877.791.9571 |

About the Author:

Sudhanshu Chauhan is a researcher at InfoSec Institute. He is a B.Tech (CSE) graduate from Amity University. His areas of interest include (but are not limited to) Web Application Security and Bypasssing Security Measures(IDS/IPS, AV etc.).
Wireshark-sized

Wireshark

A network sniffer or protocol analyzer is a software application or hardware device which is capable of intercepting traffic and logging it for further analysis. A packet sniffer is […]

Netcat-sized

Netcat: TCP/IP Swiss Army Knife

Most of the tools in any hacker or pentester’s arsenal are task-specific; they specialize in one function only but Netcat, also known as the ‘TCP/IP Swiss Army Knife,’ does […]

network1

Scapy: All-in-One Networking Tool

A network is an essential part of any cyber infrastructure. There are various tools available for the networking part of pentesting and other security assessment tasks like Nmap, tcpdump, […]

hacker

Windows Vulnerability Assessment

Nowadays every enterprise, be it small or large, depends on information technology (IT) for some or most of its operations, and with IT; comes information security. Most of the […]

hacked11copy

Interview: Marius Corici, CEO of Hack a Server

Marius Corici is the Co-Founder and CEO of Hack a Server. He is a serial entrepreneur and has been involved with various industries. In 2003 he started a business […]

1133370_com_hips

Intrusion Prevention System: First Line of Defense

In the past few years, advancements in technology have grown hand in hand with a substantial increase in hacking and cyber espionage. The whole world is deeply interconnected through […]

hidden_treasure

Metadata: The Hidden Treasure

In today’s Information age, Data is very crucial for every organization. From Information security point of view also data is what everybody is behind, be it the Hacker or […]

fingerprint

Passive Fingerprinting

,

During penetration testing, the main objective of the auditor is to exploit and gain access. For that to happen, it is required to have some information about the system/network […]

DSC00100

Virtualization Security: Hacking VMware with VASTO

,

With the advancement of the technology in the field of computers, requirement for hybrid setups has also escalated. Nowadays every company is using a heterogeneous infrastructure for its variety […]

wifi

Wi-Fi Security: The Rise and Fall of WPS

, ,

Wireless local-area networks which are also referred to as WLANs or Wi-Fi are prevalent these days. They are so popular that they can be found installed in offices, colleges, […]

Cross-Site Scripting (XSS)

,

Web applications today suffer from a variety of vulnerabilities. Cross Site Scripting (XSS) is one of the most prevalent web application security flaws, yet possibly the most overlooked. It […]