877.791.9571 |

About the Author:

Aditya Balapure is an information security researcher, consultant, author with expertise in the field of web application penetration testing and enterprise server security. Aditya has 3 years of practical experience in the field of information security. He has quite a few credentials to his name such as CEH, ECSA, MCP and a few international publications. His deep interest in vulnerability assessment and offensive penetration testing groups him among the white hats of the information security arena. Aditya Balapure is involved into many corporate trainings besides his constant hobby of open vulnerability disclosure.
Helix-08222013

Incident Response and Forensic Martial Arts with Helix

Helix3 is a live CD for doing computer forensic investigation and incident response. It is built on top of Ubuntu and comes in both free and commercial forms. This […]

SANSforensics_08192013

SANS Investigate Forensics Toolkit – Forensics Martial Arts Part 2

This is a continuation of the first article on SANS Investigate Forensics Toolkit. In this article we will be covering the rest of the tools discussed earlier in the […]

SANSforensics_08192013

SANS Investigate Forensics Toolkit—Forensics Martial Arts Part 1

The SANS Investigate Forensic Toolkit (SIFT) is an interesting tool created by the SANS Forensic Team and is available publicly and freely for the whole community. It comes with […]

hackerproof08142013

Hacker Proofing Apache & PHP Configuration

SECURING APACHE

Apache has been truly one of the dominant web servers of the World Wide Web. It’s one of the best open source projects, Web Server for both the […]

memoryForen07222013

Memory Forensics and Analysis Using Volatility

Volatility is one of the best open source software programs for analyzing RAM in 32 bit/64 bit systems. It supports analysis for Linux, Windows, Mac, and Android systems. It […]

citadel_px_07152013

Automated Penetration Testing Redefined with CITADEL PX from Pwnie Express

After the huge success of Pwn Plug, Power Pwn and Pwn Pad we have another great product from Pwnie Express named Citadel PX. Pwnie Express is a company known […]

zeus07082013

Botnets Unearthed – The ZEUS BOT

Zeus, also known as ZBot/WSNPoem, is famous for stealing banking information by using man in the browser keystroke logging and form grabbing. As the term suggests, man in the […]

ZeroAccess-07012013

The ZeroAccess Botnet Revealed

There has been a large spread of Botnet-related threats in the web world recently. Now when we talk about botnets, it is basically a collection of code linked to […]

Black-Hole-Exploit

Cyber Weapon of Mass Destruction- The Blackhole Exploit Kit

Recent security advisories reveal that the web exploit kits like the Blackhole Exploit Kit are responsible for the vast majority of web attacks and malware infections taking place over […]

Massive Vulnerability CVE-2013-0027 Owns/Strikes Internet Explorer 6 to 10

The recent major vulnerability CVE-2013-0027 flooded almost all versions of Microsoft Internet Explorer and affected operating systems like Windows XP, Vista, 7, and 8, including all the major server […]

Spamhaus

DDoS Attack on Spamhaus – An insight

Spamhaus recently witnessed one of the biggest Distributed Denial of Service attacks on its infrastructure. The Spamhaus Project is an international non-profit organization that has a mission to provide […]

java-hack-02272013

The Recent Java Hack aka CVE-2013-1489 & CVE-2013-0422

There have been debates over the security and privacy issues concerning Java, the platform independent language. Time after time, the black and white hats have made full disclosures to […]

TutorialonS2-sized

Tutorial on SQLi Labs

Introduction:

Structured Query Language, also known as SQL, is basically a programming language that deals with databases. For beginners, databases are simply data stores that contain both client side and […]