Friday, January 15, 17:03

stormi

SQLNINJA: Easy detection of sql injection vulnerabilities with the open source tool

Surely most of you know sqlmap as the most common sql injection vulnerability tool in web applications. Beyond sqlmap, in ...

Paros web scanner: How to use it on Linux and Windows

Paros is one of the most popular tools for penetration testing in web applications and can be used by security experts and developers ...

macchanger: How to spoof the MAC address of your computer

MAC spoofing is a technique that allows us to change the MAC address (Media Access Control) of our electronic device. The address...

WPScan: How to detect vulnerabilities in your WordPress website

WPScan: Millions of websites around the world have been created by the well-known CMS tool called Wordpress. If your website is a ...

Nikto: How to find web vulnerabilities with the open source tool

One of the initial steps of an ethical hacker or penetration tester while testing a web application is to identify vulnerabilities that ...

SQLMAP: How to test your site for SQL vulnerabilities

In the field of ethical hacking, SQLMAP is the dominant tool for finding SQL-based vulnerabilities. It is an open source solution, ...

p0f: How to use the open source web analytics tool

In our current article we will deal with another open source ethical hacking tool, p0f. P0f belongs to the category of tools that ...

Wireshark: How to use the best network sniffer

If you ever run into problems with your network and need a deeper analysis of what exactly is going on in your network, you should ...

Medusa: How to use password cracker

Passwords are often the weakest link in a system and that is why we continue browsing through the tools that ...

Nmap: How to use the king of network scanning

There is no security person who has not heard of Nmap, the ultimate network scanning tool. In this article I will ...

Most Read

Ransomware is responsible for half of all data breaches in hospitals

Almost half of the data breaches committed in hospitals and the wider healthcare sector are due to ransomware attacks, ...

Astronomers have just found the oldest oversized black hole

A quasar was discovered in a dark corner of space - over 13,03 billion light-years away - and contains a ...

What are the best and most affordable 5G phones for 2021

The market will soon be flooded with mid-range 5G devices. Everything that happens will be really exciting: you will be able to ...

Verified Twitter accounts in a cryptocurrency scam with the name of Elon Musk violated!

Lately, hackers have been violating verified Twitter accounts in a cryptocurrency giveaway scam, in which the name of the CEO is used ...

Classiscam: Fraudsters "fake" brands and deceive users of European markets!

Dozens of criminal gangs publish fake ads in popular online markets, to attract unsuspecting users to "fraudulent" commercial sites or phishing ...

iOS 14.4: Displays a notification for repairs with non-genuine cameras

Starting with the iPhone 11, Apple has added a notification to iOS that tells the user when the device has a ...

Facebook: Sues Chrome extensions developers for data theft

Facebook has filed a lawsuit against two Portuguese nationals for developing Chrome extensions that collected data from Facebook users.

Cisco does not fix 74 bugs in RV routers that have reached their EOL

Cisco said yesterday that it will not release firmware updates to fix 74 vulnerabilities that have been reported in ...

Hacker commits new crimes while waiting for his release!

A Kosovo hacker was pardoned after his conviction. The hacker provided personally identifiable information over 1.000 ...

Nintendo rules out Game & Watch video hacking

Two copyright claims against a YouTuber have been filed by Nintendo, for a video showing hacking of Super Mario ...