This video covers how hackers use VPN and Tor to hide their identity and test the security of websites and portals. VPN – Wikipedia Definition: “A virtual private network (VPN) extends a private network across a public network, such as the Internet. It enables a computer or network-enabled device to send and receive data across […]
Java Vulnerable Lab – Learn to Hack and secure Java based Web Applications
We (Cyber Security and Privacy Foundation) have developed a vulnerable Java based Web Applicatoin . This app is intended for the Java Programmers and other people who wish to learn about Web application vulnerabilities and write secure code. The full course on Hacking and Securing Web Java Programs is available in https://www.udemy.com/hacking-securing-java-web-programming/ Warning: Don’t run […]
Evil Twin and Fake Wireless Access Point Hacks: What They Are, How To Defend
Hacking is a term with a wide variety of acts associated with it. Some are incredibly complex and demand a high degree of knowledge, others are little more than installing some software on your device and acting a bit…less than ethically. One of the most common hacks is also one of the easiest to defend […]
BTS PenTesting Lab – a vulnerable web application to learn common vulnerabilities
The most common question from students who is learning website hacking techniques is “how to test my skills legally without getting into troubles?”. So, i always suggest them to use some vulnerable web application such as DVWA. However, i felt dvwa is not suitable for new and advanced techniques. Mutillidae is one of the best […]
Javascript static analysis with IronWASP-Lavakumar, nullcon Goa 2012
Description: From its humble beginnings many years ago, JavaScript has been steadily evolving and has now become a powerful and popular language, especially with HTML5. It is not uncommon to see Web Applications that contain more lines of JavaScript code in them than the number of lines of server-side code. In the HTML5 and mash-up […]
How to connect ssl to backtrack using putty
The video is created by Vishnu Sharma. In this video he has showed u how to run ssh service in u r backtrack or any Linux machine using putty . The download link of putty: http://putty.org
Hacking Remote Pc by Exploiting Java Applet Field Bytecode Verifier Cache Remote Code Execution
CVE-2012-1723: This is a vulnerability in the HotSpot bytecode verifier where an invalid optimization of GETFIELD/PUTFIELD/GETSTATIC/PUTSTATIC instructions leads to insufficient type checking. A specially-crafted class file could possibly use this flaw to bypass Java sandbox restrictions, and load additional classes in order to perform malicious operations. The vulnerability was made public by Michael ‘mihi’ Schierl. Requirement: […]
[Metasploit Tutorial] Hacking Windows XP using IP Address
Do you think it is possible to hack some one computer with just an ip address?! The answer is yes, if you are using unpatched(vulnerable) OS. If you don’t believe me, then read the full article. In this article i am going to demonstrate how to hack a remote computer by exploiting the parsing flaw […]
List of Best sites to learn Malware Analysis
are you interested to learn Malware analysis and searching for the best resources?! Ok , i will give the list of sites where you can learn the malware analysis. Resources for learning Malware Analysis Malware Analysis Tutorials: a Reverse Engineering Approach A series of Malware analysis tutorial written by Dr. Xiang Fu. In this blog, […]
Malware Analysis Video Tutorial for Beginners
Learn malware analysis fundamentals from the primary author of SANS’ course FOR610: Reverse-Engineering Malware (REM). More at LearnREM.com. In this session, Lenny Zeltser will introduce you to the process of reverse-engineering malicious software. He will outline behavioral and code analysis phases, to make this topic accessible even to individuals with a limited exposure to programming […]