Quantcast
Channel: Caintech.co.uk
Browsing latest articles
Browse All 10 View Live

Image may be NSFW.
Clik here to view.

Pulling Windows Passwords

he windows passwords can be accessed in a number of different ways. The most common way would be via accessing the Security Accounts Manager (SAM) file and obtaining the system passwords in their...

View Article



Image may be NSFW.
Clik here to view.

Wireless penetration testing never been so easy

wifite Link Project: https://github.com/derv82/wifite Wifite is for Linux only.Wifite is an automated wireless attack tool.Wifite was designed for use with pentesting distributions of Linux, such as...

View Article

List of Bug Bounty Programs

We have all used sites such as bugcrowd.com but did you know there are some companies that offer bug bounties through their own website. This list will help bug bounty hunters and security researchers...

View Article

Image may be NSFW.
Clik here to view.

The Security of HTTP-Headers

When it comes to web application security one often thinks about the obvious: Sanitize user input, transmit data over encrypted channels and use secure functions. Often overlooked are the positive...

View Article

Image may be NSFW.
Clik here to view.

How hackers will crack your “secure” password

You’ve probably heard that a strong password is really important to keep your accounts safe. You’ve also probably heard that people are still not creating good passwords. But even if you are—or at...

View Article


Image may be NSFW.
Clik here to view.

How to extend free trials with fake credit cards

When I see the words “free trial,” I know I’m probably going to have to whip out my credit card and enter in the number to “not get charged.” Then I end up forgetting about the trial and want to kick...

View Article

Image may be NSFW.
Clik here to view.

How to Get SQL Server Security Horribly Wrong

It is no good doing some or most of the aspects of SQL Server security right. You have to get them all right because any effective penetration of your security is likely to spell disaster. If you fail...

View Article

Image may be NSFW.
Clik here to view.

What is Remote SSH Tunneling

What is Remote SSH Tunneling? There are two different ways to make an SSH tunnel. They are Local and Remote Port Forwarding. Here we will be talking about the remote ssh tunnelling. Imagine that you...

View Article


Image may be NSFW.
Clik here to view.

Using FSRM to Combat Ransomware

Many companies spend a fortune on Next Generation anti-virus and Machine Learning “AI” tools to halt the spread of ransomware and although I strongly believe that user education and training plays a...

View Article


Image may be NSFW.
Clik here to view.

Top 5 SIM Cloning Tools To Clone SIM Card

Cloning a SIM card is’t the easiest thing to do but these 5 applications make it easy, give them a try and tell us how you got on. 1. MOBILedit Download URL: http://www.mobiledit.com/sim-cloning...

View Article
Browsing latest articles
Browse All 10 View Live




Latest Images