vulnerability-assessment-basic

Quick Vulnerability Assessment of Web Application & Server

Today we going to emulate quick and simple vulnerability assessment of our web application with help of some open source security tools. List of tools we going to use...
What is penetration testing

What is penetration testing

Many companies without own security department or competencies ask what penetration testing is and why it is needed. First of all, I propose to sort out the question -...
Masscan php mysql

Masscan: How to import results into MySQL with PHP

Many of you heard of such tool like masscan which doing network scanning really fast and can even scan the whole internet for a short period of time.
Online security testing services

Useful online services for penetration testers

Hey, did you know that to execute security checks on your server and web application you don't need any kind of tools to be installed locally ?
Outdated android vulnerabilities

The most dangerous Android vulnerabilities for outdated versions

As you know, operating systems are developed by people. Some people, however, are confident that Android created reptilians, but this is not true: many errors were found in the...
Scanning with nmap

How to grab banners with nmap and scan for vulnerabilites

Nmap is very popular tool for security engineers. Nmap scan mostly used for ports scanning, OS detection, detection of used software version and in some other cases for example like vulnerability...
debugging

Logging as a way to debug a code

Why is it important to forbid self-debugging by hand? When you debug a program, you yourself, without realizing it, think that for one debugging session, fix all the problems that have arisen in the...
DDos Protection concept image with pentagon shield and lock illu

How to protect web app on PHP from simple DDoS attacks

Quite recently an advertising article about the anti-DDoS attacks at the application level appeared on the hub. I had a similar experience of searching for the optimal algorithm for countering attacks,...

How to hijack RDS session

RDP hijacking  —  how to hijack RDS and RemoteApp sessions transparently to move through an organisation. How you can very easily use Remote Desktop Services to gain lateral movement through a...
bug bounty programs

About Bug Bounty Programs and Most Popular of Them

Very popular among hackers to surf internet in the search of bugs and wide variety of websites: manually, with scanners, using search engines etc Why hackers do this? Many years go was...

Latest Updates