Saturday , October 21 2017

Earn $1.5 million for hacking iPhone

hacking iPhone

One of the high marketplace private exploit seller Zerodium has tripled the price of iOS rewards. The engineers and penetration testers of Zerodium (a premium exploit platform) who purchases zero-day vulnerabilities and exploits decided to pay heavy rewards to researchers who are showing interest that ultimately results in discovering unknown …

Read More »

How do buffer overflow attack works?

buffer overflow

When a web application is launched a process is created in a CPU where PMU (Process Management Unit) allocates temporary storage in RAM which holds the data right before it is used by the application. Before going into buffer overflow attack we should learn what it really means. How Buffer …

Read More »

Police arrested a man over Pippa Middleton iCloud hacking

Pippa Middleton iCloud hacking

Investigators have found out Pippa Middleton iCloud hacking was claimed by a 35 years old man. Pippa Middleton is an English socialite, author, columnist, and the younger sister of Catherine, Duchess of Cambridge. The man was arrested on suspicious account of computer misuse. Special team of investigators are still finding …

Read More »

What is DNS Spoofing? How to redirect traffic to fake website?

DNS Spoofing

DNS Spoofing is also known as DNS cache poisoning. It is malicious technique used by attackers to divert legitimate traffic to attacker’s fake website for his own sake. DNS Spoofing The main idea behind DNS spoofing is that attacker introduces a corrupt domain name in the DNS resolver’s cache, where …

Read More »

What is Man-in-the-middle attack (MITM)

man-in-the-middle

In computer security and cryptography (study of techniques for secure communication in the presence of third parties), man-in-the-middle is an attack where an attacker secretly keeps an eye on the communication happening in between two legitimate users while they are not aware of any external threat. Man-in-the-middle attack is one …

Read More »

Cross-Platform Malware can hack Windows, Linux, OS X Computers

Cross-Platform Malware can hack Windows, Linux, OS X Computers

The time moved on when a specially designed malware for any particular system was created. Recently at Kaspersky Lab researchers have discovered a malware that can run on cross-platform operating systems. The malware contains a payload that is designed to hack Windows, Linux and OS X Computers efficiently. Researchers discovered …

Read More »

Introduction to Ethical Hacking and Penetration Testing

Ethical Hacking and penetration testing

In this blog, I’m going to share a lot of modules that are obviously used in ethical hacking and penetration testing. Following are the modules I will be talking about in detail. Hacking Hackers and Types Vulnerabilities Exploits Programming Malwares Zero-day Vulnerability Zero-day Attack Defense in depth Strategy Penetration Testing …

Read More »

What is ARP Protocol, ARP Poisoning or ARP Spoofing and how it works?

ARP Protocol, ARP Poisoning or ARP Spoofing

As always, most of the people don’t have any background knowledge about hacking or particular type of topic we are discussing here today. So before moving ahead to ARP Protocol, ARP Poisoning or ARP Spoofing we should first learn what is ARP or ARP Protocol. What is ARP Protocol? Address …

Read More »

Hack with Cookie Poisoning, Cookie Stealing, Session Hijacking

Before learning session hijacking let’s learn session first. The connectivity between a client and server or client active to a website is known as session. We will learn to hack with Cookie Poisoning, Cookie Stealing, Session Hijacking. What is the purpose of a session? A web server is responsible for …

Read More »

How to earn money with Google Adsense without any website

This is a hot topic to learn about how to make money without having any website or plate form where you can share your content. Hundred of millions of website are using google adsense to earn money world wide where the web masters are sharing their quality content. The blog …

Read More »

OS Command Injection Vulnerability

Command Injection

Command Injection attack is also known as Arbitrary Code Execution. In Command Injection an attacker generally injects a malicious user input to the system functions which executes system shell commands based on the attacker’s input. The Command Injection vulnerability occurs when the web applications supplies vulnerable (unsafe) input fields to …

Read More »

How to detect code injection attack

code injection attack

Code injection is also known as PHP code injection. Code injection attack is an exploitation technique where a computer bug is exploited by injecting code into an application which is then executed by application itself. PHP code injection attacks are generally performed by injecting a PHP code into the PHP …

Read More »

How to Hack WiFi Passwords

Hack WiFi Passwords

Cracking of wireless networks is the defeating of security devices in Wireless local-area networks. Wireless local-area networks(WLANs) – also called Wi-Fi networks are inherently vulnerable to security lapses that wired networks are exempt from – Hack WiFi Passwords Cracking is a kind of information network attack that is akin to …

Read More »

Vulnerable SQL Websites list 2017 – Updated

SQL Injection is very popular OWASP top 10 vulnerbility which allows you to hack any website that has the vulnerability. Do you want to learn how to hack websites with SQL Injection, click here on my recent blog to get practical demonstration of SQL attack. Below given is the Vulnerable …

Read More »

What is Cross Site Request Forgery Attack (CSRF)?

cross site request forgery

Cross Site Request Forgery attack is represented by different terminologies e.g One-Click Attack, Session Riding and CSRF or XSRF. CSRF & XSS While we had learnt about Cross Site Scripting (short for XSS), let’s try to learn the different between cross site request forgery and cross site scripting. In XSS, …

Read More »

Responsive WordPress Theme Freetheme wordpress magazine responsive freetheme wordpress news responsive freeWORDPRESS PLUGIN PREMIUM FREEDownload theme free