Tutorials

From RFI(Remote File Inclusion) to Meterpreter Shell

For many years now we’ve participated in many coding forums and discussion platforms. Perhaps one of the biggest issues we see is people using $_GET or another unfiltered variable inside of an include, include_once, require or require_once statement which is a major security risk. One of the most dangerous types of vulnerabilities we can find […]

Articles

The Top Security Vulnerabilities

Unvalidated data Never trust anything you get from a Web browser. The browser is completely outside of your control, and it’s easy to fake values like the HTTP referrer. It’s also easy to fake a hidden field in a form. More importantly, when dealing with forms, for example, validate the data carefully. Use a “deny all, […]

Tech News

North Korea vs USA – a Cyber War has been started

North Korea which is a democratic country located in East Asia whose capital is Pyongyang is continuously testing his hydrogen and nuclear bombs. As war of words heats up, even US President i.e. Trump says that “Second Option” would be Devasting for North Korea. According to recent reports, On Saturday, The Washington Post reported that […]