HackDig : Dig high-quality web security articles for hackers

19 Extensions to Turn Google Chrome into Penetration Testing tool

Google Chrome is the most popular web browser of the world. It’s light weight and comes with a clean interface. This is the main reason of its popularity. It also has various other features that make website browsing easy and faster. Like Firefox, Chrome also supports add-ons but called extensions for Chrome. Extensions help us in improving the f
Publish At:2017-07-11 15:30 | Read:4667 | Comments:0 | Tags:Penetration Testing feature forensics

18 Extensions For Turning Firefox Into a Penetration Testing Tool

Firefox is a popular web browser from Mozilla. Popularity of Firefox is not only because it’s a good web browser, it also supports add-ons to enhance the functionality. Mozilla has a website add-on section that has thousands of useful add-ons in different categories. Some of these add-ons are useful for penetration testers and security analysts.
Publish At:2017-07-11 15:30 | Read:3453 | Comments:0 | Tags:Penetration Testing feature reverse engineering

Security Awareness – Judge the Impact to Justify the Effort

Download the BEST PRACTICES FOR DEVELOPING AN ENGAGING SECURITY AWARENESS PROGRAM whitepaperLearn the best practices for developing a security awareness training program that is engaging. Engaging awareness programs have been shown to change more users’ behavior and are seen as an asset for your organization instead of annoyance. ——
Publish At:2015-11-10 15:00 | Read:3830 | Comments:0 | Tags:Security Awareness feature general security

Certification Tracker – CISSP

Today we have launched an app that will help track resources and information related to various industry certifications. The Certification Tracker supports the following features:Meta information about the certAverage salary (data from indeed) in the US over last 12 months for jobs containing this certificationMonthly number of jobs available that list
Publish At:2015-07-15 06:10 | Read:2914 | Comments:0 | Tags:CISSP General Security IT Certifications cert tracker certif

Windows Exploit Mitigation Technology – Part 1

The spree of exploits on Windows has led to the creation of a certain type of exploit protection mechanism on Windows. Protection from things like buffer overflow, heap overwrite and return originated exploits have been deployed on Windows compilers and OS.They can be either OS specific or compiler based protections. EMET can be used to apply some of these p
Publish At:2015-02-13 14:35 | Read:4568 | Comments:0 | Tags:Exploit Development exploit development feature exploit

Ramp with 5 Levels: CISSP 2015 Update: Asset Security

The CISSP 2015 Update brings new viewpoints on the key domains covered in this certification. The CISSP is already one of the broadest of all certs in that the amount of information it covers in different fields is staggering. However, breaking this down into its component domains or fields can help to chop at it bit by bit. With the new updates, each dom
Publish At:2015-02-13 14:35 | Read:3970 | Comments:0 | Tags:CISSP feature

Security Policy Template For Hotel Networks

When booking a hotel room, you assume that it is the responsibility of the hotel to keep you and your belongings safe by not sharing your room keys or other details. But a greater threat could be lurking in your room – the WiFi connection.While high-speed wireless Internet is always a welcome amenity for hotel guests who are looking to communicate and conduc
Publish At:2015-02-12 22:50 | Read:2688 | Comments:0 | Tags:Wireless Security feature wireless security

Introduction to Smartcard Security

IntroductionIn 1968 and 1969, the smartcard was patented in German by Helmut Gröttrup and Jürgen Dethloff. The smartcard is simply a card with an Integrated Circuit that could be programmed. This technology has been used widely in our daily lives and will become one of the important keys in Internet of Things (IoT) and Machine to Machine (M2M) technology. Sm
Publish At:2015-02-12 22:50 | Read:6173 | Comments:0 | Tags:General Security feature general security

Gh0st RAT: Complete Malware Analysis – Part 1

In this article series, we will learn about one of the most predominant malware, named Gh0st RAT, whose source code is dated back to 2001 but it is still relevant today. In this article series, we will learn what exactly is Gh0st RAT, all its variants, how it works, its characteristics, etc.What is Gh0st RAT?Gh0st RAT (Remote Access Terminal) is a trojan 
Publish At:2015-02-11 15:30 | Read:3751 | Comments:0 | Tags:Malware Analysis Meta feature malware analysis

Flash Fades, Adobe Crumbles

Oh, Adobe Flash. I knew you well, starting from when you were known as Macromedia Flash in the late 1990s. The dynamic web content you provided me was amazing. Streaming video over 56k would’ve been a major test of my patience, hence YouTube didn’t launch until 2005. But the games… Oh, the games! They were fun. Wait fifteen minutes to downl
Publish At:2015-02-11 15:30 | Read:3936 | Comments:0 | Tags:General Security feature general security

Social Media Hacking: Mitigation Strategies

Social media platforms provide fertile ground for communication without borders, so there is actually no limitation as to the potential benefits that these platforms can offer to you. This is why so many Internet users have been registering for new accounts on Facebook, Twitter, Pinterest and Google+ on a daily basis, opening just another window of communica
Publish At:2015-02-10 23:50 | Read:3729 | Comments:0 | Tags:Hacking feature hacking

Hunting Malware in the Deep Web

IntroductionBotnets are still considered one of the most dangerous cyber threats. These malicious networks of compromised machines are used by cyber criminals and state-sponsored hackers for numerous activities, including DDoS attacks, spam campaigns, and financial scams.The principal problem for a botmaster is to make a botnet resilient against operations r
Publish At:2015-02-10 23:50 | Read:8051 | Comments:1 | Tags:General Security feature general security

7 Reasons to Embrace Source Code Analysis

With the exponential rise in cybercrime in recent years, application security is starting to take center stage. Conventional methods such as antivirus solutions and firewall tools have become less effective in fighting the ever-evolving malware and hackers. The growing consensus is that security starts from the foundation – the application code. Choosing the
Publish At:2015-02-09 16:30 | Read:3234 | Comments:0 | Tags:General Security feature general security

Website Hacking, Part VII: Common Web Vulnerabilities and Brief Solutions

IntroductionIn this last part of the Website Hacking series, we are going to list 18 common web vulnerabilities and flaws and we are going to briefly provide solutions to them. Some of them are described for the first time in the Website Hacking series and some we have discussed before but in greater depth.1. Saving all user inputIf you are using a framework
Publish At:2015-02-09 16:30 | Read:4078 | Comments:0 | Tags:Hacking feature hacking

Ramp with 5 Levels: CISSP Update – Security and Risk Management

The CISSP 2015 Update brings new viewpoints on the key domains covered in this certification. The CISSP is already one of the broadest of all certs in that the amount of information it covers in different fields is staggering. However, breaking this down into its component domains or fields can help to chop at it bit by bit. With the new updates, each domain
Publish At:2015-02-06 11:00 | Read:3854 | Comments:0 | Tags:General Security feature general security


Share high-quality web security related articles with you:)