XSS – The Burning issue in Web Application Read

One of the largest portals was in news recently when their website was exploited by targeting XSS vulnerability. The person who compromised the website has also notified the portal with screenshots proving successful attack. Information Security chief called an urgent meeting to …

Network Security Read

Network Security

Introduction Computer Networks are the back bone of all organizations which rely on Information Technology (IT) and are the primary entry point for users to access the Information resources of an organization. Networks today are no longer limited within the physical location …

Exploiting Remote System without Being Online Read

Introduction This paper demonstrates unique kind of communication technique between attacker machine and victim machine during the exploitation of any victim system. Usually, while an attacker exploits the remote system and gets the remote command prompt (remote shell), attacker is only able …

One Link Facebook Read

One Link Facebook

Can Facebook accounts be hacked? Is it be possible to access your account without your permission and without knowing your username and password? Unfortunately “YES” is the answer. Yes it is possible and that too with a single link, a link which …

GSM Read

GSM

IntroductionIn this article we will describe the various tools, software, hardware and techniques, that can be employed to attack the GSM. All these are described in brief and corresponding references are given so that you will able to go and read more …

Looking Into the Eye of the Bits Read

Reverse Engineering using Memory Analysis During the past three years I've been developing tools for research and implementation of a new type of software analysis, which I will introduce in this paper. This new type of reverse engineering allows recovering internal implementation …

Low Profile Botnets Read

Low Profile Botnets

 The term ‗Botnet‘ was sited frequently in headline news last year. It continues to dominate the ever changing threat landscape of cyberspace. Whether it is Conficker, Aurora, NightDragon or the latest ShadyRAT attacks, Botnets continue to haunt cyberspace. With millions of such …

Rootkits are Back with the Boot Infection Read

Preface Windows rootikits have been around since year 2005 and have become a buzzword in the security industry over recent years. While rootkits have traditionally been used by sophisticated attackers to hide their presence on compromised machines, recent malwares with rootkit capabilities …

Gonna’ Break It On Down Gonna’ Kick It Root Down Read

What is ‘Rooting’? ‘Rooting’ is the process in which you get root and unrestricted access to your android phone and software. ‘Rooting’ is essentially “hacking” your Android device.   Why is it called ‘Rooting’? The term “root” comes from Unix/Linux world to …