Home Blog Page 3

Time-Based Blind SQL Injection Attacks

Time-based techniques are often used to achieve tests when there is no other way to retrieve information from the database server. This kind of attack injects a SQL segment which contains specific DBMS function...

Blind XSS for Beginners

What is Blind XSS? It is a type of stored XSS where attackers input is saved by server and is reflected in a totally different application used by system admin/team member. Tools you can use for...

BlackArch ISO Download [ LATEST ISO ]

BlackArch Linux is an Arch Linux-based distribution designed for penetration testers and security researchers. It is supplied as a live DVD image that comes with several lightweight window managers, including Fluxbox, Openbox, Awesome and...

Download the free Kali Linux Book

Whether you’re new to infosec, or a seasoned security veteran, the free “Kali Linux Revealed” online course has something to teach you. The saying “You can’t build a great building on a weak foundation”...

Download Ubuntu 18.04 LTS (Bionic Beaver), What’s New

Download Ubuntu 18.04 LTS (Bionic Beaver) operating system for computers, IoT, and cloud environments. Ubuntu 18.04 ISO  Direct Download Link   Torrent Ubuntu Mate 18.04 ISO Direct Download Link   Torrent Ubuntu Budgie 18.04 ISO  Direct Download Link   Torrent Ubuntu Studio 18.04 ISO Direct...

[HOW TO] Debloat and Disable Android OEM with or without ROOT

Android OEMs usually ship with a long list of bloatware ( Apps pre-installed you may or may not need) that tend to interfere in the performance and activities of your mobile, make it slow...

Browser-based coin mining without a browser?

Browser-based cryptocurrency mining is making a lot of headlines recently and is affecting millions of users. This type of activity doesn’t take over your computer or steal your personal information, instead its goal is...

[Attack] iOS Trustjacking Exposes iPhones to Remote Hacking

Intro An iPhone user's worst nightmare is to have someone gain persistent control over his/her device, including the ability to record and control all activity without even needing to be in the same room. In...

Kali Linux 2018.1 Release

Kali Linux The Pentesting Distro and Hackers and Pentesters Favourite Linux Operating System has been Rolling Release for quite some time now but few days back Offensive Security ( The Kali Linux Team )...

[PATCH] Your Windows can be Hacked just Visiting a Website

What is the Vulnerability A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts, aka "Microsoft Graphics Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012...

Latest article

Setup Armitage in Kali Linux 2018

Armitage is a fantastic Java-based GUI front-end for the Metasploit Framework developed by Raphael Mudge. Its goal is to help security professionals better understand...

How to Find DNS Information : DNSEnum – Kali Linux

DNS Information is crucial when Hacking / Pen-testing is your interest. Different servers related to a Organization or domain are very important to narrow...

CEH V10 : Certified Ethical Hacker v10 Lab Tools Download

CEH V10 : Certified Ethical Hacker v10 Lab Tools Download. CEH v10 Lab Tools Download : Certified Ethical Hacker v10 Lab Tools download now,...

Popular Posts