About Me

Author bio not avialable


All Articles by "Pankit Thakkar"



FUD through Hex Editor Heading Read

Introduction Mostly all Trojans/key loggers are detectable by the antivirus. One of the most common problems being faced is making Trojan/key loggers undetectable from the antivirus. So in this tutorial I am going to tell you how to make your Trojan undetectable …

Secure File Upload Form: PHP Programming Read

php.png Hello ClubHack readers ! This is my first Article in ClubHack and I wish to be here with some more nice articles!! This Article is about Developing Secure File Upload Form. Web Pages having File Upload Forms are most commonly seen. …

OWASP Zed Attack Proxy (ZAP) Read

Introduction The OWASP Zed Attack Proxy (popularly known as ZAP) is an integrated penetration testing tool for finding vulnerabilities in web applications. OWASP ZAP is a fork of version 3.2.13 of the open source variant of Paros Proxy. Paros was a HTTP/HTTPS …

ClubHack Magazine Call for Articles – Issue 33 Read

ClubHack Magazine is seeking submissions for next issue, Issue 33 – Oct 2012. Topics and interest areas include, but not limited to the following:- # Hardware, Embedded Systems and other Electronic Devices Hacking# Physical Security / Locks / Safes# Telecom Security (3G/4G, …

Digital Signature Read

Digital Signature

Before we begin or discussion on the digital signature let us first understand what is Signature, what does it stand for etc.  . A Signature is a handwritten and often stylized  representation of someone’s  name, initials, nickname or even  a simple mark …

Cracking WPA/WPA2 for Non-Dictionary Passphrase Read

WPA/WPA2 password can be cracked simply by capturing WPA handshake and then apply dictionary. And if passphrase is in dictionary then password will be cracked. But what if password is not in dictionary? Are there other ways to crack the non-dictionary passphrases? …

Malware Memory Forensics Read

Introduction Memory Forensics is the analysis of the memory image taken from the running computer. In this article, we will learn how to use Memory Forensic Toolkits such as Volatility to analyze the memory artifacts with practical real life forensics scenario.Why Memory …