Saturday , November 18 2017
Home / Tag Archives: OTHERS

Tag Archives: OTHERS

Linux Essential Root Subdirectories

linux essential root subdirectories

In this article, let us review the Linux filesystem structures (linux essential root subdirectories) and understand the meaning of individual high-level directories. root contains every single file and directory starts from the root directory. Only root user has write privilege under this directory. bin contains binary programs (also known as …

Read More »

Exploit with OS Command Injection

OS command injection is an attack in which the goal is execution of arbitrary commands on the host operating system via a vulnerable application. Command injection attacks are possible when an application passes unsafe user supplied data (forms, cookies, HTTP headers etc.) to a system shell. the attacker-supplied operating system …

Read More »

Indian Ministry of Home Affairs website hacked

Ministry of Home Affairs website

The Ministry of Home Affairs website was hacked today, prompting authorities to temporarily block it, an official said. The MHA website was immediately blocked by the National Informatics Centre after hacking was noticed. Computer emergency response teams are looking into the incident, the official said. Further details were awaited. Last …

Read More »

Bypass HTTP Basic Authentication with Nmap and Metasploit

Bypass HTTP Basic Authentication

Basic HTTP authentication is a method for providing username and password when making a request for particular web resources. The client sends the user name and password as unencrypted base64 encoded text. When an anonymous request for protected resource is received by HTTP, it can force the use of Basic …

Read More »

Saudi Arabia again hit with disk-wiping malware Shamoon 2

malware Shamoon 2

Saudi Arabia has issued a warning to local organizations that the Shamoon virus that had hit state-held oil giant Saudi Aramco in 2012 has resurfaced in a new variant, Reuters reports, quoting an alert by the telecoms authority it had seen. The Shamoon 2, which completely wipes out computer disks, …

Read More »

How to configure Proxychains with tor in Kali Linux

configure Proxychains with tor in Kali Linux

The goal of this tutorial is to configure proxychains with tor in Kali Linux in order to anonymize all the web traffic including network related traffic generated by various applications. Proxy chains has a great importance when it comes to anonymizing the traffic generated by footprinting and doing nmap to …

Read More »

Google Bangladesh hacked by Pakistani hackers

Google Bangladesh hacked

Google’s Bangladesh domain came under attack by some Pakistani hackers. The said hackers altered the domain address in BTCL’s DNS entry to redirect users to a custom page. Google Bangladesh hacked. Pakistan-based hackers, going by the name Team Pak Cyber Attackers, allegedly hacked and defaced Google’s Bangladesh domain with a …

Read More »

Introduction to HTTP Parameter Pollution

HTTP Parameter Pollution

HTTP Parameter Pollution, or HPP, occurs when a website accepts input from a user and uses it to make an HTTP request to another system without validating that user’s input. This can happen one of two ways, via the server (or back end) and via the client side. Supplying multiple …

Read More »

Massive DDOS attack against Dyn DNS knocked out Popular Websites

ddos attack

According to krebsonsecurity, criminals this morning massively attacked Dyn, a company that provides core Internet services for Twitter, SoundCloud, Spotify, Reddit and a host of other sites, causing outages and slowness for many of Dyn’s customers. A widespread cyber-attack was carried out against some of the world’s biggest websites on …

Read More »

What is HTTP request/response header?

http header

World Wide Web commonly known as Web is a collection of electronic hyper text documents stored in a computer linked together like a spider’s web which can be accessed via internet. The web browser is a software program that acts like a computer program e.g firefox, chrome, safari (Web clients). …

Read More »

Russia no longer denies hacking DNC

russia no longer denies hacking dnc

WASHINGTON — U.S. officials blame hackers guided by the Russian government for the attacks on DNC servers earlier this year that resulted in WikiLeaks publishing about 20,000 private emails just before Hillary Clinton’s nominating convention in July. Russia no longer denies hacking DNC. Vladimir Putin said the hacking of thousands …

Read More »

Server-Side Includes (SSI) Injection

server side includes

SSI Injection (Server side Includes) is a server-side exploit technique that allows an attacker to send code into a web application, which will later be executed locally by the web server. SSI Injection SSI are generally the directives that are present on the web applications which are used to feed …

Read More »

Earn $1.5 million for hacking iPhone

hacking iPhone

One of the high marketplace private exploit seller Zerodium has tripled the price of iOS rewards. The engineers and penetration testers of Zerodium (a premium exploit platform) who purchases zero-day vulnerabilities and exploits decided to pay heavy rewards to researchers who are showing interest that ultimately results in discovering unknown …

Read More »

What is Man-in-the-middle attack (MITM)

man-in-the-middle

In computer security and cryptography (study of techniques for secure communication in the presence of third parties), man-in-the-middle is an attack where an attacker secretly keeps an eye on the communication happening in between two legitimate users while they are not aware of any external threat. Man-in-the-middle attack is one …

Read More »

36 Ways to Increase Blog Traffic Without Investing on Ads

increase blog traffic

Below described scenarios are truly researched from Authentic and well-known resources, who grew their blog traffic up to 100,000 in just a month. You might be thinking this is all done by advertising and promotions. Well, you aren’t thinking the right. To increase blog traffic this is all done by …

Read More »

Responsive WordPress Theme Freetheme wordpress magazine responsive freetheme wordpress news responsive freeWORDPRESS PLUGIN PREMIUM FREEDownload theme free