Cross-Site Request Forgery(CSRF) | Web App Vulnerability

Cross-Site Request Forgery also known as CSRF, XSRF, sea surfing, the one-click attack is another common web application web vulnerability. It tricks the user’s web browser to do the things it doesn’t intend to do. The attacker tricks the victim browser into generating requests to a website that performs certain actions on behalf of the […]

Cross-Site Scripting | Web application Vulnerability

In this article we’re going to learn about cross-site scripting

Web application security | What is Vulnerability

Today we are going to see about what is vulnerability in web application security. What is Vulnerability? A vulnerability is a security hole in software or an operating system that provides a potential way or angle to attack the system. Basically, vulnerability is a weakness or flaw in a system. and a vulnerability can be […]

What is Session Hijacking Attack | A Quick Guide

In this article, we are going to see about session hijacking attacks and how to prevent them.

What is Zero-Day Exploit? | 0-DAY.

zero day banner

In this article we are going to see about zero day exploits

Steganography |How to hide data in pictures and audio.

In this article we’re going to see about steganography and solve a stego challenge.

What is Remote Access Trojan? | RAT Malware

In this article we are going to talk about Remote Access Trojan (RAT)

How to do Network Hacking| beginners guide

In this article, we’re going to see about Network Hacking. How to do it? and countermeasures. Note-> Only for educational purpose. We’re going to learn about. Footprinting Port scanning Banner Grabbing Searching Vulnerabilities. Penetrating So let’s start with, Footprinting In this phase, the hacker gathers the information of the computer system and the entities they […]

How to hack and crack passwords | Password attacks

In this article, we’re going to talk about password attacks. Nowadays everyone uses passwords to keep their file protected and safe. But is your password really secure? On websites or even in your operating system when the password is created the password got encrypted using one-way hash algorithms. these algorithms are irreversible that makes your […]

What is a Social Engineering attack | How it works?

Social engineering is a way to get someone to do something they wouldn’t do normally, like giving their phone numbers or confidential information by gaining their trust and making a false relationship with them. Basically, It is the art of studying and manipulating human emotions and the way of thinking, it can be friendly or […]