CALL US

+91 9116117170

Blog

HTTP Methods: GET vs. POST

By Shaurya Sharma 0 Comment February 14, 2017

What is HTTP HTTP stands for Hypertext Transfer Protocol and HTTP is used to communications and request-response protocol between clients and servers. A web browser may be the client or may be the server. Example: A client (browser) submits an HTTP request to the server; then the server returns a response to the client. The […]

What is Tab Napping and How to Protect from it?

By Shaurya Sharma 0 Comment October 12, 2016

Tab napping is a new technique to get username and password, such as phishing technique. If we talking about normal web browsing or surfing then we are open multiple tabs, and sometimes it is more then 8 to 10. There are many ways to make you fool. For example you are already logged in, in […]

How to trace & get the IP Address of the target person

By Shaurya Sharma 0 Comment September 3, 2016

IP (Internet Protocol) Address is one of the most important components or part of the internet, as well as cyber forensics. With the help of IP address all digital devices, computers communicate with each other, and this is allotted to that device, such as static or dynamic. That all the reasons law enforcement agencies are […]

How to install and Use Nikto in Linux

By Shaurya Sharma 0 Comment July 24, 2016

What is Nikto Nikto is web-server scanner which is open source which can be use to scan the server for malicious file and programs. Using NIKTO we can scan HTTP, HTTPS and HTTPD traffics too. NIKTO can be used to outdated version of program also, and at the end of scan it’s generate log file […]

How to Calculate Hash Value

By Shaurya Sharma 0 Comment July 22, 2016

Hash Value Calculation what is Hash? Hashing is a method for reducing large inputs to a compact fixed size output. When you are performing forensics, typically cryptography hashing algorithms like MD5 and SHA-1 are used. These functions have a few properties useful to forensics. There are lots of online services that allow you to enter […]