Online security testing services

Useful online services for penetration testers

Hey, did you know that to execute security checks on your server and web application you don't need any kind of tools to be installed locally ?
Outdated android vulnerabilities

The most dangerous Android vulnerabilities for outdated versions

As you know, operating systems are developed by people. Some people, however, are confident that Android created reptilians, but this is not true: many errors were found in the...
Scanning with nmap

How to grab banners with nmap and scan for vulnerabilites

Nmap is very popular tool for security engineers. Nmap scan mostly used for ports scanning, OS detection, detection of used software version and in some other cases for example like vulnerability...

Logging as a way to debug a code

Why is it important to forbid self-debugging by hand? When you debug a program, you yourself, without realizing it, think that for one debugging session, fix all the problems that have arisen in the...
DDos Protection concept image with pentagon shield and lock illu

How to protect web app on PHP from simple DDoS attacks

Quite recently an advertising article about the anti-DDoS attacks at the application level appeared on the hub. I had a similar experience of searching for the optimal algorithm for countering attacks,...

How to hijack RDS session

RDP hijacking  —  how to hijack RDS and RemoteApp sessions transparently to move through an organisation. How you can very easily use Remote Desktop Services to gain lateral movement through a...
bug bounty programs

About Bug Bounty Programs and Most Popular of Them

Very popular among hackers to surf internet in the search of bugs and wide variety of websites: manually, with scanners, using search engines etc Why hackers do this? Many years go was...
api exploits

API Exploits or How To Make API More Secure

As abundant of the software and application development companies are shifting to the APIs, the danger of security breaches has enhanced to a great extent. This is because of the circumstance...
protect customer data

6 steps for organizations to better protect customer data

Today very hard to protect customer data and your personal information from hacks and leakages, if somebody interested in your data - than be ready soon it can be published in...

Latest Updates