As we know WPA2 has been the latest and greatest in terms of WiFi security for a long time now, you might have also already heard about WPA3 and how its going to replace WPA2 as its more secure. Now …
We all know how burp proxy can be very useful to intercept and modify requests sent from applications to a server or to an API, this of-course is very useful to help understand how a specific application works, how it …
In this tutorial, I will demonstrate how to gain root access to the virtual machine “Basic Pentesting: 1” from Vulnhub. Link to the VM download can be found here. Special thanks to the author Josiah Pierce for the upload! Please note that …
In the past, robbers use to rob a bank through physical penetration into the building and get away with money. This would lead to involvement of law enforcement agencies bringing the team of forensic experts to find clues and connect …
Hello everyone, this is my talk in the Global Cyber Security Financial Summit (GCSFS) titled “You Spent All That Money And Still Got Hacked”, as the title suggests this shows how hackers gain access to secure systems, I know there …
zLogger is a Remote persistent keylogger it is written in python, and can generate executables that run on Windows and Linux, once executed on a system it’ll run the background, record every key-strike and report to the email specified when …