What is code injection? code injection, also called Remote Code Execution (RCE), occurs when an attacker exploits an input validation flaw in software to introduce and execute malicious code. Code is injected in the language of the targeted application and executed by the server-side interpreter for that language – PHP, […]
Every day we hear of a new technological invention — to the extent that many important processes, like bank transactions, information exchanges, and messaging have all become digital. However, with increased digitization comes increased security threats, especially from hackers. When building a confidential data-based system, you must make sure it […]
Two vulnerabilities in the Gutenberg Template Library & Redux Framework plugin have been discovered to be vulnerable. Over 1 million sites are affected A third party WordPress Gutenberg Template Library plugin with over a million users was discovered to have two vulnerabilities. Successful exploitation of these vulnerabilities could create an […]
For an upcoming project and blog article, I’m going to need a Linux setup on my main machine. The project requires me to use a minimal install of CentOS 7 (Linux) as the operating system. In order to run another operating system on my hardware I will use VirtualBox so […]
Discourse is an open source forum software developed by Jeff Atwood, the co-founder of Stack Overflow. The application is written with Ruby on Rails. As a product designed for the next decade of the Internet, Discourse breaks with existing forum software by its commitment to open source, concise page style […]
ent a beneficial tool for bug bounty hunters which is specially designed to check the security of any web application. OWASP ZAP is an open-source web application security scanner. It is intended to be used by both those new to application security as well as professional penetration testers. It has […]
Hey Folks, in this article we will show you the whole scenario that how attackers hack android smartphone by using QR code and HTA attack techniques. To accomplish this task we must have a Kali Linux operating system. We think most people are familiar with QR code, so we only […]
AdvPhishing is a phishing tool which allows the user to access accounts on social media even if two-factor authentication is activated. AdvPhishing allows the user to gain the target’s username, password and latest one-time password (OTP) in real-time as the target is logging in. In addition to this the user […]
Hey Folks, we are excited to write this masterpiece article on DNS enumeration tool which can help you to find some subdomain takeover vulnerability in different website as well as bounty. Dnsenum is a tool for DNS enumeration, which is the process of locating all DNS servers and DNS entries for […]
Like any other operating system, GNU/Linux has implemented a memory management efficiently and even more than that. But if any process is eating away your memory and you want to clear it, Linux provides a way to flush or clear ram cache. How to Clear Cache in Linux? Every Linux […]