tpm-fail-vulnerability

TPM-FAIL Vulnerabilities Threaten PCs, Laptops, Servers, and Other Devices

A joint group of researchers from the Worcester Polytechnic Institute (USA), the University of Lubeck (Germany) and the University of California at San Diego (USA) revealed details of two...
upwork-scam

Someone asked to share UpWork account

Over the past couple of years, there have been more frequent cases with requests to provide access to the account on UpWork for money. Usually people ask to provide...
osint-recon

Useful tools for OSINT

What is OSINT? Open Source Intelligence, or "OSINT," was defined by the Department of Defense (DoD) as “produced from publicly available information that is collected,...
iot-security

2019’s Most Common IoT Security Threats to Consider

Being used in hitherto unheard of sectors, IoT is gaining momentum day in day out! Due to which more and more companies are jumping on the IoT bandwagon with various point solutions...
Effective Network Scanning Tools

Effective Network Scanning Tools

What is network security First of all, let's try to understand what is network security and on the next step we going to list and...
Building recon tool

Automated recon tool with PHP, cURL, wafw00f, WhatWeb, Whois

Recon (Reconnaissance) - The act of gathering important information on a target system. This information can be used to better attack the target. For example, open source search engines...
Vulnerability Assessment

Vulnerability Assessment

A vulnerability assessment is the process of defining and identification, classifying and prioritizing vulnerabilities in networks and computer systems, applications and databases and providing the organization doing the...
vulnerability-assessment-basic

Quick Vulnerability Assessment of Web Application & Server

Today we going to emulate quick and simple vulnerability assessment of our web application with help of some open source security tools. List of tools we going to use...
What is penetration testing

What is penetration testing

Many companies without own security department or competencies ask what penetration testing is and why it is needed. First of all, I propose to sort out the question -...
Masscan php mysql

Masscan: How to import results into MySQL with PHP

Many of you heard of such tool like masscan which doing network scanning really fast and can even scan the whole internet for a short period of time.

Latest Updates