Bitcoin recent rise happened as fast as possible, and it crosses the $14,000 landmark for the first time in history.In …
Web Server Penetration Testing Checklist
Web server pen testing performing under 3 major category which is identity, Analyse, Report Vulnerabilities such as authentication weakness, configuration …
Windows Registry Analysis – Tracking Everything You Do on the System
The purpose of this article is to provide you with a depth understanding of the Windows Registry and Wealth of …
31 Million Data Leaked Online Reveal that keyboard App Collects Everything from Contacts to Keystrokes
Millions of customer personal data exposed online due to a Misconfiguration with MongoDB that belongs to Ai.Type, the company that …
Man Hacked into Jail Computer Network to Change his Friend Release Date
Ann Arbor, Michigan, hacked into the Washtenaw County Jail Computer network to change the release and have his friend released …
Verizon Partner Exposed Around 14 Million’s of Customer Accounts Sensitive Data Online
Verizon owned as many as 14 Millions of customer’s data exposed online by telephonic software and data firm NICE Systems, …
WebDAV to Run a Secret Communication Channel between Victim and Control Server
WebDAV(Web Distributed Authoring and Versioning) is the extended framework of HTTP protocol which includes more features such as clients can …
Global Law Enforcement Agencies shutdown the Largest and Dangerous Andromeda Botnet
Andromeda Botnet dismantled after the joint investigation with law enforcement agencies around the Globe.The takedown took place on 29 November …
Cr3dOv3r – Credential Reuse Attack Tool
Cr3dOv3r is a fairly simple Python-based set of functions that carry out the prelimary work as a credential reuse attack …
Hacked Passwords Reselling Website Leakbase Goes Offline
Leakbase a website that resells the hacked passwords exfiltrated from most significant data breach went offline.It contains more than two …