Wordpress Security Services

Ehacking Tutorial

OWASP iOSForensic - Forensic Analysis

At times, you need a tool to conduct the forensics analysis; in order to investigate and recover the information found in digital devices. The tool and method is totally depends on the nature of the test and the objective of the forensic analysis, however security analyst and developers have created designated tools for every platform (OS, Application etc).

Liffy - Local File Inclusion Exploitation Tool

Local File Inclusion (LFI) is similar to a Remote File Inclusion vulnerability except instead of including remote files, only local files i.e. files on the current server can be included. The vulnerability is also due to the use of user-supplied input without proper validation.


FakeNet Malware Analysis

FakeNet is a tool that aids in the dynamic analysis of malicious software.  The tool simulates a network so that malware interacting with a remote host continues to run allowing the analyst to observe the malware’s network activity from within a safe environment.  The goal of the project is to:


OpenVPN Desktop client affected by a critical CSRF flaw

http://www.ehacking.net/2014/07/openvpn-desktop-client-affected-by.htmlResearchers at SEC Consult have discovered a CSRF vulnerability in the OpenVPN Desktop Client that can allow remote code execution.

Security researchers at SEC Consult have discovered a CSRF flaw in the OpenVPN Desktop client and promptly reported it to the company in May. OpenVPN Desktop Client for its Access Server is an SSL VPN for a variety of platforms. The vulnerability only affects Windows versions of the application.

Any Keylogger for MAC

At times, we need a tool to remotely monitor activities of a computer user; this user might be your friend, loved ones, children and even colleagues. Whatever the objectives you have in your mind but you always look for the effective solution, and specially for the MAC operating system; it becomes harder to achieve the objectives. However, AnyKeylogger for MAC is one of the most effective and efficient solution to monitor activities of a MAC user remotely.