Home Tags Vulnerabilties

Tag: Vulnerabilties

privilege escalation in metasploitable 2 machine

Privilege Escalation in Metasploitable 2 Machine

After a break of months, I finally urged myself to start writing information security blogs again. Hope, I do my best to deliver a...

Russia’s ‘Dragonfly’ hacker group attacks on US energy grids

The Trump Administration for the first time has publicly accused Moscow of cracking into U.S. power stations. The Department of Homeland Security has said...

How To Configure SSH Key-Based Authentication on a Linux Server

Introduction to SSH Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. The best known example application...

NadraGate Part 2 – PaperPk 200,000 Users Data At Risk

PaperPk.com is an online Jobs Searching platform like Rozee.pk where the users can find jobs from all newspapers ads. All latest jobs are mostly advertised in...

Linux Essential Root Subdirectories

In this article, let us review the Linux filesystem structures (linux essential root subdirectories) and understand the meaning of individual high-level directories. root contains...

After NSA hacking expose, CIA staffers asked where Equation Group went...

Two days after researchers exposed a National Security Agency-tied hacking group that operated in secret for more than a decade, CIA hackers convened an online...

CIA cyber-spying toolkit now in hands of hackers worldwide: WikiLeaks

Amid a trove of documents released by WikiLeaks that allegedly contains “the entire hacking capacity of the CIA” is chilling evidence that everyday devices...

Exploit with OS Command Injection

OS command injection is an attack in which the goal is execution of arbitrary commands on the host operating system via a vulnerable application....

Bypass HTTP Basic Authentication with Nmap and Metasploit

Basic HTTP authentication is a method for providing username and password when making a request for particular web resources. The client sends the user...

Saudi Arabia again hit with disk-wiping malware Shamoon 2

Saudi Arabia has issued a warning to local organizations that the Shamoon virus that had hit state-held oil giant Saudi Aramco in 2012 has...

How to configure Proxychains with tor in Kali Linux

The goal of this tutorial is to configure proxychains with tor in Kali Linux in order to anonymize all the web traffic including network...

Google Bangladesh hacked by Pakistani hackers

Google’s Bangladesh domain came under attack by some Pakistani hackers. The said hackers altered the domain address in BTCL’s DNS entry to redirect users...

Top 33 Wireless Attacking Tools by Kali

We have compiled a group of Wireless Attacking Tools available in Kali that are used for wireless attacks. Note: This post is for experimental purposes. 1....

North Korea hacks South’s military cyber command

According to news released by BBC, South Korea's military cyber command, set up to guard against hacking, appears to have been breached by North...

DailyMotion Allegedly Hacked, 85 Million User Accounts Stolen

This time one of the World's leading video sharing platform Daily Motion is targeted by an unknown hacker. According to Bleeping Computer unknown hacker...