Website Hacking With CSRF Attack

  ross Site Request Forgery Attack is also known as CSRF or XSRF in short. Do not confuse it with Cross Site Scripting attack because it is totally different from that. Like SQL injection and XSS, CSRF is also one in top

Read More

The SSL Certificate and Your Website’s Security

When you are surfing the internet, a lot of information is being exchanged between the web host and the device being used to surf the internet. This type of information can always be easily breached by hackers, especially if it involves online

Read More

wifite – Mass Wifi WEP/WPA Key Cracking Tool

wifite is created to to attack multiple WEP and WPA encrypted networks at the same time. This tool is customizable to be automated with only a few arguments and can be trusted to run without supervision. Features sorts targets by power (in

Read More

Snort – Free Network Intrusion Detection & Prevention System

Snort is an open-source, lightweight, free network intrusion detection system (NIDS) software for Linux and Windows to detect emerging threats. It’s capable of of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching, and

Read More

Gophish – Open-Source Phishing Framework

Gophish is a phishing framework that makes the simulation of real-world phishing attacks very straight forwards. The idea behind gophish is simple – make industry-grade phishing training available to everyone. Features One-click Installation Standalone, portable binary with static assets Point-and-click Phishing Beautiful

Read More

SSL Handshake Simple Definition

Simple definition of how the SSL handshake works: The SSL uses asymmetric encryption to privately share the common password to be used later in the communication for symmetric encryption. SSL Handshake: The client initiates the connection and says he wants to connect

Read More

Cyborg Hawk Linux – Penetration Testing Linux Distro

Cyborg Hawk Linux is a Ubuntu (Linux) based Penetration Testing Linux Distro developed and designed for ethical hackers and penetration testers. Cyborg Hawk Distro can be used for network security and assessment and also for digital forensics. It also has various tools

Read More

Chat Using Command Prompt

To Chat Using Command Prompt Perform the following Steps Step1-You would require the IP Address of the person you wish to chat. Step2-Open Your Notepad and type the  following code. @echo off: A Cls echo MESSENGER set /p n=User: set /p m=Message:

Read More

Acunetix Free Manual Pen Testing Tools

Acunetix Free Manual Pen Testing Tools allow penetration testers to further automated testing. Use the HTTP Editor to modify or craft HTTP requests and analyze responses, intercept and modify HTTP traffic on the fly using the integrated HTTP Sniffer, fuzz HTTP requests

Read More

Symantec Endpoint Protection Manager 12.1 Password Reset

Symantec haven’t included this utility in version 12.1. Instead you can use the Forgotten Password link on the logon screen. The main problem is that if you haven’t set up email server settings in the Manager console previously this won’t be any

Read More

Buy Me A Coffee
Thank you for visiting. You can now buy me a coffee!