News

Latest News

Masscan php mysql

Masscan: How to import results into MySQL with PHP

Many of you heard of such tool like masscan which doing network scanning really fast and can even scan the whole internet for a short period of time. This...
Online security testing services

Useful online services for penetration testers

Hey, did you know that to execute security checks on your server and web application you don't need any kind of tools to be installed locally ? Yes, right!...
Computer plate and flag of China

Chinese cyberspies hacked MSP, retailer and law firm in economic espionage campaign

The Chinese state-sponsored threat actor APT10 used stolen remote access software credentials to infiltrate the network of Norwegian managed services provider Visma last year, likely in an effort to launch secondary attacks against the...
Outdated android vulnerabilities

The most dangerous Android vulnerabilities for outdated versions

As you know, operating systems are developed by people. Some people, however, are confident that Android created reptilians, but this is not true: many errors were found in the Google mobile platform,...
Scanning with nmap

How to grab banners with nmap and scan for vulnerabilites

Nmap is very popular tool for security engineers. Nmap scan mostly used for ports scanning, OS detection, detection of used software version and in some other cases for example like vulnerability scanning. Let's see 2...
Sergei Yarets is free

Sergei Yarets is free! Revelations of Andromeda botnet operator Ar3s

"If the FBI, Interpol and the" K "arrived, they have something on me." That same hacker known as Ar3s from Rechitsa for the first time talks about his case with facts and numbers. Sergei Yarets, known...
debugging

Logging as a way to debug a code

Why is it important to forbid self-debugging by hand? When you debug a program, you yourself, without realizing it, think that for one debugging session, fix all the problems that have arisen in the framework of this...
Automating the actions of the attacker using metasploit and Python

Automating the actions of the attacker using metasploit and Python

It is known that the metasploit is written in Ruby and does not support scripts written in Python so it requires some additional tuning to automate the actions of the attacker using metasploit and Python. Despite...
infosec-what-to-read

What to read at the weekend: 5 books on practical information security

We are often asked which books are worth reading to those who take the first steps in the field of information security? Our team of experts on penetration testing compiled a selection of books that...
who-scans-internet-australia-exists

Who scans the Internet and whether Australia exists

Anyone who raised the sites knows that it is worthwhile to start the web server, as requests begin to come to it. Also, DNS does not really know about it, and in the httpd...

Bug Bounty