Tutorials

How to use Proxychains in Kali Linux OS

There are a lot of hackers and crackers around the world, some are good, and some are evil. Hackers always want to be anonymous while doing their work. Tools can be used in order to hide the hacker’s identity from being exposed such as VPN (Virtual Private Network), Proxy Servers and RDP (Remote Desktop Protocol) […]

Tutorials

From RFI(Remote File Inclusion) to Meterpreter Shell

For many years now we’ve participated in many coding forums and discussion platforms. Perhaps one of the biggest issues we see is people using $_GET or another unfiltered variable inside of an include, include_once, require or require_once statement which is a major security risk. One of the most dangerous types of vulnerabilities we can find […]

Tech Articles

The Top Security Vulnerabilities

Unvalidated data Never trust anything you get from a Web browser. The browser is completely outside of your control, and it’s easy to fake values like the HTTP referrer. It’s also easy to fake a hidden field in a form. More importantly, when dealing with forms, for example, validate the data carefully. Use a “deny all, […]

Tech News

North Korea vs USA – a Cyber War has been started

North Korea which is a democratic country located in East Asia whose capital is Pyongyang is continuously testing his hydrogen and nuclear bombs. As war of words heats up, even US President i.e. Trump says that “Second Option” would be Devasting for North Korea. According to recent reports, On Saturday, The Washington Post reported that […]

Tutorials

Hack Windows 10 using CHAOS Framework – 100% FUD

CHAOS is a framework based on Linux through which you can easily generate the payloads and control remote machines like Windows XP/Vista/7/8/8.1/10. In other language, you can say, CHAOS Framework is the minimal version of METASPLOIT FRAMEWORK, because it has limited functions which you can perform with your target but the best thing about CHAOS […]

Tutorials

Pythem – Multi-Purpose Pentest Framework 2017

Pythem is a multi-purpose pentest framework written in Python. It has been developed to be used by security researchers and security professionals. The tool intended to be used only for acts within the law. Features – Only runs on GNU/Linux OS. Based on Python Easy to install and use Supported attacks – ARP spoofing – […]

Tech Articles

About Banking Malwares and its Prevention – 2016 Guide

Today we’ll discuss about the hijack method used in banking sector i.e. botnets to steal money or some sensitive information from the user. What are these botnets used for? They are used for many different purposes like gathering private details, logins to websites, credit card information, bank logins, PayPal accounts etc. If you can use […]

Q&A

Web Hacking Questionnaire – FAQ

Question: What is a shell when it comes to web hacking? Answer: Well, basically a shell is an interface between client and server and comes up with an extension of .php. To make it works, hackers always uploaded this kind of PHP Shell into online web servers in order to make it work. When you […]