DUHK attack targets the old vulnerability that resides in the pseudorandom number generator called ANSI X9.31. It is an algorithm …
Beware: Dangerous Android Ransomware “LOKIBOT” Attacked Many Users & Earned $1.5Million From Compromised Victims
Dangerous Android Banking Trojan “LOKIBOT” has distributed around the world with sophisticated Ransomware future and demanding around $70 and $100 from …
Security Information and Event Management (SIEM) – A Detailed Explanation
Logs are fetched to the SIEM in two different ways. Agent-based & Non-Agent based. In agent-based approach, a log pushing …
BOVSTT – Buffer Overflow Vulnerability Services Tester Tool
BOVSTT is to detect the existence of remote/local stack-based buffer overflow vulnerabilities using the standard communication protocol for each service. …
Web Applications Security Testing: Tact’s & Methodology
Web Applications Security becomes essential as more and more data gets stored in web applications. As such, testing of web …
Sniffing as easy as possible with Ettercap
Sniffing includes catching, translating, inspecting and interpreting the data inside a network packet on a TCP/IP arrange. In this Kali …
One Million Organisations hit in under a Month with a Massive IoT botnet
The Internet of Things or IoT refers to the vast network of connected devices or “things” connected to the Internet …
New Python Backdoor Allows Hackers to Control Your Infected Device Remotely
A Newly discovered backdoor that was written in Python has been detected as Python.BackDoor.33 with 3 interesting futures (stealer, keylogger, …
Net Creds-Sniff out Username and Password of Users in your Network
In this Kali Linux Tutorial, we show you how to use Net Creds to launch a MITM attack.Net creds is a python …
p0f – Passive Traffic Analysis OS Fingerprinting and Forensics Tool
According to Kali, P0f is a tool that utilizes an array of sophisticated, purely passive traffic fingerprinting mechanisms to identify …