Category: hacking
-
X-Frame Options Missing, don’t let your button miss the click
XFO also know as X-Frame Options, if you are a web developer or aspirated to be one, security analyst then you might be hearing about X-Frame options. If you don’t know what it is and what is its role in security, then just hold on to the article. In this blog, I will be discussing…
-
Memory Segmentation In a Nutshell
Memory segmentation is a place where all the things happen while any program is running. Memory is divided into several segments and in this article, we are going to discuss them Usually compiled program memory is divided into 5 segments text data bss heap stack
-
Securing Cookies. Beyond document.cookie
Cookies is the place where the web applications store the authentication data. If you can able to impersonate target cookie in your browser then you can directly login to target account without any password, if the web application is vulnerable.
-
Everything a Security Analyst need to know about FAT File System
For understanding disk-based forensics we need to know about each file system, how it works and what it’s made up of. In this article we will share you everything that we know, and you should know about FAT FAT stands for File Allocation Table. It is one of the most widely used file system…
-
Secure way to access dark web on android
Everything is on mobile and when we analyze the traffic we are getting to internet most of the sources are from mobile. Every web application is making their mobile apps. But for most of the people who wants to access dark web their first choice is desktop or laptop. To make it handy I have…
-
What is DNS Poisoning? Kali Linux tutorial to find Facebook Password
DNS poisoning is one of the way to attack the users present in same network. In this article I am going to share what is DNS poisoning, how we can do it and what are the details we can get using this attack. What is DNS? DNS stands for Domain Name Server. This is a…
-
How OWASP Top 10 Will Protect Web Application
When you look in the requirements of any information security analyst OWASP top ten will be there for sure. Firm knowledge on OWASP top 10 OWASP stands for Open Web Application Security Project. This is a non-profit organization with the mission to make web securely visible. Web is made to be available not secure so…
-
11 Insane Things You Can do with Batch Programming
Howdy! In this article we are going to learn how to create some virus programs with the help of batch scripts. Let’s get on to some grey shade of the Batch Programming. Wait, wait, what is this Batch Programming first? Don’t worry, by the end of this article you are going to learn what is…
-
What is Supply Chain Attack: The Attack That Keeps Every WordPress Site Vulnerable
There are many attacks that are happening on the internet. Each attack belongs to some type of attack family. One of my friend works in PayPal and he said PayPal alone gets 3000 attacks per second and imagine how many attacks are carried out worldwide. In this article I am going to explain to you…
-
How to find IP address of anyone
To attack anyone the first thing you must know is to find the IP address of the target. There are many tools that help to find IP address but here in this tutorial I will help you with the tool called IP puller or IP logger. IP logger grabs the IP address of the victim…