Menu

Blog

Trusted source of Cyber-Security and Ethical Hacking
What is Footprinting and Website ReconnaissanceInformation Gathering
What is Footprinting and Website Reconnaissance

Footprinting is a part of reconnaissance process which is used for gathering possible information about a target computer system or network.

FootprintingHostIPReconnaissanceWebsiteWhois
4 Ways Hackers Make Money using your Data or Credit CardUnclassifiable
4 Ways Hackers Make Money using your Data or Credit Card

Nowadays hackers are more cunning than ever, and shine with ingenuity in crafting schemes to steal your data or even take possession of your computer or [...]

BitcoinBlackHatCardersDarknetHackersScript Kiddies
How Hackers Exploit Struts2 on Linux and Windows ServersExploitation
How Hackers Exploit Struts2 on Linux and Windows Servers

The Jakarta Multipart Parser in Apache Struts 2 has incorrect exception handling and error-message generation during file-upload attempts.

ApacheJexbossLinuxMetasploitStruts2Windows
Top Password Cracking Techniques used by HackersCracking
Top Password Cracking Techniques used by Hackers

In general, most people will tend to set passwords that are easy to remember, such as a birthday, a first-name or last-name, a license plate or a phone number.

DictionaryHydraJohnJohnnyRainbowCrackBruteforce
SQL Injection Tutorial from Beginner to AdvancedExploitation
SQL Injection Tutorial from Beginner to Advanced

SQL Injection (SQLi) refers to an injection attack wherein an attacker can execute malicious SQL statements that control a web application's database server.

BlindInjectionMySQLSelectSQLITablesUnion
How to Find my IP Address using command line on LinuxNetworking
How to Find my IP Address using command line on Linux

How do I find my public IP address on the Linux and OS X Unix using my own bash shell script ? Is there command-line option which will show my dynamic IP?

BashCurlDIGIPOpenDNSProtocol
How to hide my IP Address using TorPhantomNetworking
How to hide my IP Address using TorPhantom

How to hide your IP ? TOR is one of the best available network to protect your identity. Its considered safe because of its highly cryptographic data transfer [...]

DNSLeakIptablesNodeTORCryptography
How to Create a Web-Based Javascript KeyloggerSniffing/Spoofing
How to Create a Web-Based Javascript Keylogger

Researchers estimate thousands of ecommerce sites are under attack by a single threat actor that has infected servers with a web-based keylogger.

InjectJavascriptjQueryKeyloggerKeystrokesPHP
How to Create a Reverse Shell to Remotely Execute CommandsExploitation
How to Create a Reverse Shell to Remotely Execute Commands

If you're lucky enough to find a command execution vulnerability during a penetration test, pretty soon afterwards you'll probably want to establish an [...]

BashNetcatPerlPHPPythonReverseRubyShellTelnet
The Most Useful Nmap Commands from Beginner to AdvancedInformation Gathering
The Most Useful Nmap Commands from Beginner to Advanced

Nmap is an open source tool for network exploration and security auditing. It was designed to rapidly scan large networks, although it works fine also against [...]

HostNmapPortProtocolScanningServices
Evading AntiVirus with Encrypted Payloads using VenomExploitation
Evading AntiVirus with Encrypted Payloads using Venom

Be able to bypass Antivirus can be very useful while penetration testing phases. Venom allow you to generate shellcode that work with encrypted payloads.

AntivirusDLLMetasploitMSIPayloadsPythonRubyVenom
Getting Started with Metasploit for Ethical HackingMetasploit
Getting Started with Metasploit for Ethical Hacking

As an Ethical Hacker, you will be using "Kali Distribution" or "Parrot" which has the Metasploit community version embedded in it along with other ethical [...]

AuxiliaryEncoderEvasionExploitPayloads