Hacking

Bypassing same origin policy (SOP)

The same origin policy is an important concept in the web application information security domain. In this policy, a web browser allows scripts contained in

Ethical Hacking Dual Certification

Interested in an online course for hacking? A dual training CEH boot camp?[pkadzone zone="main_top"] Our most popular information security and hacking train

Packet crafting: a serious crime!

Packet crafting is the art of creating a packet according to various requirements to carry out attacks and to exploit vulnerabilities in a network. It's main

Windows Exploit Mitigation Technology – Part 2

In Part 1, we explained GS cookies and Safe SEH. If you haven't read that part, it is highly recommended to read it first. The Enhanced Mitigation Experience

Windows Exploit Mitigation Technology – Part 1

The spree of exploits on Windows has led to the creation of a certain type of exploit protection mechanism on Windows. Protection from things like buffer ove

Ethical Hacking Interview Questions

If you’ve got hacking skills, you can turn your ethical hacking into a career. Ethical hacking is the term given to penetration testing and prevention. Your

PowerShell toolkit: PowerSploit

PowerSploit is a collection of PowerShell scripts which can prove to be very useful during some exploitation and mostly post-exploitation phases of a penetra

Cracking Android App Binaries

In this article, we will see how a developer can perform basic checks to programmatically detect if the app is running on an emulator and stop executing the

Website Hacking Part V

Introduction In this part of the Website Hacking series we are going to take a look at how to minimize damages from XSS attacks considering our web applicati

File inclusion attacks

A file inclusion vulnerability allows an attacker to access unauthorized or sensitive files available on the web server or to execute malicious files on the