In Part 1 of this article, we have covered Creating case, File Search and Indexing. This article will cover some more features/ functionalities of OS
Kacper Szurek created Burp_wp, an extension of burpsuite that scans and finds vulnerabilities in WordPress plugins and themes using a burpsuite proxy. You can download
In our previous article part1, we had discussed how to perform a brute force attack on any web application server for making unauthorized login into
Introduction Network Address Translation generally involves “re-writing the source and/or destination addresses of IP packets as they pass through a router or firewall” (from http://en.wikipedia.org/wiki/Network_Address_Translation) The Linux kernel
OSForensics from PassMark Software is a digital computer forensic application which lets you extract and analyze digital data evidence efficiently and with ease. It discovers,
This article is about Post Exploitation on the Victim’s System using the Windows Command Line. When an Attacker gains a meterpreter session on a Remote
Hello friends! Today we are going to take another CTF challenge known as USV: 2017. The credit for making this vm machine goes to “Suceava
Scenario: Competitors suspect Mr. X of selling his company’s confidential data, but without any evidence, they could not take any action against him. To get
Burpsuite Decoder serves as a tool that transforms encoded data into its real form or transforms raw data into various encoded and hashed forms. This