Home Web Security

Web Security

Cyber Security Issues: How to Establish Your Own Secure Online Business

Cyber Security and Online Business In a modern world where the biggest part of society has a constant, uninterrupted access to a global network, the...

OWTF: OWASP Offensive Web Testing Framework

OWTF is OWASP’s (Open Web Application Security Project) Offensive Web Testing Framework. This tool automates the manual and un-creative part of pen-testing. OWASP’s project...

Top 10 Web Application Vulnerability Scanners

A web vulnerability scanner is a program which works on a web application in order to discover potential security vulnerabilities and architectural flaws. It...

Burp Suite for Web Vulnerability Assessment, Free Training

Burp suite, a well known platform for performing security testing for web, there are many advantages of burp suite over the traditional web vulnerability...

DAws: The Advanced Web Shell

There's multiple things that makes DAws better than every Web Shell out there: Bypasses Security Systems(IPS, WAFs,etc) like Suhosin(uses up to 20 php functions just...

Top 10 Web Application Vulnerabilities

The process of exploiting vulnerabilities in web applications has become very easy, especially for seasoned malicious hacker. When a hacker successfully identifies a security...

Why Automation is important in Web Application Security Assessment?

The importance of vulnerability assessment is the unearth fact and nobody can’t deny it. The technology has revolved in the recent years, the world...

Critical ‘Joomla’ bugs leaves 2.8million websites extremely vulnerable

A critical SQL-injection vulnerability in Joomla most widely used content management system; leaves around 2.8 million websites vulnerable to hackers. The bug allow a...

Xtreme Vulnerable Web Application (XVWA) – Practice Hacking Attacks

XVWA is a badly coded web application written in PHP/MySQL that helps security enthusiasts to learn application security. It’s not advisable to host...

Brolux : A Chinese Trojan Targeting Online Banking Users

ESET researchers on Thursday found a new Trojan, "Brolux" which is targeting  Japanese internet banking users by exploiting vulnerabilities in Flash Player and Internet...

Shadow Daemon: Web Application Firewall

Shadow Daemon is a collection of tools to detect, protocol and prevent attacks on web applications. Technically speaking, Shadow Daemon is a web application firewall ...

Top 10 Open Source Web Testing Tools

Web Testing tools are used to find/identify bugs or errors in a website before it was launched officially for the public on the web....
- Advertisment -

Most Read

Security Against Hacks: A Simple Game of Economics

One of the cold hard truths behind cybersecurity is that it's impossible to prevent a hack 100% of the time. It only takes one...

Certain Things That You Must Know About Microsoft MS-500 Exam and Its Practice Tests

If you want to be a Microsoft 365 security administrator, then there would be a number of responsibilities that will fall on your shoulders,...

Quick Ways to Avoid Being Watched by the NSA’s PRISM Program

Big brother is on the watch online. Today, a week hardly passes without news of government spying, whistleblowers, cell phone hacking, or even private photos...

Android Post Exploitation: Exploit ADB using Ghost Framework in Kali Linux

This article is the part of Android Hacking tutorial; it covers step by step guide to exploit Android ADB to get the persistent connection...

LOOKING FOR HACKING RECIPES FORM THE PRO?

Then sign up for FREE to the ehacking’s exclusive group. You will get the exclusive tips/tricks, tutorials, webinars & courses that I ONLY share with my fellow on this exclusive newsletter.