Thursday , April 18 2024 12:22 AM
Home / Top 5 (page 5)

Top 5

Turn Off Auto-play Facebook Videos on iPhone IOS 9.X.X

Auto-play video can be annoying especially when you are doing something serious on your Facebook or any other social media. Agreed that your FB friends love to share good content, but not those long videos that run for more than 10 minutes. How to Disable Auto-play Facebook Videos on iPhone/iPad …

Read More »

Avast Antivirus: X.509 Error Rendering Command Execution

Avast will render the commonName of X.509 certificates into an HTMLLayout frame when your MITM proxy detects a bad signature. Unbelievably, this means CN="<h1>really?!?!?</h1>" actually works, and is pretty simple to convert into remote code execution. To verify this bug, I've attached a demo certificate for you. Please find attached …

Read More »

Installing VPN on Kali Linux

VPN on Kali Linux is strangely not installed and enabled by default which leaves you with a greyed out VPN option panel. VPN stands for Virtual Private Network and extends your private network over the internet. In this tutorial we will install the necessary packages and setup the popular VyprVPN service in Kali …

Read More »

Stagefright Bug 2.0 One Billion Android Devices Vulnerable to Hacking

Stagefright 2.0, as it’s being dubbed by researchers from security firm Zimperium, is a set of two bugs that are triggered when processing specially designed MP3 audio or MP4 video files. The first flaw, which is found in the libutils library and is indexed as CVE-2015-6602, resides in every Android …

Read More »

Apple iOS 9.0.2 Update Patches Lock Screen Bypass Exploit

Apple has rolled out the second minor iteration of its newest mobile operating system iOS 9, which fixes the iOS lockscreen vulnerability. The widely publicized LockScreen bug allowed anyone with physical access to your iOS device running iOS 9.0 or iOS 9.0.1 to access all the contacts and photos without unlocking …

Read More »

Types of Penetration testing

Today we will learn about different types of Penetration Testing. Although there are different types of penetration testing, the two most general approaches that are widely accepted by the security industry are Black Box Penetration Testing and White Box Penetration Testing. They are very important to learn for any beginner hacker …

Read More »

Google Dorks 2015

GOOGLE Dorks Dorks are an input query into a search engine (Google in our case) which attempt to find websites with the given text provided in the dork itself. Basically it helps you to find websites with a specific code in their url which you know is a sign of …

Read More »