Reconnaissance work on target domain to find out target domain has load balancer so that penetration testing does not misdirect …
Top hoax stories of 2017
As we prepare to bid our adieu to 2017, let’s have a look back at the year’s trending news points …
USB Forensics – Reconstruction of Digital Evidence from USB Drive
Digitial Forensics analysis of USB forensics include preservation, collection, Validation,Identification, Analysis, Interpretation, Documentation, and Presentation of digital evidence derived from …
Russian Bank ATM Vulnerability Allows to Hack the ATM by Pressing Shift Key Five Times
A Russian user discovered a major ATM vulnerability in Windows XP running ATM machine that could be compromised by pressing …
KickThemOut -Tools to Kick Devices out of Your Network and Enjoy all the Bandwidth
KickThemOut -Tools to kick devices out of your network and enjoy all the bandwidth for yourself.It permits you to choose …
Facebook messenger falls victim to an anonymous crypto cousin of Bitcoin
With the booming value of digital currency, numerous hackers are rolling out schemes to unwittingly trap or trick more likely, …
GoAhead Servers Vulnerability Affected Hundreds of Thousands of IoT Devices
A critical vulnerability discovered in GoAhead Servers with versions running below 3.6.5 allows an attacker can exploit a remote code in GoAhead …
Sublist3r – Tool for Penetration testers to Enumerate Sub-domains
Sublist3r a python based enumeration tool that enumerates subdomains of the domain using Google, Yahoo, Bing, Baidu, and Ask. It also enumerates subdomains …
Chinese Man Sentenced to Five Years Prison for Illegally Running VPN Service
A chinese man Wu Xiang Yang sentenced to five years and six months also fined 500,000 yuan for running private VPN …
Parents should be on guard against hackable toys
While Internet-connected toys are particularly appealing to a generation of tech-obsessed kids, security experts warn against the potential dangers of …