Category: Articles

0

Using Gobuster to Find Hidden Web Content

Directories and Files enumeration is one of the first steps that an attacker performs during web application pentesting. This step is necessary to identify potential hidden areas of a website that aren’t supposed to...

SQL Injection 0

Introduction to SQL Injection

SQL injection is often referenced as the most common type of attack on websites. It is being used extensively by hackers and pen-testers on web applications. The OWASP Top Ten lists SQL Injection (or...

0

Introduction to Malware Analysis

In this article, we will try to learn what malware is and how malware analysis works. It is aimed at complete beginners who have never tried malware analysis before. If that’s you, then this...

0

How To Use Nmap: A Beginner’s Guide

Nmap is an open-source network mapping tool developed by Gordon Lyon. It is widely used as a port scanner and a host discovery tool by network administrators and hackers world-wide. The reason for its...

1

Overthewire, Learn Hacking By Playing Games

If you’ve spent enough time on the web searching for practical resources to learn how to hack, then you should know by now what a hustle it is to find the right place to...

0

Google Dorks Explained

Whenever you want to look for something on the Internet, you use Google. The giant search engine indexes almost everything on the web. It has made billions of web pages accessible for people to...

cyber security, cybersecurity, computer security 0

How to Become an Ethical Hacker

Any person who is seriously considering to become an ethical hacker should be aware of the challenges they might face. If you think that you will get to the expert level in a few...