Tuesday , August 22 2017
Home / Tag Archives: Hacking

Tag Archives: Hacking

NadraGate Part 2 – PaperPk 200,000 Users Data At Risk

PaperPk 200,000 Users Data At Risk

PaperPk.com is an online Jobs Searching platform like Rozee.pk where the users can find jobs from all newspapers ads. All latest jobs are mostly advertised in newspapers like Jang , Dawn and Express Daily so people would likely have to buy a newspaper else if they are unable to buy a newspaper, they …

Read More »

Trump says China could have hacked Democratic emails

hacking news

President Donald Trump said China may have hacked the emails of Democratic officials to meddle with the 2016 presidential election, countering the view of U.S. intelligence officials who have said Moscow orchestrated the hacks. (The post was originally published by Reuters) In an interview transcript published on Sunday, Trump gave …

Read More »

Russian man gets longest-ever US hacking sentence, 27 years in prison

Russian hacker

Russian hacker Roman Seleznev was sentenced to 27 years in prison today. He was convicted of causing more than $169 million in damage by hacking into point-of-sale computers. Seleznev, aka “Track2,” would hack into computers belonging to both small businesses and large financial institutions, according to prosecutors. He was arrested in the Maldives in 2014 with …

Read More »

CIA cyber-spying toolkit now in hands of hackers worldwide: WikiLeaks

CIA cyber-spying toolkit now in hands of hackers worldwide

Amid a trove of documents released by WikiLeaks that allegedly contains “the entire hacking capacity of the CIA” is chilling evidence that everyday devices like smart TVs and cell phones have potentially become critical tools in the effort to spy on American citizens – CIA cyber-spying. Documents released in the …

Read More »

Your child’s teddy bear could now be vulnerable to hacking

vulnerable to hacking

This content was originally published by MarketWatch. Original publishers retain all rights. Two million recordings between parents and children were exposed to potential hackers. Wi-Fi connected teddy bears are plush, huggable, talkative — and, in some cases, hackable. Advertised as “a message you can hug,” CloudPets toy company allows parents …

Read More »

Exploit with OS Command Injection

OS command injection is an attack in which the goal is execution of arbitrary commands on the host operating system via a vulnerable application. Command injection attacks are possible when an application passes unsafe user supplied data (forms, cookies, HTTP headers etc.) to a system shell. the attacker-supplied operating system …

Read More »

Indian Ministry of Home Affairs website hacked

Ministry of Home Affairs website

The Ministry of Home Affairs website was hacked today, prompting authorities to temporarily block it, an official said. The MHA website was immediately blocked by the National Informatics Centre after hacking was noticed. Computer emergency response teams are looking into the incident, the official said. Further details were awaited. Last …

Read More »

Bypass HTTP Basic Authentication with Nmap and Metasploit

Bypass HTTP Basic Authentication

Basic HTTP authentication is a method for providing username and password when making a request for particular web resources. The client sends the user name and password as unencrypted base64 encoded text. When an anonymous request for protected resource is received by HTTP, it can force the use of Basic …

Read More »

Saudi Arabia again hit with disk-wiping malware Shamoon 2

malware Shamoon 2

Saudi Arabia has issued a warning to local organizations that the Shamoon virus that had hit state-held oil giant Saudi Aramco in 2012 has resurfaced in a new variant, Reuters reports, quoting an alert by the telecoms authority it had seen. The Shamoon 2, which completely wipes out computer disks, …

Read More »

How to configure Proxychains with tor in Kali Linux

configure Proxychains with tor in Kali Linux

The goal of this tutorial is to configure proxychains with tor in Kali Linux in order to anonymize all the web traffic including network related traffic generated by various applications. Proxy chains has a great importance when it comes to anonymizing the traffic generated by footprinting and doing nmap to …

Read More »

Top 33 Wireless Attacking Tools by Kali

Wireless Attacking Tools

We have compiled a group of Wireless Attacking Tools available in Kali that are used for wireless attacks. Note: This post is for experimental purposes. 1. Aircrack-ng Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements …

Read More »

North Korea hacks South’s military cyber command

North Korea hacks

According to news released by BBC, South Korea’s military cyber command, set up to guard against hacking, appears to have been breached by North Korea, the military has said. A spokesman told the BBC that classified information was thought to have been stolen, although it is not clear exactly what …

Read More »

DailyMotion Allegedly Hacked, 85 Million User Accounts Stolen

daily motion hacked

This time one of the World’s leading video sharing platform Daily Motion is targeted by an unknown hacker. According to Bleeping Computer unknown hacker has supposedly breached video sharing platform DailyMotion and stolen details for 87.6 million accounts, belonging to approximately 85 million users, according to data breach index website …

Read More »

Introduction to HTTP Parameter Pollution

HTTP Parameter Pollution

HTTP Parameter Pollution, or HPP, occurs when a website accepts input from a user and uses it to make an HTTP request to another system without validating that user’s input. This can happen one of two ways, via the server (or back end) and via the client side. Supplying multiple …

Read More »

US Government wants you to hack US Military and Pentagon

US Government wants you to hack US Military and Pentagon

Usually you won’t see any organization or institution allowing you to hack their internal system for any cause but this time without getting into any trouble the US Military is allowing hackers a chance to point out vulnerabilities in their online systems. The permission is granted through a military-wide applicable, …

Read More »

Responsive WordPress Theme Freetheme wordpress magazine responsive freetheme wordpress news responsive freeWORDPRESS PLUGIN PREMIUM FREEDownload theme free