877.791.9571 |

About the Author:

Sudhanshu Chauhan is a researcher at InfoSec Institute. He is a B.Tech (CSE) graduate from Amity University. His areas of interest include (but are not limited to) Web Application Security and Bypasssing Security Measures(IDS/IPS, AV etc.).


A network sniffer or protocol analyzer is a software application or hardware device which is capable of intercepting traffic and logging it for further analysis. A packet sniffer is […]


Netcat: TCP/IP Swiss Army Knife

Most of the tools in any hacker or pentester’s arsenal are task-specific; they specialize in one function only but Netcat, also known as the ‘TCP/IP Swiss Army Knife,’ does […]


Scapy: All-in-One Networking Tool

A network is an essential part of any cyber infrastructure. There are various tools available for the networking part of pentesting and other security assessment tasks like Nmap, tcpdump, […]


Windows Vulnerability Assessment

Nowadays every enterprise, be it small or large, depends on information technology (IT) for some or most of its operations, and with IT; comes information security. Most of the […]


Interview: Marius Corici, CEO of Hack a Server

Marius Corici is the Co-Founder and CEO of Hack a Server. He is a serial entrepreneur and has been involved with various industries. In 2003 he started a business […]


Intrusion Prevention System: First Line of Defense

In the past few years, advancements in technology have grown hand in hand with a substantial increase in hacking and cyber espionage. The whole world is deeply interconnected through […]


Metadata: The Hidden Treasure

In today’s Information age, Data is very crucial for every organization. From Information security point of view also data is what everybody is behind, be it the Hacker or […]


Passive Fingerprinting


During penetration testing, the main objective of the auditor is to exploit and gain access. For that to happen, it is required to have some information about the system/network […]


Virtualization Security: Hacking VMware with VASTO


With the advancement of the technology in the field of computers, requirement for hybrid setups has also escalated. Nowadays every company is using a heterogeneous infrastructure for its variety […]


Wi-Fi Security: The Rise and Fall of WPS

, ,

Wireless local-area networks which are also referred to as WLANs or Wi-Fi are prevalent these days. They are so popular that they can be found installed in offices, colleges, […]

Cross-Site Scripting (XSS)


Web applications today suffer from a variety of vulnerabilities. Cross Site Scripting (XSS) is one of the most prevalent web application security flaws, yet possibly the most overlooked. It […]