An Overview of Real World Account Hacking Strategies An Overview of Real World Account Hacking Strategies

I often get sick and tired of reading comments underneath a white-hat hacking tutorial, asking “ how do I hack a Gmail ”, “ How to hack Face...

+ Read more »

phpThumb Server Side Request Forgery phpThumb Server Side Request Forgery

Recently me along with my friend " Deepankar Arora " discovered a server side request forgery vulnerability inside of the phpThumb...

+ Read more »

XPATH Injection Tutorial XPATH Injection Tutorial

XPath is a language that has been designed and developed to operate on data that is described with XML. The XPath injection allows an attack...

+ Read more »

eLearnSecurity Web Application Penetration Testing (WAPT) - Course Review eLearnSecurity Web Application Penetration Testing (WAPT) - Course Review

As years passed by, we have seen an upward progression in the layer of insecurity starting from the physical layer attacks (Layer 1)  toward...

+ Read more »

Memory Forensics, Analysis And Techniques PART 2 Memory Forensics, Analysis And Techniques PART 2

INTRODUCTION Volatility is a completely open collection of tools, implemented in Python under the GNU General Public License, for the extrac...

+ Read more »

Memory Forensics, Analysis And Techniques Part 1 Memory Forensics, Analysis And Techniques Part 1

ABSTRACT Due to the increased number of cases of cyber-crimes and intrusions, along with the storage capacity of hard disks and devices, it ...

+ Read more »
 
Top