White Hat Hacking – RedHat Cross Site Scripting ( XSS )

White Hat Hacking - Redhat cross site scripting ( XSS ) Using an ordinary Cross site scripting payload, The vulnerability could NOT be exploited. However, I tried to put the payload inside a JavaScript file with JPG extension and the trick worked ! Payload :...

Everything is vulnerable II : Internet wars

Q1. Why was this post written ? This post is highly recommended for all web surfers regardless of their interests; from online shoppers to social networks users. Millions of defrauding are attempted every day and actually many succeed! As a matter of fact, if you have...

Everything is vulnerable I : What are Malwares, viruses, exploits, trojans, hacks and cracks ?

Q1. Why was this post written? To define Malwares and demonstrate the differences between Viruses, Trojans and Spams. Also, We will talk a bit about hacks and cracks. Q2. What are Malwares? Malware is a malicious, invisible and harmful piece of software like viruses,...

Ethical Hacking Articles