From China, With Love
Lest anyone think that D-Link is the only vendor who puts backdoors in their products, here’s one that can be exploited with a single ...
Burp SessionAuth Extension
Overview Normally a web application should identify a logged in user by data which is stored on the server side in some kind of session ...
Android Hack-Tool Steals PC Info
Over the weekend, Yeh, one of our Security Response Analysts, came across some interesting analysis on a Chinese language forum about an ...
The most sophisticated Android Trojan
Recently, an Android application came to us for analysis. At a glance, we knew this one was special. All strings in the DEX file were en...
Cracking Credit Card Hashes with PowerShell
As penetration testers, we are frequently engaged to do penetration tests for PCI compliance. As a part of these penetration tests, w...
Stupid Little IPv6 Tricks
With the IPv6 Summit on Friday, various IPv6 related topics are of course on my mind. So I figured to put together a quick laundry list o...
Steps Toward Weaponizing the Android Platform
The mobile and tablet market have been flooded by millions upon millions of Android based devices. I wonder if Ken Thompson or Dennis Ritch...
Flexible Home Layout
Downloads[two]
Media[left]
Books[right]
Photos[carousel](6)
Accessories[combine]
Zebronics
Advertisements
Popular Posts
-
Anonymous What is Information security? Security means surety of not breaching personal information. It is also known as safegu...
-
This is a nice app to capture and display WiFi and bluetooth traffic on Android phones. But for using this app, you have to root your phon...
-
“Treat your password like your toothbrush. Don’t let anybody else use it, and get a new one every six months” – Clifford Stoll Wh...
-
Usually hackers upload shell to victim's site using the vulnerability in that website. Shell allows hackers to hack/deface the website...
-
IPB (Invision Power Board) all versions (1.x? / 2.x / 3.x) Admin account Takeover leading to code execution Written on : 2013/05/...
-
PuTTY is the most popular SSH client for Windows. One, and probably the only one, of PuTTY drawbacks is that you need to start a new copy ...
-
Jetico has announced BestCrypt Container Encryption for Linux 2.0 , now with a simple user experience in a new GUI, plus greater stability...
-
Hacking & Cracking “Hacking” is a activity of intrusion and exploiting into computer system or network and an art of exploring securi...
-
Little bit old.....but still working good Mega Share 500 in 1 / Hacking Tools Trojan Horses - Yuri RAT v1.2 - MofoTro v1.7 BETA -...
-
Yes you heard it right.. Symform a cloud storage website provides you 200GB of Free Cloud Storage (Cloud Storage refers to storing data on...