The Internet of Things (IoT) is probably one of the most widely used technological concepts in recent times, as it has implementations...
Digital forensics is one of the most important elements of ethical hacking, as it allows researchers to learn as much as possible...
Cross-site scripting (XSS) attacks are a variant of code injection that involves the use of specially crafted scripts on legitimate websites for...
The automatic analysis of potential security flaws has become one of the essential tasks for developers, researchers and experts in vulnerability assessment,...
System logs analysis is one of the most useful hacking tasks for researchers and specialists in digital forensics and reverse engineering, so...
Gathering cookies is a popular hacking activity and can prove really useful for obtaining information from a target, so it is necessary...
Password cracking for WiFi networks is one of the hacking activities that most interest beginner researchers, cybersecurity experts and sporadic users alike...
One of the main variants of attack against Windows systems is the abuse of Active Directory using tools for credential theft such...
The term web application firewall (WAF) refers to a set of monitoring tools and filters designed to detect and block network attacks...
Remote access Trojans (RATs) are one of the most popular hacking tools, as they allow attackers to remotely control a compromised system....
The fight against cybercrime is one of the main responsibilities of the ethical hacking and cyber security community. This effort depends on...
Phishing remains one of the most common and dangerous criminal practices for users in general, and every day new and dangerous tools...
Telegram has become one of the best instant messaging tools, currently being the main counterpart of WhatsApp thanks to its advanced privacy...
WhatsApp is the world’s most popular messaging platform, with around 1.5 billion active users a month sending text messages, voice notes, multimedia...
Collecting information is an important phase for investigation. Now days whenever user visits any blogger websites. Many websites ask for email addresses...
Tor is the most famous web browser which provides anonymity/ privacy over the internet. Many companies/ whistle blowers uses TOR for working...
Information gathering phase shows how an pentester should prepare for his next phases. Because in this phase pentester have to collect information...
Wireless Networks Wireless network which enables end-point devices to communicate with internet by connecting to an AP device. Wiresless device are also...
Man-in-The-Middle (MiTM) attacks are one of the most popular hacking techniques nowadays, and occur when a third party arbitrarily breaks into an...
Users of Linux systems are sometimes not aware of all the tools and functions on the system. Thinking about this situation, digital...
Pentesting has become one of the main practices of the cybersecurity community and even represents an important source of income for independent...