Everything is vulnerable I : What are Malwares, viruses, exploits, trojans, hacks and cracks ?

Q1. Why was this post written? To define Malwares and demonstrate the differences between Viruses, Trojans and Spams. Also, We will talk a bit about hacks and cracks. Q2. What are Malwares? Malware is a malicious, invisible and harmful piece of software like viruses,...

White Hat Hacking : Microsoft XSS & malicious payloads

This vulnerability allows sending malicious files to a 3rd party using Microsoft AFKAR ( Arabic word for ideas ) service.. Proof of concept 1- Use a binary code or interpretted code for 'callback' parameter value ( Like the python code used in the example ). Or HTML...

White Hat Hacking : AT&T solr admin panel bypassing.

I can't upload this vulnerability video as It contains sensitive data about AT&T server. ( Local paths,  Linux usernames, etc ) Vulnerability details. Vulnerability detection. AT&T are using Apache Solr for ajax searching in help files querying. Apache solr is...

Hacking Articles

No Results Found

The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.