CALL US

+91 9116117170

Blog

How to install and Use Nikto in Linux

By Shaurya Sharma 0 Comment July 24, 2016

What is Nikto Nikto is web-server scanner which is open source which can be use to scan the server for malicious file and programs. Using NIKTO we can scan HTTP, HTTPS and HTTPD traffics too. NIKTO can be used to outdated version of program also, and at the end of scan it’s generate log file […]

How to Calculate Hash Value

By Shaurya Sharma 0 Comment July 22, 2016

Hash Value Calculation what is Hash? Hashing is a method for reducing large inputs to a compact fixed size output. When you are performing forensics, typically cryptography hashing algorithms like MD5 and SHA-1 are used. These functions have a few properties useful to forensics. There are lots of online services that allow you to enter […]

How to hijack Telegram and Whatsapp with SS7 flaw

By Shaurya Sharma 0 Comment June 17, 2016

This individual world’s most popular get across platform messaging App is observed to be ultimate crack or hack into by many because it has recently enabled 256-bit encryption. For ordinary spirits this encryption would take days and months to decode a sentence or a complete message. Chant with another secure messages service called Telegram. Although […]