ethical-hacking Archive

XSS attack logo

What is an XSS Attack and how Does it Work ?

Cross-Site Scripting (XSS) is a form of security vulnerability typically found in web applications. XSS Attack enables attackers to inject malicious scripts into the web pages viewed by other users. XSS attack are one of the most prevalent forms of Web Attack, …

scanning wordpress site for vulnerabilities

WordPress is a free open source content management system. Thousands of Web sites run WordPress, and it is considered the top blogging platform in the world. According to Usage Statistics and Market Share of Content Management Systems for Websites (W3Techs. January 2015. …

recon-ng – advanced reconnaissance framework

Reconnaissance techniques are the one of the first steps penetration testers learn when learning how to exploit systems for vulnerabilities. Traditional reconnaissance techniques are used to gather intelligence, define scope, and identifying weaknesses. Disclaimer – Our tutorials are designed to aid aspiring …

How to Clone Any Website Using HTTrack

HTTrack takes any website and makes a copy to your hard drive. This can be useful for searching for data on the website offline such as email addresses, information useful for social engineering, hidden password files (believe me, I have found a …

Setting up VPN in Kali linux 2.0

A VPN or Virtual Private Network is a method used to add security and privacy to private and public networks, like WiFi Hotspots and the Internet. VPNs are most often used by corporations to protect sensitive data.z A virtual private network (VPN) …

Evil Twin Access Point tutorial Kali-Linux

What is Evil twin access point?? Evil twin access point is a wireless access point that has been installed on a secure network without explicit authorization from a local network administrator, whether added by a well-meaning employee or by a malicious attacker. To …

Like the article? please consider sharing it. Thank you

Advertisment ad adsense adlogger