"How to get a security clearance" is one of the most asked questions we get. This article will answer most of those … [Read More...]
Featured Articles
What is a Cloning Attack?
A cloning attack refers to a type of threat in which a trusted resource is copied and used by an attacker. The cloned … [Read More...]
Browser In The Browser (BITB) Attack
Credentials Stealing Ever wondered how your credentials can be stolen from SSO (Single Sign-On)? How a legit-looking … [Read More...]
Editorial Picks
Latest Blog Updates
Autopsy Kali Linux – Demo of The Best Digital Forensic
To acquire a forensically sound copy or disk image, we need appropriate media to analyze the files. To rule out a media as forensically good copy, we need to verify the integrity and authenticity of the data. So, it will be similar to the original composition. It is necessary to document every step of the way and capture appropriate images that state the examination is running correctly. So, the documenting phase is crucial for forensic imaging. Linux distribution system also has live "Forensic mode." It is an integrated feature to interact with data stored on a drive without breaking the system. Backtrack … [Read More...]
How to Perform Penetration testing using Hakku Framework?
Hakku framework is an open-source penetration testing platform. It can be used to perform web and network-related penetration testing, like information gathering and vulnerabilities assessment tasks. The framework has multiple modules that are classified into the following groups. 1) Web Modules 2) Network Modules 3) Wireless & Bluetooth Modules 4) File Modules 5) Generator Modules The Web and Network are the main modules in the Hakku framework. The web modules are mostly related to information gathering. The majority of the network modules can be used for network auditing (vulnerabilities assessments). … [Read More...]
How to Update Metasploit With The Latest Pentesting Tools
Metasploit framework is an open-source security project that offers multiple penetration testing and exploits development features. All these features can be combined into a set of modules. The core modules are divided into the following categories; (1) Payloads (2) Exploits (3) Encoders (4) Listeners (5) Auxiliary functions Metasploit has a number of payloads for different scenarios. These payloads can be classified as ‘single’ and ‘staged’ payloads. The single payloads are the complete lightweight malicious codes shared with the target machines. The staged payloads consist of a stub-loader that recalls … [Read More...]
How to Use VirtualBox with Android
Computers hold more raw power than android devices and sometimes it makes sense to use them for Android applications. Android is a self-sufficient and clean OS that runs on more than 2.5 billion devices. It shows how popular the OS is. Rather than separate devices, we can also use Android on computers using a sandbox environment. One of them is VirtualBox with Android. VirtualBox makes it easy to run another operating system on the same computer, including most Android versions. There are many simulators we use for this. But if you hate bloatware and want pure experience with raw Android, VirtualBox with Android … [Read More...]
What are Autoruns? and how to utilize them for catching malware
Malware is any software that is created with the intent of causing harm to a device, server, client, or an entire network. Whether it's a piece of bogus security software hounding us to buy it, or a bot waiting for commands, they all need a way to survive a power cycle. They need to automatically start when your computer boots up, so they use Windows features that ensure automated execution during the startup. This is the reason why most of the Windows related malware are designed in such a way as they rely on Windows startup processes to live. We can use this behavior to detect malware by inspecting only the … [Read More...]