IntroductionIn my previous article we saw the different ways of fuzzing, including suffix and prefix. We used those fuzzing techniques in order to find error messages in web applications. Now that we know how
A Beginners Guide To Using IPTables
ABSTRACTReaders, there are numerous reasons ... It is well known that the Internet is an unmanaged an decentralized network, running under a set of protocols, which are not designed to ensure the integrity and confidentiality of
bb in Kali Linux
Bb is a high quality audio-visual demonstration for your text terminal.1. How to Install bb – Open terminal, type apt-get install bb and Press Enter.(Click image for large view)2. Open bb with Help Commands Syntax - /usr/games/bb
Certified Penetration Testing Consultant - C)PTC Review
Although most of the attacks have moved towards Web Application, but the most critical information resides upon the network and is not being exposed to the Web application, therefore a lot of the
Web Application Exploits
Web EvolutionStatic content:- Server serves web pages created by people.Dynamic content via server-side code:- Server generates web pages based on input from user and a database using code executed on server.Ex - CGI scripts
oneko in Kali Linux
Oneko changes your mouse cursor into mouse and creates a little cute cat and the cat start chasing around your mouse cursor. If the cat catchup the “mouse”, start sleeping.1. How to install –
How to Delete Gmail Account
Sometime we need to delete Gmail account and every person has their own reason behind this decision. We want to also tell your think once again about deleting your gmail. After deleting gmail account
Buffer overflows
In computer security and programming, a buffer overflow, or buffer overrun, is an anomaly where a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory. This is a
Manual Web Application Penetration Testing – Suffix & Prefix in Fuzzing
IntroductionIn this series of articles, last time we talked about fuzzing and various SQL statement special characters which can be used in fuzzing a web application. In this article, I am going to focus
CISCO Systems Security Certification
The industry leader in networking, unified communications & collaboration - and an innovator in data center technology, network infrastructure, and other key emerging technologies.Cisco launches its first global re-branding campaign for the first time
Matrix in Kali Linux
Show a scrolling ‘Matrix’ like screen in Kali Linux1. How to install – Open Terminal, type apt-get install cmatrix and Press Enter(Click on image for large view)2. Open cmatrix with help commands.Syntax – cmatrix –h3. This is
Interview of Kali Linux
What is Kali Linux - Kali Linux is the new generation of the industry-leading BackTrack Linux penetration testing and security auditing Linux distribution. Kali Linux is a complete re-build of BackTrack from the ground