Pulling Windows Passwords
he windows passwords can be accessed in a number of different ways. The most common way would be via accessing the Security Accounts Manager (SAM) file and obtaining the system passwords in their...
View ArticleWireless penetration testing never been so easy
wifite Link Project: https://github.com/derv82/wifite Wifite is for Linux only.Wifite is an automated wireless attack tool.Wifite was designed for use with pentesting distributions of Linux, such as...
View ArticleList of Bug Bounty Programs
We have all used sites such as bugcrowd.com but did you know there are some companies that offer bug bounties through their own website. This list will help bug bounty hunters and security researchers...
View ArticleThe Security of HTTP-Headers
When it comes to web application security one often thinks about the obvious: Sanitize user input, transmit data over encrypted channels and use secure functions. Often overlooked are the positive...
View ArticleHow hackers will crack your “secure” password
You’ve probably heard that a strong password is really important to keep your accounts safe. You’ve also probably heard that people are still not creating good passwords. But even if you are—or at...
View ArticleHow to extend free trials with fake credit cards
When I see the words “free trial,” I know I’m probably going to have to whip out my credit card and enter in the number to “not get charged.” Then I end up forgetting about the trial and want to kick...
View ArticleHow to Get SQL Server Security Horribly Wrong
It is no good doing some or most of the aspects of SQL Server security right. You have to get them all right because any effective penetration of your security is likely to spell disaster. If you fail...
View ArticleWhat is Remote SSH Tunneling
What is Remote SSH Tunneling? There are two different ways to make an SSH tunnel. They are Local and Remote Port Forwarding. Here we will be talking about the remote ssh tunnelling. Imagine that you...
View ArticleUsing FSRM to Combat Ransomware
Many companies spend a fortune on Next Generation anti-virus and Machine Learning “AI” tools to halt the spread of ransomware and although I strongly believe that user education and training plays a...
View ArticleTop 5 SIM Cloning Tools To Clone SIM Card
Cloning a SIM card is’t the easiest thing to do but these 5 applications make it easy, give them a try and tell us how you got on. 1. MOBILedit Download URL: http://www.mobiledit.com/sim-cloning...
View Article
More Pages to Explore .....