Methodologies for Penetration Testing
These days cyber attacks occur not only in large companies but also in small businesses in countries like Mexico, Brazil, United States, Colombia, Costa Rica, Argentina, UAE, India etc accordingRead More →
These days cyber attacks occur not only in large companies but also in small businesses in countries like Mexico, Brazil, United States, Colombia, Costa Rica, Argentina, UAE, India etc accordingRead More →
Flaw allowed anyone to edit & take control over .as domains. A British security researcher that goes online only by the name of InfoSec Guy revealed today that American Samoa domainRead More →
Yesterday, a new ransomware called TrueCrypter was discovered by AVG malware analyst Jakub Kroustek. This ransomware encrypts your data using AES-256 encryption and then demands either .2 bitcoins or $115 USD inRead More →
Recently we observed an Android malware family being used to attack users in Russia. The malware samples were mainly distributed through a series of malicious subdomains registered under a legitimateRead More →
A list containing hundreds of Spotify account credentials – including emails, usernames, passwords, account type and other details – has popped up on the website Pastebin, in what appears to beRead More →
Facebook vulnerability breaks down the convenience of social login authentication. Insufficient security validation allows attackers to impersonate Internet users and gain password-less access to any of their online accounts. SocialRead More →
Hostile JavaScript delivered through ads installs ransomware on older Android phones. An ongoing drive-by attack is forcing ransomware onto Android smartphones by exploiting critical vulnerabilities in older versions of Google’s mobileRead More →
This guide is written for anyone wo is practicing hiw penetration skills using the Metasploitable 2. The problem that we are facing here is that we have to penetrate toRead More →
Exploit kit’s inner workings exposed as researchers help shut down its servers. Security researchers at Cisco Talos and Check Point have published reports detailing the inner workings of Nuclear, an “exploitRead More →
How I Hacked Facebook, and Found Someone’s Backdoor Script(English Version) Foreword As a pentester, I love server-side vulnerabilities more than client-side ones. Why? Because it’s way much cooler to takeRead More →