Sunday , 28 April 2024

hacking

X-Frame Options Missing, don’t let your button miss the click

XFO also know as X-Frame Options, if you are a web developer or aspirated to be one, security analyst then you might be hearing about X-Frame options. If you don’t know what it is and what is its role in security, then just hold on to the article. In this blog, I will be discussing what are X-Frame options, how …

Read More »

Memory Segmentation In a Nutshell

Memory segmentation is a place where all the things happen while any program is running. Memory is divided into several segments and in this article, we are going to discuss them Usually compiled program memory is divided into 5 segments text data bss heap stack

Read More »

Securing Cookies. Beyond document.cookie

Cookies is the place where the web applications store the authentication data. If you can able to impersonate target cookie in your browser then you can directly login to target account without any password, if the web application is vulnerable. 

Read More »

Everything a Security Analyst need to know about FAT File System

  For understanding disk-based forensics we need to know about each file system, how it works and what it’s made up of. In this article we will share you everything that we know, and you should know about FAT FAT stands for File Allocation Table. It is one of the most widely used file system and the reason, you will …

Read More »

Secure way to access dark web on android

Everything is on mobile and when we analyze the traffic we are getting to internet most of the sources are from mobile. Every web application is making their mobile apps. But for most of the people who wants to access dark web their first choice is desktop or laptop. To make it handy I have come with a tutorial that …

Read More »

What is DNS Poisoning? Kali Linux tutorial to find Facebook Password

DNS poisoning is one of the way to attack the users present in same network. In this article I am going to share what is DNS poisoning, how we can do it and what are the details we can get using this attack. What is DNS? DNS stands for Domain Name Server. This is a server that stores IP addresses …

Read More »

How OWASP Top 10 Will Protect Web Application

When you look in the requirements of any information security analyst OWASP top ten will be there for sure. Firm knowledge on OWASP top 10 OWASP stands for Open Web Application Security Project. This is a non-profit organization with the mission to make web securely visible. Web is made to be available not secure so it’s our responsibility to make …

Read More »

11 Insane Things You Can do with Batch Programming

Howdy! In this article we are going to learn how to create some virus programs with the help of batch scripts. Let’s get on to some grey shade of the Batch Programming. Wait, wait,  what is this Batch Programming first? Don’t worry, by the end of this article you are going to learn what is batch programming and some cool …

Read More »

What is Supply Chain Attack: The Attack That Keeps Every WordPress Site Vulnerable

There are many attacks that are happening on the internet. Each attack belongs to some type of attack family. One of my friend works in PayPal and he said PayPal alone gets 3000 attacks per second and imagine how many attacks are carried out worldwide. In this article I am going to explain to you how supply chain attack works …

Read More »

How to find IP address of anyone

To attack anyone the first thing you must know is to find the IP address of the target. There are many tools that help to find IP address but here in this tutorial I will help you with the tool called IP puller or IP logger. IP logger grabs the IP address of the victim when he clicked on the …

Read More »