full screen background image

Billu-b0x 2 Hacking Challenge Walkthrough (Vulnhub)

The aim of this lab is to attain root privileges. As usual the first step is mapping the IP address of the box  so that we can begin the...

dependency-track v3.3.1 releases: intelligent Software Composition Analysis (SCA) platform

Dependency-Track Modern applications leverage the availability of existing components for use as building blocks in application...

CyberChef v8.11 releases: web app for encryption, encoding, compression and data analysis

CyberChef The Cyber Swiss Army Knife CyberChef is a simple, intuitive web app for carrying out all manner of “cyber” operations within...

WordPress GDPR Compliance plugin hacked to spread backdoor

Update your GDPR Compliance plugin right now. Security researchers have identified a critical vulnerability in the popular WP GDPR...

Androspy – Backdoor Crypter & Creator With Automatic IP Poisener

Androspy : is Backdoor Crypter & Creator with Automatic IP Poisener Coded By Belahsan Ouerghi Dependencies keytool jarsigner Apache2...

Gemini Inc VulnHub CTF Hacking Challenge

Gemini Inc is a hosted employee web application. The server is used by employees to export their profiles to pdf. In this challenge, you...

New APIs Suggest WPA3 Wi-Fi Security Support Coming Soon to Windows 10

Windows 10 users don’t have to wait much longer for the support of latest WPA3 Wi-Fi security standard, a new blog post from...

XSStrike v3.0.2 released: advanced XSS detection and exploitation suite

XSStrike is an advanced XSS detection suite. It has a powerful fuzzing engine and provides zero false positive results using fuzzy...

OWASP Mutillidae II 2.6.72 releases: OWASP Mutillidae II Web Pen-Test Practice Application

OWASP Mutillidae II is a free, open source, deliberately vulnerable web-application providing a target for the web-security enthusiast....

Microsoft’s Patch Tuesday updates for November 2018 fix actively exploited Windows flaw

Microsoft’s Patch Tuesday updates for November 2018 fixed more than 60 vulnerabilities, including an actively exploited Windows flaw....

Hacking the hackers – IOT botnet author adds his own backdoor on top of a ZTE router backdoor

The author of an IoT botnet is distributing a backdoor script for ZTE routers that also includes his own backdoor to hack script kiddies A...

W1R3S: 1.0.1 – Vulnhub CTF Walkthrough

W1R3S is a vulnerable machine by design meant to help you  polish your penetration test skills. On this box you are required to gain root...

Debian 9.6 Released With Important Security Updates and Miscellaneous Bugfixes

Debian Project announced Debian 9.6, the sixth update of the stable Debian 9. It is not a completely new version, it contains security...

Pinky’s Palace v1 Walkthrough

Pinky’s Palace v1 remains one of my favorite machines to hack. The box is realistic and  you are required to combine both Web...

Another Facebook Bug Could Have Exposed Your Private Information

Another security vulnerability has been reported in Facebook that could have allowed attackers to obtain certain personal information about...

BGP hijack στην Google από Νιγηριανή ISP

Google BGP hijack: Ένας μικροσκοπικός Νιγηριανός πάροχος υπηρεσιών διαδικτύου...

Elite North Koreans aren’t opposed to exploiting internet for financial gain

According to a report from Recorded Future, it seems the ruling elite in North Korea are now using the Internet more and more to take...

Cynet Review: Simplify Security with a True Security Platform

In 1999, Bruce Schneier wrote, “Complexity is the worst enemy of security.” That was 19 years ago (!) and since then, cyber...

How To Perform External Black-box Penetration Testing in Organization with “ZERO” Information

The objective was simple – see how susceptible the organization is from an external point of view and test the effectiveness of the...

Comprehensive Guide on Hydra – A Brute Forcing Tool

Hello friends!! Today we are going to discuss – How much impactful hydra is in cracking login credential of various protocols to make...

Greunion: Δύο σημαντικές νίκες στους διαγωνισμούς DefCamp και CSAW’s CTF!

Η Greunion, η καταξιωμένη πλέον ομάδα CTF, που προπονεί την ελληνική αποστολή για...

How to Perform Manual SQL Injection With Error Based String Method

SQL injection is the code injection techniques to gain access to the database(MySQL, MSSQL, Oracle etc).Owasp 2018 Release still...

Hackers Abuse Critical Bug in Microsoft Office Online Video Feature To Deliver Malware

Hackers abuse Critical flaw in Microsoft word Online Video future that allows attackers to deliver malware into the victim’s system. The...

Beware !! Worlds Most Active Malware Emotet Launching New Campaign With Malicious Word and PDF Attachments

Threat actors now launching a new malicious spam campaign since November 5 since then actively spike to target corporate network and...

Sn1per v6.0 releases: Automated Pentest Recon Scanner

Sn1per Community Edition is an automated scanner that can be used during a penetration test to enumerate and scan for vulnerabilities....

France seeks Global Talks on Cyberspace security and a “code of good conduct”

The French government announced a “Paris Call” for global talks about cyberspace security aimed at laying out a shared framework of...

miasm v0.1.0 releases: Reverse engineering framework in Python

Miasm is a free and open source (GPLv2) reverse engineering framework. Miasm aims to analyze/ modify/generate binary programs. Here is a...

Reading the Android Ecosystem Security Transparency Report

According to Android Ecosystem Security Transparency Report the number of potentially harmful applications has fallen from 0.66% in...

Google Services down due to BGP leak, traffic hijacked through Russia, China, and Nigeria

Google services were partially inaccessible on Monday due to a BGP leak that caused traffic redirection through Russia, China, and Nigeria....

Call Recorder App on Google Play with Over 5,000 Installs Contains Hidden Malware Dropper

Malware hidden inside Simple Call Recorder app tricks user in downloading and installing an additional app. Security researcher Lukas...