Here we are going to have a look about some of Common & important Penetration Testing Checklist for widely used …
Lynis – Open Source Security Auditing & Pentesting Tool – A Detailed Explanation
Lynis is an open source security auditing tool. Its main goal is to audit and harden Unix and Linux based …
Cryptocurrency wallets Hacked by “CryptoShuffler” Trojan & Stole $140,000 From Many Wallet ID
A newly discovered Trojan called “CryptoShuffler” stole around $140,000 from cryptocurrency wallets by replacing the Original Wallet address with another …
Domain Fronting – A New Technique For Hiding Malware Command and Control (C2) Traffic within a Content Delivery Network
A New Technique called ” Domain Fronting “ allow cybercriminals to hide the command & control Networks Traffic within a CDN. …
Netcat vs Cryptcat – Remote Shell to Control Kali Linux from Windows machine
Netcat is a well build network debugging tool, which can read and write data across computers using TCP or UDP, …
Apple Released Security Update for iOS 11.1 & Other Apple Products with a KRACK Attack Fix
Apple released new version update iOS 11.1 with several important security fixes including Critical Wireless based KRACK Attack Vulnerability that …
Silence Trojan Targeting Financial Institutions Recording day to day activity on Bank Employees’ PCs
Security experts from Kaspersky lab discovered a new trojan dubbed Silence trojan that targeting Financial institutions. It was first spotted September …
Dangerous Crypto Currency Mining Malware Apps Found on Google Play Store
New Dangerous Crypto Currency Mining Malware Apps Discovered form Google Play store that is used for Mining Crypto currency using …
Google Chrome Extension that Steals all Data Posted by Users on any Websites
Chrome Extensions continue to get compromised, security officer Renato Marinho from Morphus Labs identified a malicious Chrome extension that captures …
WAFNinja – Web Application Firewall Attack Tool – WAF Bypass
WAFNinja is a Python-based Web Application Firewall Attack Tool designed to help penetration testers execute WAF bypass by automating the …