The past several years have seen an explosion of hype about Rust. For 6 years in a row, devs have voted Rust as the most … [Read More...]
Featured Articles
IoT Security (An Overview)
Before diving into IoT Security, it is important to know what is IoT and why we need it. IoT stands for Internet of … [Read More...]
How CSS sniffs browser history
Most people believe that their browsing history is private. However, trackers on websites have clever ways of uncloaking … [Read More...]
Editorial Picks
Latest Blog Updates
How to install Tails OS on VirtualBox
It is pretty easy to install a Debian-based Linux distro like the Tails OS. Though it can be installed similar to windows, there is an easier and recommended method. That is to use it in a plug-and-play sandbox environment. We can set up a live environment with DVD, USB flash drive, and VirtualBox. VirtualBox makes it most easier to try out any operating system within another one. And it doesn’t cause security issues. Follow this guide for proper protocols for installing Tails OS on Virtualbox. If we are not careful on the internet, we may leave traces of sensitive information or even tracker. For this … [Read More...]
How to Use Netcat as a Persistent Backdoor Utility?
Metasploit is a handy Cybersecurity framework that has a number of payloads and exploits to help people with various penetration testing challenges. The payloads in Metasploit are classified into (i) Single and (ii) Stager modules. A single is a self-contained payload that operates independently. The stager payloads are host-dependent as they establish a connection between the target and host machines with the help of payload components called stages. Meterpreter and shell are well-known examples of Metasploit stages. The stagers can create single or recurrent backdoors for the users. A single backdoor is a … [Read More...]
How To Secure Kali Linux and Ensure Your Protection
Open-source Debian-based Linux distribution system Kali Linux is a powerful tool mostly used for offensive security. Previously known as Backtrack Linux, the system is a symbol for security itself. Used by students aimed to learn in-depth computing and seasoned veterans practicing penetration testing and stuff. But to run Kali Linux with the default settings may not be a good idea. Why? Because default settings are easy to crack, and as the OS is open-source itself, anyone has the right to modify it. Anyway, they want. And it includes making backdoors for running public systems. So, it depends on how a user … [Read More...]
How To Use Hydra with Burp Suite – Step-by-Step Guide
Overview The massive global community and security enthusiasts practice website password cracking regularly. Most of the time, it is to test the vulnerability of services that helps services in return. Nonetheless, it takes a great amount of technical knowledge, practice, and patience. Various tools and different variables are required to gain appropriate results. This is where THC-Hydra and Burp Suite comes in handy. Hacking passwords of online services like website authentication, email, and social media accounts falls under penetration testing. Though cracking or hacking online services is not the same as … [Read More...]
Autopsy Kali Linux – Demo of The Best Digital Forensic
To acquire a forensically sound copy or disk image, we need appropriate media to analyze the files. To rule out a media as forensically good copy, we need to verify the integrity and authenticity of the data. So, it will be similar to the original composition. It is necessary to document every step of the way and capture appropriate images that state the examination is running correctly. So, the documenting phase is crucial for forensic imaging. Linux distribution system also has live "Forensic mode." It is an integrated feature to interact with data stored on a drive without breaking the system. Backtrack … [Read More...]