ll show you some basic SQL Injection techniques with the help of Python and SQLMap. SQL injection is one of the most critical vulnerabilities till now and is still included…

Read more

Participate in Bug Bounty Program of TOR 2017

The Tor Project just announced the launch of a public bug bounty program where you can easily earn the money in between $2,000 and $4,000 for high severity flaws. The Tor’s Bug Bounty…

Read more

More than 143 Million American Records has been Hacked

Equifax Inc. is a consumer credit reporting agency in the United States, considered one of the three largest American credit agencies along with Experian and TransUnion. Equifax is the oldest of the three…

Read more

Gloom – Linux Penetration Testing Framework

Security is a state in which we ensure a proper gap between the threats and assets of an organization. We try to either move assets far away from threats or we try to…

Read more

Retrieve all Passwords with LaZagne Project

The LaZagne project (A password recovery tool) is an open source application used to retrieve lots of passwords stored on a local computer. Each software stores its passwords using different techniques (plaintext, APIs, custom…

Read more

OOPS, OurMine Hackers itself Hacked by Turkish Hackers

OurMine is a security hacker group based on Saudi Arabia and recently this week, they hacked WikiLeaks.org website with DNS Poisoning Attack. In a statement shared on the Twitter account of one OurMine…

Read more

Privacy Protection on Windows 10 Operating System

Windows 10 helps you reduce the cost and complexity historically associated with managing and deploying Windows devices. With Windows as a service, you receive a continuous innovation so you are always up to…

Read more

Why Do Password Practices Matter – A Detailed Explanation?

Good password practices are critical for the following reasons: The most common form of attack on a corporate system is password guessing. On most systems, most untrusted services are protected primarily by passwords…

Read more

Earn FREE $10 Quickly with Ethereum Wallet

Ethereum is the one of the 2nd most popular digital currency after Bitcoin. As per latest stats ref. 1st Sept 2017, the value of 1 BTC and 1 ETH is: 1 BTC =…

Read more

Wikileaks Website Hacked by Saudi-Arabian Hacking Group OurMine

Another defacement attack just happened and this time wikileaks.org website has been hacked by OurMine Hacker which is a Saudi Arabian Hacking group who hacked so many websites last year. The group appears…

Read more

List of all HTTP Server Response Codes – 2017 Updated List

When you visit a web page, your computer’s web browser communicates with the web server of the website. Your web browser, also known as the client, submits a request to the web server…

Read more

SQLiv – Massive SQL Injection Scanner

SQL injection is one of the most prominent vulnerabilities for web-based applications. In last article, we’ve used viSQL through which we scanned the whole server for SQL Injection vulnerabilities with the help of…

Read more

Hack Windows/Linux using ARCANUS Framework – 100% FUD

ARCANUS is a customized payload generator/handler for penetration testing only. You can easily generate a payload for both OS i.e. Windows and Linux distributions with just a single click. The latest version of…

Read more

OWASP VBScan – A Black Box vBulletin Vulnerability Scanner

vBulletin is a professional, affordable community forum solution. It gives you an instant community that lets your users to interact, take part in discussions, ask questions, give answers and express opinions. The latest…

Read more