I used to be where you are – most likely a technical person not fully enjoying what you do at your day job and wanting to make the move t...
Read moreMobile Hacking Part 3: Intro to USB Rubber Ducky for Keystroke Injection Welcome back hackers! Today we’re going to be continuing our...
Read moreMany Android applications (apps) ask for different kinds of permissions during installation. Currently, there are more than 200 types o...
Read moreWelcome back my fellow hackers! Today we’re going to be starting the topic of maintaining access . First, we’ll discuss the concept of m...
Read moreWelcome back my fellow hackers! I was thinking recently, and came to the realization that we haven’t really been cooking up any homemad...
Read moreHello Friends, it new year and now lets dedicate this year to Web security and ethics. Note my point: ” Security doesn’t suffers be...
Read moreSQL Injection can be used in a range of ways to cause serious problems. By levering SQL Injection, an attacker could bypass authenticat...
Read moreSQL Injection (SQLi) is a type of an injection attack that makes it possible to execute malicious SQL statements. These statements contr...
Read moreIntroduction Web application provides an interface between the web server and the client to communicate. Web pages are generated at th...
Read moreIntroduction Denial of service attack (DOS) is an attack against computer or network which reduces, restricts or prevents accessibili...
Read more