Bug Bounty Hunting & Ethical Hacking

Is It Safe to Use Responder During a Pentest?

Responder is one of the Kali Linux tools that makes yours, as a pentester, life way easier. This tool is a LLMNR, NBT-NS and MDNS poisoner that can be used to gather sensitive information from the network. The tool is pretty capable and we will get into the specifics of what can we do with …

Read more

Fetch URLs with GetAllUrls (GAU)

Fetch URLs with GetAllUrls

Getting as much information about the target as possible is very important during penetration testing. If you are a seasoned bug bounty hunter you know that sometimes there are low hanging fruits. Hidden subdomain with exposed secret, or a password might result in a big payout. That’s why it is very important to find everything …

Read more

How to Install DirBuster on Ubuntu?

How to install DirBuster on Ubuntu

DirBuster is one of the handy tools that is used during the reconnaissance stage. It helps to discover existing directories of the system. In simple words, it is a multithreaded application for brute forcing the directories. So, basically, it works like this: you launch the DirBuster, choose a dictionary, set the target, and launch the attack. …

Read more

Moodle Penetration Testing Checklist and Tools

Moodle penetration testing checklist and tools

Moodle is one of the most popular learning management systems (LMS) that provides environment for learning, testing, and training. This software is used by a big number of organizations across the globe. As this software provides a platform for educational organizations, it is mainly used by schools and universities. However, because of the COVID-19 pandemic, …

Read more

How Zero-Day Vulnerabilities Are Being Found?

How zero day vulnerabilities are being found

The majority of people associate zero-day vulnerabilities with a black hat, criminal hackers. Government agencies all across the globe, on the other hand, are equally eager in getting them, usually to use in surveillance or their own cyberattacks. In reality, the tremendous rivalry on both sides to be the first to know about zero-day vulnerabilities …

Read more

Best Gifts for Ethical Hackers

Best Gifts for Ethical Hackers

Coming up with a gift idea is always stressful. When there are many different holidays and occasions to give a present, it is not easy to be original every time. However, if you want to make a person happy, you should gift something in his or her area of interest. Today we are going to …

Read more

Cybersecurity for Dummies Book Review

Cybersecurity for dummies review

In this age where hackers are uprising day by day, you should be concerned about the cybersecurity. Every small detail from your daily life by using of the electronics could lead to a security breach. You might end losing a significant amount of money, or lose your private data. Moreover, without even knowing it, you …

Read more