Hacking

Writing Your Own Parser

Writing Data Format Parsers [pkadzone zone="main_top"] Abstract File format parsing and converting for further processing is a fundamental activity in many

Content Spoofing

According to WhiteHat Security's annual study of about 15,000 websites, 86% had at least one serious hole that hackers could exploit, and content spoofing is

Password Cracking Evolution

In this article, my goal is to show the evolution in password cracking era how hackers/crackers cracked passwords around 10 years ago and how they are cracki

Heap overflow: Vulnerability and heap internals explained

A heap overflow is a form of buffer overflow; it happens when a chunk of memory is allocated to the heap and data is written to this memory without any bound

Phishing and social engineering techniques 3.0

This is the third part of the phishing and social engineering techniques series. In the first article we have discussed what phishing is and what the differe

Hacking Drones … Overview of the Main Threats

Introduction The Unmanned Aerial Vehicles (UAVs), also known as drones, represent a revolution in the security context; these powerful systems could be used

QR Code: USSD attack

The QR code or Quick Response code was originally designed for industrial applications, and has quickly gained popularity in the advertising industry. With t

Phishing and Social Engineering Techniques 2.0

This is the second part of the phishing and social engineering techniques series. In the first article, we have discussed what phishing is, as well as differ

Search engine hacking – Manual and automation

We are all aware of Google/Yahoo/Bing Search engines; they need no introduction. We use them every now and then to solve our day-to-day queries. [pkadzone

Google Hacking – For fun and profit - I

Google has been used ever since its beginning to find answers for most if not all of our questions from the beginning of the universe to even finding cure fo