Sometimes it’s really hard to find the correct exploit for the device that you are pentesting. I found two good references that may [...]
InfoSec on Kali Linux, Hacking, Network and Cyber Security, How to’s, Guides and Tutorials.
Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video. Generally, the hidden messages [...]
Hackers are considered as miracle workers(!); yeah right! Perhaps they are but sometimes Hackers are exaggerated so much that it becomes hard to [...]
Back in 1994 Dave D. Taylor ported the game Doom to Linux and new era started. Since then development studio Crack dot Com [...]
Penetration testing (also called pen testing) is the practice of testing a computer system, network or Web application to find vulnerabilities that an [...]
A DNS-based Blackhole List (DNSBL) or Real-time Blackhole List (RBL) is an effort to stop email spamming. It is a “blacklist” of locations [...]