Most people believe that their browsing history is private. However, trackers on websites have clever ways of uncloaking … [Read More...]
Featured Articles
Android Hacking Using Msfvenom
Nowadays, most of the user base has shifted to mobile phones. People are not only using their smartphones for calls, and … [Read More...]
How to get a security clearance?
"How to get a security clearance" is one of the most asked questions we get. This article will answer most of those … [Read More...]
Editorial Picks
Latest Blog Updates
How to Update Metasploit With The Latest Pentesting Tools
Metasploit framework is an open-source security project that offers multiple penetration testing and exploits development features. All these features can be combined into a set of modules. The core modules are divided into the following categories; (1) Payloads (2) Exploits (3) Encoders (4) Listeners (5) Auxiliary functions Metasploit has a number of payloads for different scenarios. These payloads can be classified as ‘single’ and ‘staged’ payloads. The single payloads are the complete lightweight malicious codes shared with the target machines. The staged payloads consist of a stub-loader that recalls … [Read More...]
How to Use VirtualBox with Android
Computers hold more raw power than android devices and sometimes it makes sense to use them for Android applications. Android is a self-sufficient and clean OS that runs on more than 2.5 billion devices. It shows how popular the OS is. Rather than separate devices, we can also use Android on computers using a sandbox environment. One of them is VirtualBox with Android. VirtualBox makes it easy to run another operating system on the same computer, including most Android versions. There are many simulators we use for this. But if you hate bloatware and want pure experience with raw Android, VirtualBox with Android … [Read More...]
What are Autoruns? and how to utilize them for catching malware
Malware is any software that is created with the intent of causing harm to a device, server, client, or an entire network. Whether it's a piece of bogus security software hounding us to buy it, or a bot waiting for commands, they all need a way to survive a power cycle. They need to automatically start when your computer boots up, so they use Windows features that ensure automated execution during the startup. This is the reason why most of the Windows related malware are designed in such a way as they rely on Windows startup processes to live. We can use this behavior to detect malware by inspecting only the … [Read More...]
How to Design a Perfect Vulnerability Disclosure Policy?
Almost every organization with an IT setup is vulnerable to Cyber-attacks. There is a general rule of thumb regarding managing these attacks; the quicker we find the cyber-threats, the faster we can patch the discovered vulnerabilities. Organizations usually have their own Cybersecurity teams to manage the Cyber challenges. However, it is not always possible for Cybersecurity departments to find every existing Cyber bug. To deal with this challenge, organizations can define a policy to onboard skilled users as part of their Cyberdefense program. This program is termed as Vulnerability Disclosure Policy (VDP). The … [Read More...]
How to Configure Postfix with Gmail SMTP in Kali Linux
The entire internet infrastructure is based on different sets of rules called protocols. These protocols determine internet communication and activities, such as the connection between computing devices, data transmission, information retrieval, etc. One such protocol is the Simple Mail Transfer Protocol (SMTP). In layman’s terms, the SMTP is the protocol responsible for sending, receiving, and/or relaying email messages. The protocol is based on a message-to-message delivery mechanism. The operation is performed through an SMTP server which can be a dedicated computer or an application installed on the host … [Read More...]