Saturday , November 18 2017
Home / Kamran Mohsin (page 3)

Kamran Mohsin

Kamran Mohsin
I'm a software engineer by profession, a passionate and experienced web designer, developer and blogger. I use to work with programming languages on daily basis and works to get something new into my knowledge prior to what I had before. I write blogs about information security, WordPress, various ways to make money and more.

How to configure Proxychains with tor in Kali Linux

configure Proxychains with tor in Kali Linux

The goal of this tutorial is to configure proxychains with tor in Kali Linux in order to anonymize all the web traffic including network related traffic generated by various applications. Proxy chains has a great importance when it comes to anonymizing the traffic generated by footprinting and doing nmap to …

Read More »

Google Bangladesh hacked by Pakistani hackers

Google Bangladesh hacked

Google’s Bangladesh domain came under attack by some Pakistani hackers. The said hackers altered the domain address in BTCL’s DNS entry to redirect users to a custom page. Google Bangladesh hacked. Pakistan-based hackers, going by the name Team Pak Cyber Attackers, allegedly hacked and defaced Google’s Bangladesh domain with a …

Read More »

Top 33 Wireless Attacking Tools by Kali

Wireless Attacking Tools

We have compiled a group of Wireless Attacking Tools available in Kali that are used for wireless attacks. Note: This post is for experimental purposes. 1. Aircrack-ng Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements …

Read More »

North Korea hacks South’s military cyber command

North Korea hacks

According to news released by BBC, South Korea’s military cyber command, set up to guard against hacking, appears to have been breached by North Korea, the military has said. A spokesman told the BBC that classified information was thought to have been stolen, although it is not clear exactly what …

Read More »

DailyMotion Allegedly Hacked, 85 Million User Accounts Stolen

daily motion hacked

This time one of the World’s leading video sharing platform Daily Motion is targeted by an unknown hacker. According to Bleeping Computer unknown hacker has supposedly breached video sharing platform DailyMotion and stolen details for 87.6 million accounts, belonging to approximately 85 million users, according to data breach index website …

Read More »

Introduction to HTTP Parameter Pollution

HTTP Parameter Pollution

HTTP Parameter Pollution, or HPP, occurs when a website accepts input from a user and uses it to make an HTTP request to another system without validating that user’s input. This can happen one of two ways, via the server (or back end) and via the client side. Supplying multiple …

Read More »

US Government wants you to hack US Military and Pentagon

US Government wants you to hack US Military and Pentagon

Usually you won’t see any organization or institution allowing you to hack their internal system for any cause but this time without getting into any trouble the US Military is allowing hackers a chance to point out vulnerabilities in their online systems. The permission is granted through a military-wide applicable, …

Read More »

U.S. Govt. Hackers Ready to Hit Back If Russia Tries to Disrupt Election

U.S. Govt. Hackers

According to NBCnews, U.S. military hackers have penetrated Russia’s electric grid, telecommunications networks and the Kremlin’s command systems, making them vulnerable to attack by secret American cyber weapons should the U.S. deem it necessary, according to a senior intelligence official and top-secret documents reviewed by NBC News. Russia no longer …

Read More »

Massive DDOS attack against Dyn DNS knocked out Popular Websites

ddos attack

According to krebsonsecurity, criminals this morning massively attacked Dyn, a company that provides core Internet services for Twitter, SoundCloud, Spotify, Reddit and a host of other sites, causing outages and slowness for many of Dyn’s customers. A widespread cyber-attack was carried out against some of the world’s biggest websites on …

Read More »

Czech police arrest Russian hacker tied to 2012 LinkedIn hack

Police in the Czech Republic have detained a Russian man suspected of participating in the breach of LinkedIn user information in 2012, the company said Wednesday. Czech police said the Russian was arrested in cooperation with the FBI within 12 hours, thanks to a rapid exchange of information with American …

Read More »

What is HTTP request/response header?

http header

World Wide Web commonly known as Web is a collection of electronic hyper text documents stored in a computer linked together like a spider’s web which can be accessed via internet. The web browser is a software program that acts like a computer program e.g firefox, chrome, safari (Web clients). …

Read More »

Russia no longer denies hacking DNC

russia no longer denies hacking dnc

WASHINGTON — U.S. officials blame hackers guided by the Russian government for the attacks on DNC servers earlier this year that resulted in WikiLeaks publishing about 20,000 private emails just before Hillary Clinton’s nominating convention in July. Russia no longer denies hacking DNC. Vladimir Putin said the hacking of thousands …

Read More »

Server-Side Includes (SSI) Injection

server side includes

SSI Injection (Server side Includes) is a server-side exploit technique that allows an attacker to send code into a web application, which will later be executed locally by the web server. SSI Injection SSI are generally the directives that are present on the web applications which are used to feed …

Read More »

Earn $1.5 million for hacking iPhone

hacking iPhone

One of the high marketplace private exploit seller Zerodium has tripled the price of iOS rewards. The engineers and penetration testers of Zerodium (a premium exploit platform) who purchases zero-day vulnerabilities and exploits decided to pay heavy rewards to researchers who are showing interest that ultimately results in discovering unknown …

Read More »

How do buffer overflow attack works?

buffer overflow

When a web application is launched a process is created in a CPU where PMU (Process Management Unit) allocates temporary storage in RAM which holds the data right before it is used by the application. Before going into buffer overflow attack we should learn what it really means. How Buffer …

Read More »