
Penetration testing
Which weapon should I choose for Web Penetration Testing? 3.0
Introduction So here we are on the third edition of "Which weapon should I choose for Web Penetration Testing?" For this edition, I am going to take a walk t

Application security
Which Weapon Should I Choose for Web Penetration Testing? 2.0
Introduction This is the second edition of "Which weapon should I choose for Web Penetration Testing?" I hope that you liked the first edition. The same r

Hacking
Cross-Site Scripting with ChEF – A Newbie Guide
Introduction In this article I am going to explain about how you can use Cross-Site Scripting (XSS) vulnerability and how to exploit it in order to cause ma

Digital forensics
Investigating the crime scene part 2: Recovering files with autopsy
For part one of this series, please click here. So, in the previous part we saw how we can set up the environment for finding clues and also how to set up A

Digital forensics
Investigating the Crime Scene, Part 1: A Brief Introduction to Computer Forensics and Autopsy
Recommended reading http://www.thestudymaterial.com/presentation-seminar/computer-presentation/239-computer-forensics-presentation.html?showall=1 First Re

Hacking
Bypassing SEH Protection: A Real-Life Example
Recommended Reading Before starting any kind of exploiting, if you are not familiar with buffer overflow, assembler, or how the operating system works, I str