Browsing tag

ethical hacking

Sniffer – Packet Trace Parser

Sniffer is a C program that parses and interprets captured Ethernet traffic containing IP datagrams (UDP/TCP), and stores the captured payloads, email messages and HTTP cookies sent into files.   General Supply any pcap file, produced by tcpdump, that contains a packet trace for the program to use as input: ./selected_parser [pcap_file]   Packet parser […]

Ironsquirrel – Encrypted Exploit Delivery For The Masses

This project aims at delivering browser exploits to the victim browser in an encrypted fashion. Ellyptic-curve Diffie-Hellman (secp256k1) is used for key agreement and AES is used for encryption. By delivering the exploit code (and shellcode) to the victim in an encrypted way, the attack can not be replayed. Meanwhile the HTML/JS source is encrypted […]

Wfuzz – Bruteforcing Web Applications

Wfuzz is a tool designed for bruteforcing Web Applications, it can be used for finding resources not linked (directories, servlets, scripts, etc), bruteforce GET and POST parameters for checking different kind of injections (SQL, XSS, LDAP,etc), bruteforce Forms parameters (User/Password), Fuzzing,etc.   Features Multiple Injection points capability with multiple dictionaries Recursion (When doing directory bruteforce) […]

Nameles – Open Source Invalid Traffic Detection

Nameles provides an easy to deploy, scalable IVT detection and filtering solution that is proven to detect at a high level of accuracy ad fraud and other types of invalid traffic such as web scraping. Comprehensive DetectionDetects display, video and in-app based ad fraud, web scraping and other forms of invalid traffic from both mobile […]

Tinfoleak – Twitter OSINT Tool

Tinfoleak is a simple Python script that allow to obtain detailed information about a Twitter user activity Detailed information about any Twitter user: basic information about a Twitter user (name, picture, location, followers, etc.) devices and operating systems used by the Twitter user applications and social networks used by the Twitter user place and geolocation […]

Simple Tools for Collecting Information During Pen-Testing

Collecting information is a useful tool in any situation. For a penetration tester, information gathering is not only useful but necessary. When they’re trying to discover the security flaws in a system/network/web application, it’s important to know what they’re working with. Every person’s preference on how to get that information is different. However, the following […]

Use Free Internet Using Simple DNS Hack

Simple DNS Hack There are several ways to get a faster internet speed in Microsoft Windows. Let’s see a simple DNS hack that can speed up your Web Browsing. Firstly, need to remind you an obvious thing that happens with most of us when we are using a slow internet connection. We solely blame our net […]

Only an image can Hack your Android Device!!

Just an Image can Hack Your Android Device Have an Android Device? Just an innocent looking image on social media or messaging app could hack android device. Along with that the dangerous Quadrooter vulnerabilities which affected 900 Million devices. Google has patched a previously unknown critical bug that could let attackers deliver their hack hidden inside an innocent looking image via […]

How To Become a Certified Ethical Hacker

How To Become Certified Ethical Hacker? Today many businesses and government-related organizations that are serious about their network security. So they hire certified hackers and penetration testers to help probe and improve their networks, applications, and other computer systems.With the ultimate goal of preventing data theft and fraud from that black hat and other hackers.  So […]

Shadow Brokers Hacked NSA!!

  Shadow Brokers Hacked NSA NSA is in deep shit if we are to believe what Shadow Brokers hacked NSA. A hacking group going by the name Shadow Brokers said on Monday that they had hacked into NSA website. They have access to all the NSA hacking tools it uses in surveillance of US and […]

How to hack Web Server

Web server vulnerabilities  A web server is program that stores files i.e. web pages and they are accessible via the network or internet. A web server requires both hardware and software. Attackers usually target the exploits in the software to gain authorized access to the server. Let’s look at some of the common vulnerabilities that […]

A Guide to become an Ethical Hacker

A person who hacks into a computer network in order to test or evaluate its security, rather than with malicious or criminal intent. So if you want to be an ethical hacker the truth is there is no easy method to become a skilled hacker…… it’s easy to be a script kiddie and load up Armitage […]

Learn IT Security for Free (New Site)

So i was busy browsing through the internet and came across this great site which i thought i should share to you guys. It’s about It Security courses , which is free. I know right? Just what you need in your spare time. No need to pay loads of cash , as they give you […]

Metropolitan Police Department to give Cybercrime Lessons

Metropolitan Police Department is planning to setup cybercrime classes for investigators at a local police station to avoid any kind of wrong arrest and misunderstanding.  The classes are planned to avoid unusual circumstances like last year when four innocent men were arrested for spreading virus, later it was discovered that their computers were hacked and used as […]