Friday , May 22 2020

Cross-Platform Malware can hack Windows, Linux, OS X Computers

Cross-Platform Malware can hack Windows, Linux, OS X Computers

The time moved on when a specially designed malware for any particular system was created. Recently at Kaspersky Lab researchers have discovered a malware that can run on cross-platform operating systems. The malware contains a payload that is designed to hack Windows, Linux and OS X Computers efficiently. Researchers discovered …

Read More »

Introduction to Ethical Hacking and Penetration Testing

Ethical Hacking and penetration testing

In this blog, I’m going to share a lot of modules that are obviously used in ethical hacking and penetration testing. Following are the modules I will be talking about in detail. Hacking Hackers and Types Vulnerabilities Exploits Programming Malwares Zero-day Vulnerability Zero-day Attack Defense in depth Strategy Penetration Testing …

Read More »

What is ARP Protocol, ARP Poisoning or ARP Spoofing and how it works?

ARP Protocol, ARP Poisoning or ARP Spoofing

As always, most of the people don’t have any background knowledge about hacking or particular type of topic we are discussing here today. So before moving ahead to ARP Protocol, ARP Poisoning or ARP Spoofing we should first learn what is ARP or ARP Protocol. What is ARP Protocol? Address …

Read More »

Hack with Cookie Poisoning, Cookie Stealing, Session Hijacking

Before learning session hijacking let’s learn session first. The connectivity between a client and server or client active to a website is known as session. We will learn to hack with Cookie Poisoning, Cookie Stealing, Session Hijacking. What is the purpose of a session? A web server is responsible for …

Read More »

How to earn money with Google Adsense without any website

This is a hot topic to learn about how to make money without having any website or plate form where you can share your content. Hundred of millions of website are using google adsense to earn money world wide where the web masters are sharing their quality content. The blog …

Read More »

OS Command Injection Vulnerability

Command Injection

Command Injection attack is also known as Arbitrary Code Execution. In Command Injection an attacker generally injects a malicious user input to the system functions which executes system shell commands based on the attacker’s input. The Command Injection vulnerability occurs when the web applications supplies vulnerable (unsafe) input fields to …

Read More »

How to detect code injection attack

code injection attack

Code injection is also known as PHP code injection. Code injection attack is an exploitation technique where a computer bug is exploited by injecting code into an application which is then executed by application itself. PHP code injection attacks are generally performed by injecting a PHP code into the PHP …

Read More »

Responsive WordPress Theme Freetheme wordpress magazine responsive freetheme wordpress news responsive freeWORDPRESS PLUGIN PREMIUM FREEDownload theme free