Sunday, June 7, 04:04

stormi

SQLNINJA: Easy detection of sql injection vulnerabilities with the open source tool

Surely most of you know sqlmap as the most common sql injection vulnerability tool in web applications. Beyond sqlmap, in ...

Paros web scanner: How to use it on Linux and Windows

Paros is one of the most popular tools for penetration testing in web applications and can be used by security experts and developers ...

macchanger: How to spoof the MAC address of your computer

MAC spoofing is a technique that allows us to change the MAC address (Media Access Control) of our electronic device. The address...

WPScan: How to detect vulnerabilities in your WordPress website

WPScan: Millions of websites around the world have been created by the well-known CMS tool called Wordpress. If your website is a ...

Nikto: How to find web vulnerabilities with the open source tool

One of the initial steps of an ethical hacker or penetration tester while testing a web application is to identify vulnerabilities that ...

SQLMAP: How to test your site for SQL vulnerabilities

In the field of ethical hacking, SQLMAP is the dominant tool for finding SQL-based vulnerabilities. It is an open source solution, ...

p0f: How to use the open source web analytics tool

In our current article we will deal with another open source ethical hacking tool, p0f. P0f belongs to the category of tools that ...

Wireshark: How to use the best network sniffer

If you ever run into problems with your network and need a deeper analysis of what exactly is going on in your network, you should ...

Medusa: How to use password cracker

Passwords are often the weakest link in a system and that is why we continue browsing through the tools that ...

Nmap: How to use the king of network scanning

There is no one in the security field who has not heard of Nmap, the predominant network scanning tool. In this article we will ...

Most Read

Lyrics from AI technology or from people: Can you tell them apart?

While a large percentage of people can recognize when they are talking on a chatbot instead of a human operator, it seems that this is not the case ...

Technology and children: When are they ready for safe use?

Today's children and teens use various messaging apps and social media to ...

Call of Duty Black Ops Cold War: The first video leaked

The first video from the gameplay of Call of Duty 2020, which is rumored to be called Black Ops Cold War, has just been revealed.

Elon Musk: "It's time to break up Amazon"

Elon Musk intensifies the fight with Jeff Bezos with a new tweet: The General Manager of Tesla Inc., Elon Musk, said ...

Attack on America's 5G towers on Saturday!

Protests over 5G connectivity are scheduled to take place over the weekend, according to NATE. According to a recommendation that was identified ...

Windows 10 Updates: You can block them with Wu10Man!

Microsoft launched the Windows 10 update in May 2020, so it will be available on your computer soon ....

ECh0raix Ransomware: New campaign targets QNAP NAS devices!

Malicious agents behind eCh0raix Ransomware have launched a new campaign targeting QNAP NAS devices. ECh0raix was observed ...

Mac: How to change the storage location of your screenshots?

When you take screenshots on your Mac device using the Shift-Command-3 shortcut to take a screenshot of the entire computer screen or Shift-Command-4 ...

Malware USBCulprit: Aims devices that are not connected to a network

Did you think that devices without any connection to a local or other network (air-gapped devices) are safe? Think again! The USBCulprit malware that ...

Free Microsoft Teams: You can finally create meetings!

Users of the free version of Microsoft Teams can now create video meetings. The change, identified by ...