Bug Bounty Hunting & Ethical Hacking

Why There is No IPV5?

Why there is no IPV5

In 1970, the Internet was only in its early stages. Several internet protocols were being developed to set a standard for internet usage and to control how information packets carrying large amounts of data should be sent over a network. Several internet protocols, such as IPv4 and IPv6, are being developed and deployed in the …

Read more

The Art of Invisibility Review

The art of invisibility review

Have you ever wondered how much information the internet knows about you? If you are a heavy internet user, with a track record of many years, there is probably a lot of data gathered about you. It might be by sitting in the servers of companies, such as Google, or Amazon (searching history, orders history, …

Read more

10 Best Laptops for Ethical Hacking and Kali Linux

10 Best Laptops for Ethical Hacking and Kali Linux

Since I am a penetration tester myself, the question what is the best laptop for ethical hacking and Kali Linux has been extremely relevant to me. I had spent a lot of time online looking for the best option when looking for a new computer for myself. After I realized that my current hardware didn’t …

Read more

Faraday Key Fob Protector Box Review

Faraday Key Fob Protector Box

The thugs are becoming savvy day by day. Do you want to stop these high-tech genius thieves in their tracks? Well, buying a faraday box is just the right thing for you. What is a faraday box you may ask? Well, it was invented many years ago – in 1836 by Michael Faraday. A faraday …

Read more

The 6 Best Masks for Ethical Hackers

Best masks for ethical hackers

The era of streaming services, such as Netflix, has brought us countless hit shows. After releases of the famous series, such as Money Heist, or Squid Game, their fan bases increased in days. The increasing fan base of such popular shows and movies has brought prosperity to the fashion industry. Now you can find hoodies, …

Read more

TryHackMe Basic Pentesting Walkthrough

Tryhackme Basic Pentesting Walkthrough

Tryhackme has many beginner friendly rooms. If you are just starting with the platform, rooms, such as Nmap, or Introductory Researching, is a great start. However, after you’ve nailed the basic tools and methodologies, you should increase difficulty. If you will stay solving same level rooms, you won’t progress that much. Today we are going …

Read more

Biggest Bug Bounties for Remote Code Execution

Remote code execution

Remote code execution, that is also known as arbitrary code execution vulnerability is one of the most dangerous vulnerabilities. If a publicly accessible website is affected by this security issue, this could lead to a total takeover of the system. As a result, data confidentiality, integrity, and availability might be affected. One of the biggest …

Read more

SHA-1 is Obsolete – Do Not Use It for the Passwords

SHA-1 (secure hash algorithm) is a cryptographic hash function. At the time it was created, it was considered being secure, but nowadays it isn’t secure no more. The hash function, that was created in 1995 by US NSA (National Security Agency), is considered being vulnerable since 2005. NIST (National Institute of Standards and Technology) had …

Read more