Skip to content

Category Archives: Ethical Hacking

Browser hijacking software is a term used to describe a type of malicious software designed to take control of the user’s browser, in order to… Read More
An ActiveX control allows users to connect to and control a computer program that runs on the computer without having to install it. ActiveX controls… Read More
Display filters search and change the display of only those packets that match with the given filter primitive. When we use a Display filter after… Read More
Pre-requisites:  IMAP and SMTP  IMAP/SMTP injection is basically making use of  IMAP/SMTP commands as input but making use of these commands for adding malicious purposes.… Read More
Client-Side HTTP Parameter Pollution is a client-side security vulnerability in web applications designed to use HTTP requests. HTTP parameter pollution exploits the ability of HTTP… Read More
Stunnel is a very versatile open-source tool designed to help secure web applications. It encrypts traffic, proxies connections, and redirects web applications so that they… Read More
Remote backup is a big security concern for most people. The idea of backing up data over remote access can be tricky, but with the… Read More
Dynamic winapi resolution is a technique used to modify the structure of the winapi call stack without physically altering the code. WinAPI functions are exported… Read More
In spoofing hackers’ main goal is to win the trust of the target (Victim) by convincing him that they are interacting with a trusted source.… Read More
In order to protect systems from cyber attacks, it is important to discover and fix vulnerabilities. Xerosploit is a penetration testing toolkit designed to perform… Read More
NetBIOS is an acronym that stands for Network Basic Input Output System. It enables computer communication over a LAN and the sharing of files and… Read More
LTE stands for “Long Term Evolution”, an upgrade of 3G networks. It offers faster speed, wider coverage range, and greater capacity than that of 3G… Read More
A salami attack is a method of cybercrime that attackers or a hacker typically used to commit financial crimes. Cybercriminals steal money or resources from… Read More
Injection attacks are the most well-known attacks used by hackers to inject code or malware into programs or to query a computer to run remote… Read More
SMTP stands for Simple Mail Transfer Protocol. It is an application layer protocol that handles the sending, receiving, and forwarding of emails on the server.… Read More