Over the years the adobe reader has had a bunch of vulnerabilities which are exploited by the hackers. Hackers embed payload in PDF which looks legitimate and maybe important in the eyes of the victim.
What is Defensive Programming Defensive Programming is the development of computer software putting in mind all the unforeseen circumstances that could raise problematic issues. That allows the software to behave correctly despite the input provided.
Previously, we did a post on Cracking WPA/WPA2 WIFI Passwords Using Kali Linux. That is one of the topics that fall under Network hacking. After gaining access to a network, there are many exploits that
If you aspire to become an ethical hacker or a penetration tester, one of the areas you will cover is Network Hacking. That involves spoofing MAC addresses, Deauthentication attacks, Bypassing MAC filtered networks, Hacking WEP/WPA/WPA2
Introduction to John The Ripper - Password Cracker John The Ripper (JTR) is one of the most popular password cracking tools available in most Penetration testing Linux distributions like Kali Linux, Parrot OS, etc. The
Related Searches: wordpress vulnerability scanner, wp scan, wpvulndb, wordpress scanning tools, enumerate users wpscan, how does wpscan enumerate users, wpscan api As of 2021, 39.5% of websites online are powered by WordPress. That's about 64
What is SQL injection (SQLi)? SQL injection is one of the most common attacks used by hackers to exploit any SQL database-driven web application. It’s a technique where SQL code/statements are inserted in the execution
The pam_faillock module performs a function similar to pam_tally and pam_tally2 but with more options and flexibility. The pam_faillock module supports temporary locking of user accounts in the event of multiple failed authentication attempts. This
In this article we will explore pam_tally2 module which is used to maintain login counter in Linux environment. We will use pam_tally2 to lock user account after X failed login attempts, where X can be
In this tutorial Guide we will learn about SSH Port Forwarding Different Types of Forwarding Practical examples to create SSH Tunnel and access HTTP web server in Linux Verify SSH Tunnel using tcpdump Close SSH