Introduction Apple iOS has successfully emerged as one of the most widely used Operating System today. It runs on Apple devices such as iPhone, iPad, iPod touch and Apple TV. Apple AppStore has the highest number of applications (500,000) with 25 billion …
- About Me
Author bio not avialable
All Articles by "Pankit Thakkar"
What is Tamper Data? Tamper data, an add-on (extension) for Mozilla Firefox, is a fast, simple yet effective tool which can used to do penetration testing. Tamper Data basically gives us the power to view, record and even modify outgoing HTTP requests. …
While trying to read what “private browsing” means, I came across its page in Wikipedia. It has a very interesting definition. It reads as follows: Privacy mode or "private browsing" is a term that refers to privacy features in some web browsers. …
Hi boyz’n’girls. This is my first appearance on ClubHack, hope not the last. 😀 Anyway straight to the point. I will talk about “PHP shells”. PHP shells are used by Blackhats to maintain persistence into a compromised machine, typically a webserver. A …
HTTP HTTP is a hypertext transfer protocol is provides a standard for web browsers and communicate with server. It is an application layer protocol designed within the framework of the Internet protocol suite. HTTP is also called a stateless protocol because each …
header.jpg Introduction I have been associated with understanding of cross site scripting for quite some time now. I have provided quite a few talks and presentation on this subject. Being a secure code reviewer, have found number of xss issues in the …
Overview Scapy is a wonderful packet crafting tool written by Philippe Biondi. Below is an excerpt from the Scapy documentation neatly describing Scapy. “Scapy is a powerful interactive packet manipulation program. It is able to forge or decode packets of a wide …
The Distributed Denial of Service attacks are now the most common and easy weapon to create trouble and to do a very visible damage to a target, with an after all very little effort.For example is the most common weapon used by …