CSRF, or Cross-Site Request Forgery, is a technique that allows hackers to carry out unwanted actions on a victim’s behalf. For example, a hacker might be able to change your password or transferring money from your bank account without your …
We live in a world of apps. There’s a mobile app for almost everything, so it makes perfect sense if you, too, want to develop an app for your business (or have developed it already). However, 2020 has taught us …
This video shows how to exploit an SQL injection vulnerability to bypass a login page, then discover and exploit an RCE or a Remote Code Execution vulnerability to hack a target server. All of the steps shown in this video …
Hey guys. I will be talking about how do professional penetration testers get into secure systems by following the hacker’s methodology. The process that penetration testers follow is summarized in the following steps: 1.Reconnaissance 2.Enumeration/Scanning 3.Gaining Access 4.Privilege Escalation 5.Covering …
Hey guys, This is a complete walkthrough for the Fuel CTF competition we ran here at zSecurity. You can access this CTF and even download this walk through from the competitions page. Difficulty: Medium Skills Required: • Googling Skills • …
This video shows how to increase the probability of cracking WPA and WPA2 networks using wordlist attacks. To achieve that we rely on information gathering or open source intelligence (OSINT) to figure out the format used by our targeting to …