Saturday , May 26 2018
Home / Tag Archives: Ethical Hacking

Tag Archives: Ethical Hacking

Pakistan First OSCE Certified

Pakistan First OSCE Certified

Etizaz Mohsin is Pakistan first OSCE Certified who successfully achieved Offensive Security Certified Expert Certification (OSCE) along with Offensive Security Certified Professional Certification (OSCE). Read more about him. OSCE Pakistan – OSCE in Pakistan – Pakistan first OSCE – First OSCE in Pakistan – Pakistan OSCE Overview Offensive Security Certified …

Read More »

How To Configure SSH Key-Based Authentication on a Linux Server

SSH Key-Based Authentication

Introduction to SSH Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. The best known example application is for remote login to computer systems by users. (wikipedia) SSH known as secure shell is an encrypted protocol that is used to administer and …

Read More »

Sarahah secretly steals your contact list and personal details

Sarahah secretly steals contact list personal details

Sarahah application hits Google and Apple online stores, sources discovered that 18 million people are estimated to have downloaded the application. Since the viral application ranks 3rd most free downloaded app title on iphone and ipad. Sarahah motivates its users to “get honest feedback from your coworkers and friends”. Since …

Read More »

OSCP / PWK Exam Review

oscp review by aitezaz mohsin

Overview Offensive Security Certified Professional Certification is self proclaimed to be the first hands-on offensive information security certification, built and designed to challenge OSCP students to prove they have a clear and practical understanding of the penetration testing process and life-cycle. An Offensive Security Certified Professional (OSCP) has to go …

Read More »

NadraGate Part 2 – PaperPk 200,000 Users Data At Risk

PaperPk 200,000 Users Data At Risk

PaperPk.com is an online Jobs Searching platform like Rozee.pk where the users can find jobs from all newspapers ads. All latest jobs are mostly advertised in newspapers like Jang , Dawn and Express Daily so people would likely have to buy a newspaper else if they are unable to buy a newspaper, they …

Read More »

Trump says China could have hacked Democratic emails

hacking news

President Donald Trump said China may have hacked the emails of Democratic officials to meddle with the 2016 presidential election, countering the view of U.S. intelligence officials who have said Moscow orchestrated the hacks. (The post was originally published by Reuters) In an interview transcript published on Sunday, Trump gave …

Read More »

Linux Essential Root Subdirectories

linux essential root subdirectories

In this article, let us review the Linux filesystem structures (linux essential root subdirectories) and understand the meaning of individual high-level directories. root contains every single file and directory starts from the root directory. Only root user has write privilege under this directory. bin contains binary programs (also known as …

Read More »

After NSA hacking expose, CIA staffers asked where Equation Group went wrong

NSA hacking expose

Two days after researchers exposed a National Security Agency-tied hacking group that operated in secret for more than a decade, CIA hackers convened an online discussion aimed at preventing the same kind of unwelcome attention. The thread, according to a document WikiLeaks published Tuesday, was titled “What did Equation do wrong, …

Read More »

CIA cyber-spying toolkit now in hands of hackers worldwide: WikiLeaks

CIA cyber-spying toolkit now in hands of hackers worldwide

Amid a trove of documents released by WikiLeaks that allegedly contains “the entire hacking capacity of the CIA” is chilling evidence that everyday devices like smart TVs and cell phones have potentially become critical tools in the effort to spy on American citizens – CIA cyber-spying. Documents released in the …

Read More »

Hacking Facebook pages possible, but not probable, experts say

Hacking Facebook pages

This content was originally published by RegisterNewDomain. Original publishers retain all rights. James Lang, a selectman candidate before he was eliminated in February’s preliminary election, was caught with Facebook posts disparaging Muslims. He apologized, told The Sun Chronicle he would quit the race, and shut down his Facebook page. Two …

Read More »

Your child’s teddy bear could now be vulnerable to hacking

vulnerable to hacking

This content was originally published by MarketWatch. Original publishers retain all rights. Two million recordings between parents and children were exposed to potential hackers. Wi-Fi connected teddy bears are plush, huggable, talkative — and, in some cases, hackable. Advertised as “a message you can hug,” CloudPets toy company allows parents …

Read More »

Exploit with OS Command Injection

OS command injection is an attack in which the goal is execution of arbitrary commands on the host operating system via a vulnerable application. Command injection attacks are possible when an application passes unsafe user supplied data (forms, cookies, HTTP headers etc.) to a system shell. the attacker-supplied operating system …

Read More »

Indian Ministry of Home Affairs website hacked

Ministry of Home Affairs website

The Ministry of Home Affairs website was hacked today, prompting authorities to temporarily block it, an official said. The MHA website was immediately blocked by the National Informatics Centre after hacking was noticed. Computer emergency response teams are looking into the incident, the official said. Further details were awaited. Last …

Read More »

Bypass HTTP Basic Authentication with Nmap and Metasploit

Bypass HTTP Basic Authentication

Basic HTTP authentication is a method for providing username and password when making a request for particular web resources. The client sends the user name and password as unencrypted base64 encoded text. When an anonymous request for protected resource is received by HTTP, it can force the use of Basic …

Read More »

Saudi Arabia again hit with disk-wiping malware Shamoon 2

malware Shamoon 2

Saudi Arabia has issued a warning to local organizations that the Shamoon virus that had hit state-held oil giant Saudi Aramco in 2012 has resurfaced in a new variant, Reuters reports, quoting an alert by the telecoms authority it had seen. The Shamoon 2, which completely wipes out computer disks, …

Read More »

Responsive WordPress Theme Freetheme wordpress magazine responsive freetheme wordpress news responsive freeWORDPRESS PLUGIN PREMIUM FREEDownload theme free