What Is A Bug Bounty Program? A Bug bounty program is also known as vulnerability rewards program (VRP) is the …
Acoustic Attack Against HDDs Can Cause Permanent Damage CCTV DVR, PCs, ATMs
Hard disks play a vital role in numerous computing systems including, personal computers, closed-circuit television (CCTV) systems, medical bedside monitors, …
Load Balancer-Reverse Proxy Reconnaissance On Target Domain
Reconnaissance work on target domain to find out target domain has load balancer so that penetration testing does not misdirect …
Top hoax stories of 2017
As we prepare to bid our adieu to 2017, let’s have a look back at the year’s trending news points …
USB Forensics – Reconstruction of Digital Evidence from USB Drive
Digitial Forensics analysis of USB forensics include preservation, collection, Validation,Identification, Analysis, Interpretation, Documentation, and Presentation of digital evidence derived from …
Russian Bank ATM Vulnerability Allows to Hack the ATM by Pressing Shift Key Five Times
A Russian user discovered a major ATM vulnerability in Windows XP running ATM machine that could be compromised by pressing …
KickThemOut -Tools to Kick Devices out of Your Network and Enjoy all the Bandwidth
KickThemOut -Tools to kick devices out of your network and enjoy all the bandwidth for yourself.It permits you to choose …
Facebook messenger falls victim to an anonymous crypto cousin of Bitcoin
With the booming value of digital currency, numerous hackers are rolling out schemes to unwittingly trap or trick more likely, …
GoAhead Servers Vulnerability Affected Hundreds of Thousands of IoT Devices
A critical vulnerability discovered in GoAhead Servers with versions running below 3.6.5 allows an attacker can exploit a remote code in GoAhead …
Sublist3r – Tool for Penetration testers to Enumerate Sub-domains
Sublist3r a python based enumeration tool that enumerates subdomains of the domain using Google, Yahoo, Bing, Baidu, and Ask. It also enumerates subdomains …