DUHK attack targets the old vulnerability that resides in the pseudorandom number generator called ANSI X9.31. It is an algorithm …
Beware: Dangerous Android Ransomware “LOKIBOT” Attacked Many Users & Earned $1.5Million From Compromised Victims
Dangerous Android Banking Trojan “LOKIBOT” has distributed around the world with sophisticated Ransomware future and demanding around $70 and $100 from …
Security Information and Event Management (SIEM) – A Detailed Explanation
Logs are fetched to the SIEM in two different ways. Agent-based & Non-Agent based. In agent-based approach, a log pushing …
BOVSTT – Buffer Overflow Vulnerability Services Tester Tool
BOVSTT is to detect the existence of remote/local stack-based buffer overflow vulnerabilities using the standard communication protocol for each service. …
Web Applications Security Testing: Tact’s & Methodology
Web Applications Security becomes essential as more and more data gets stored in web applications. As such, testing of web …
SQLiv – SQL Injection Dork Scanning Tool
SQLiv is a Python-based massive SQL Injection dork scanning tool which uses Google, Bing or Yahoo for targetted scanning, multiple-domain …
Sniffing as easy as possible with Ettercap
Sniffing includes catching, translating, inspecting and interpreting the data inside a network packet on a TCP/IP arrange. In this Kali …
One Million Organisations hit in under a Month with a Massive IoT botnet
The Internet of Things or IoT refers to the vast network of connected devices or “things” connected to the Internet …
New Python Backdoor Allows Hackers to Control Your Infected Device Remotely
A Newly discovered backdoor that was written in Python has been detected as Python.BackDoor.33 with 3 interesting futures (stealer, keylogger, …
Net Creds-Sniff out Username and Password of Users in your Network
In this Kali Linux Tutorial, we show you how to use Net Creds to launch a MITM attack.Net creds is a python …