All for Joomla All for Webmasters

NadraGate Part 2 – PaperPk 200,000 Users Data At Risk

PaperPk 200,000 Users Data At Risk
PaperPk.com is an online Jobs Searching platform like Rozee.pk where the users can find jobs from all newspapers ads. All latest jobs are mostly advertised in newspapers like Jang , Dawn and Express Daily so people would likely have to buy a newspaper else if they are unable to buy a newspaper, they use to look for online job searching platforms where...

OS Command Injection Vulnerability

Command Injection
Command Injection attack is also known as Arbitrary Code Execution. In Command Injection an attacker generally injects a malicious user input to the system functions which executes system shell commands based on the attacker's input. The Command Injection vulnerability occurs when the web applications supplies vulnerable (unsafe) input fields to the malicious users to input harmful (malicious) data such as...

How to detect code injection attack

code injection attack
Code injection is also known as PHP code injection. Code injection attack is an exploitation technique where a computer bug is exploited by injecting code into an application which is then executed by application itself. PHP code injection attacks are generally performed by injecting a PHP code into the PHP based vulnerable application. The attacks are generally possible because...

Vulnerable SQL Websites list 2017 – Updated

SQL Injection is very popular OWASP top 10 vulnerbility which allows you to hack any website that has the vulnerability. Do you want to learn how to hack websites with SQL Injection, click here on my recent blog to get practical demonstration of SQL attack. Below given is the Vulnerable SQL Websites list of 2016. These non sanitized website...

RFI – LFI File Inclusion Attacks – Mitigations

file inclusion
Similar to all other cyber attacks RFI - LFI file inclusion attacks also carries a strong importance when it comes to data breach. In other words we can describe it as why the server isn't working to load my webpages. File Inclusion File inclusion is a type of vulnerability that allows an attacker to include a file on the Server without...

Finding WordPress Vulnerabilities Using WpScan

WordPress Vulnerabilities
WordPress is the most popular online publishing platform, currently powering more than 26% of the web. There are approximately 76.5 million WordPress blogs. WordPress is an Open Source and anyone can start a blog or build a website in seconds without any technical knowledge. It is very easy to use. Secondly many WordPress Blogs are hacked everyday due to different vulnerabilities. WordPress...

Millions Of LG G3 Smartphones Users Affected By ‘SNAP’ Vulnerability

lg g3
// Researcher have discovered a serious flaw in LG G3 Android smartphones which could lead to data theft, denial of service (DoS) attacks and phishing attacks. This vulnerability “SNAP” (Smart Notice app) was identified by BugSec researchers Shachar Korot and Liran Segal. The vulnerability was discovered in LG smartphone Notice notification app and allows an attacker to launch arbitrary JavaScript code...

What are Network Vulnerabilities? Risks, Threats, Attacks?

// What is network Vulnerability? Network vulnerability is a cyber-security term that refers to a flaw in a system that can leave it open to attack. A vulnerability may also refer to any type of weakness in a computer system itself, in a set of procedures, or in anything that leaves information security exposed to a threat. In computer security, a...