In our previous article, we have discussed a brief introduction of footprinting for gathering information related to the specific person. As we had discussed that
Hello Friends! As we all know that Microsoft Windows 7 are exploitable by eternal blue with SMBv1. Then Microsoft patches this vulnerability by updating the
From Wikipedia A Web crawler, sometimes called a spider, is an Internet bot that systematically browses the World Wide Web, typically for the purpose of Web indexing. A Web crawler starts
Metasploit is a security project or we can say a framework provided to us in order to run exploit code in the target’s PC. Metasploit
Their so many ways to hack the database using SQL injection as we had seen in our previous tutorial Error based attack, login formed based
Google is a tool which helps in finding what one is looking for. Google operators are the terms provided to us for making our search
From Wikipedia and w3schools Cookies A cookie is a small piece of data sent by a server to a browser and stored on the user’s computer
Insecure Direct Object References (IDOR) has been placed fourth on the list of OWASP Top 10 Web application security risks since 2013. It allows an
HTTP (Hyper Text Transfer Protocol) is basically a client-server protocol, wherein the client (web browser) makes a request to the server and in return, the