SQL Injection is a type of web application security vulnerability in which an attacker is able to submit a database SQL command which is executed by a web application, exposing the back-end database.A SQL
Wireless Attacks Unleashed
As we all know, wireless networks are spread at each and every part of the world, starting from personal home to corporate business environments, schools/universities, cafes, etc. The major merit of wireless networking is
Add More Options under “Send To” In Windows
You’ve seen the SendTo folder in action any time you right-click a file and select the Send To folder from the context menu. What you might be unaware of is that you can customize
Full Version Internet Download Manager 7.1
Internet Download Manager (IDM) is a tool to increase download speeds by up to 5 times, resume and schedule downloads. Comprehensive error recovery and resume capability will restart broken or interrupted downloads due to
IP Address
IP (Internet Protocol) - An IP address is a fascinating product of modern computer technology designed to allow one computer or other digital device to communicate with another via the Internet. IP addresses allow
How To Capture Passwords Across The Air - Network Traffic Analysis
ABSTRACT It is known that WireShark is a powerful tool that goes far beyond a simple sniffer. What many do not know is that there are several ways to harness the potential of this tool
Code Igniter XSS Filter Multiple Bypasses
Recently we released our "XSS Filter Evasion Cheat Sheet", i was quite surprised to hear the community feedback. The total downloads have surpassed a figure of 2500, which was quite amazing considering that i
Everything About Linux Iptables/Linux Firewall
IntroductionFirewalls are used to monitor and control the inbound and outbound traffic on the protected network. They have an ability to block and allow the internal as well as external services within the network.
Bypassing Modern WAF's XSS Filters - Cheat Sheet
Last month i was asked by my university teacher "Sir Asim Ali" to write a paper on any topic related to "Computer Architecture" as a semester project. I was particularly interested in writing
Fortune in kali linux
When fortune is run with no arguments it prints out a random epigram. Epigrams are divided into several categories, where each category is sub-divided into those which are potentially offensive and those which are
Understanding This Technique Called MySQL Injection
ABSTRACTIt is known that computers and software are developed and designed by humans, human error is a reflection of a mental response to a particular activity.Did you know that numerous inventions and discoveries are