If you’re in the digital world at all yourself, this isn’t new but we’ve found surprisingly little in the way of a clear, comprehensive, accurate article to add an SSL certificate and migrate…
Read moreIn previous article, we’ve shared a wide range of tools for sub-domain enumeration which helps pentesters and bug hunters collect and gather subdomains for the domain they are targeting. Enumeration is the most…
Read moreAre you a mom wishing to offer advice on everything from raising kids, cooking healthy meals, to changing diapers? Then why not start a WordPress website? You’ll be in good company. According to…
Read moreOn the Microsoft Windows operating system, the Run command is used to directly open an application or document whose path is known. It functions more or less like a single-line command line interface….
Read moreOn the Microsoft Windows operating system, the Run command is used to directly open an application or document whose path is known. It functions more or less like a single-line command line interface….
Read moreDomain Name Service (DNS) is an Internet service that maps IP addresses and fully qualified domain names (FQDN) to one another. In this way, DNS alleviates the need to remember IP addresses. Computers…
Read moreIn recent years, the smartphone market has witnessed a rapid expansion, and its momentum seems unstoppable. Its accelerated growth is brought on due to the diverse range of applications. Due to Android being…
Read moreInternet users are widely using Wi-Fi devices to access Internet. Every year millions of wireless based devices are sold in the market. Out of these most of the devices are vulnerable in their…
Read moreThe beauty of WordPress is its extensibility. Some of the WordPress lead developers have said that the most exciting WordPress features are the ones that don’t ship with the software. It is possible…
Read moreThe most visible features of a Web application that intruders will note and immediately seek to exploit are vulnerabilities in the Web server software itself. No matter the simplicity or strength of the…
Read moreA number of different tools exist for performing automated vulnerability scans of web applications. These scanners have the benefit of being able to test a large amount of functionality in a relatively short time,…
Read moreYou’ll come across public Wi-Fi almost everywhere, in the airport, your favorite coffee shop, and hotels. While public Wi-Fi has made our lives better, it poses a lot of risks particularly security risks….
Read moreOSINT framework focused on gathering information from free tools or resources. The intention is to help people find free OSINT resources. Some of the sites included might require registration or offer more data…
Read moreNmap is a free tool that can be used to conduct various sorts of scans on networks. Normally, when people think of Nmap, they assume it’s used to conduct some sort of nefarious…
Read moreTcpdump is a well known command line packet analyzer tool. Using tcpdump command we can capture the live TCP/IP packets and these packets can also be saved to a file (pcap). Later on…
Read moreEssential for any website, a contact form is one of the first things to think about for your project. It is important to give your users a voice, to understand their needs and…
Read moreMyBB is one of the most widely used open source, intuitive, extensible, and incredibly Forum software out there. The software is recognized for its security as well as it is the most secure…
Read moreDiscovery tools are used to gather information about a target network or system. The tools enable you to easily perform many otherwise manual processes, such as whois queries, DNS zone transfers, SNMP queries,…
Read moreNetwork Mapper (Nmap) is one of the most effective and functional tools in Kali Linux. Nmap can be used to perform a large range of different scanning techniques and is highly customizable. Nmap is…
Read more