877.791.9571 |

About the Author:

Chintan Gurjar is a System Security Analyst and researcher from London working in Lucideus Tech Pvt Ltd. He has written articles for Europe based magazine namely “Hakin9”, "PentestMag" and India based magazine “Hacker5”. He has done a valuable research in cryptography overhead mechanism. Chintan Gurjar has completed B.Tech in computer science from India and currently pursuing his post graduate degree in computer security & forensics from London (UK). During his academics, he has submitted a small scale research paper on Cryptography Overhead Mechanism in IPsec Protocol. He has also submitted Network Security Auditing and Network services administration and management report. He is very keen to spread cyber awareness world wide. In future he would like to work for his Country’s government in a forensics investigation field.

Fool the Network Hunters (Hackers)

Portspoof is meant to be a lightweight, fast, portable, and secure addition to any firewall system or security system. The general goal of the program is to make the […]


Minor Web Application Bugs Simplified

In this article I am going to discuss a few of the most important vulnerabilities which exist in almost all applications in the world. They are cracking the authentication […]


Information Gathering Using Metasploit

Your goals during information gathering should be to gain accurate information about your targets without revealing your presence or your intentions, to learn how the organization operates, and to […]


Case Study – News of the World Phone Hacking Scandal (NoTW)

Authors –

Edmand Dester Thipursian – Edmand.dester@gmail.com
Sai Thogarcheti – Harikamurthy9@gmail.com
Abdullah Al Fahad – candyman961@hotmail.com
Chintan Gurjar – chintangurjar@outlook.com
Adam Mentsiev – adam.mentsiev@study.beds.ac.uk
Alams Titus Mammuan – alamsx11@gmail.com

1. Introduction

The world is growing rapidly with […]


Information Security Policy For SME

Information security (IS) is a critical part of any small scale company and a big enterprise, and a challenge for any firm. Information security involves very confidential, important assets […]


Theoretical Methodology for Detecting ICMP Reflected Attacks: SMURF Attacks

There are plenty of different ways to track the original source of a DoS attack, but those techniques are not efficient enough to track a reflected ICMP attack. When […]


Notes On Biometric Template Security

In this article I am going to tell you about biometric template security and current technologies in which researchers are working to improve biometric template security. But this won’t […]


Computer Forensics Investigation – A Case Study


We have not performed any live investigation. This was a part of our university assignment, wherein we assumed the roles of forensics investigator, determining what methods were applicable. […]


Manual Web Application Penetration Testing – Suffix & Prefix in Fuzzing


In this series of articles, last time we talked about fuzzing and various SQL statement special characters which can be used in fuzzing a web application. In this article, […]


Manually Web Application Penetration Testing: Fuzzing


When we test a web application, we do not test a single page, but a lot of pages of a single web application. Each page may have more than […]


Manual Web Application Penetration Testing: Identifying Application Entry Points


In this article, I will show you how to find injection points for your target host and how the webpage is encoded when it comes to the client side […]


Manual Web Application Penetration Testing: Introduction

In this series of articles, I am going to demonstrate how you can manually exploit the vulnerability of a web application, compared to using any automation tool, in order […]


Wireless Attacks Unleashed

As we all know, wireless networks are spread at each and every part of the world, starting from personal home to corporate business environments, schools/universities, cafes, etc. The major […]


Firewall Unleashed


Firewalls are used to control the inbound and outbound traffic on a protected network. They have an ability to block and allow the internal as well as external services […]


Transport Level Security – Part 2 – SSL


I’ve already discussed SSL in my previous article. Here I’ll be explaining SSLv3. It was developed by Netscape.

General SSL Architecture

It was designed to secure end-to-end services on the […]

Transport Level Security – Part 1


This is a non-technical guide which will make you familiar with the transport layer. The main purpose of writing this guide is to point out why we need major […]


SSL Unleashed

In this article, I am going to tell you everything about SSL: What it is, why we need it, its technical and non-technical aspects, etc. This article covers the […]


Phishing Counter-Measures Unleashed

In this article, I have done my best to gather and explain all the possible ways by which phishing can be avoided. Here I am going to explain phishing […]


Network Intelligence Gathering

This article is all about different information-gathering techniques on the network. It is the most essential and important task of attackers. Knowing the opponents and their interests can be […]


Penetration Testing of Web Services with CGI Support

This article shows hands-on penetration testing using an Apache server with CGI access; it identifies some vulnerabilities and performs exploits attacking these vulnerabilities, then further patches it to mitigate […]