CALL US

+91 9116117170

Tag: hacking

Exploiting CMS Web Applications

By Palash Verma 0 Comment October 16, 2018

There are frequent cases of hacking websites on all servers, preferably CMS Joomla and WordPress, in this article we want to tell how and why this is done, and what measures can be taken to protect. If the site has been hacked, it is not enough just to delete the downloaded PHP Shell script, or […]

How to Exploit a Network Service through Buffer Overflow

By Shaurya Sharma 0 Comment October 6, 2018

We had a great time exploiting the vulnerabilities of the buffer overflow of Protostar virtual machine, but now it’s time to move on and search for more complex tasks. We had a great time exploiting the vulnerabilities of the Protostar virtual machine , but now it’s time to move on and search for more complex tasks. And such […]

How to Hack the Website | Types of Hacking and Protection from them

By Shaurya Sharma 0 Comment September 11, 2018

How to hack the site. Types of hacking and protection from them. Want to learn how to hack the website? Or vice versa, find out how you can protect yourself from hacking? Every day, there is a hacking of sites that are deleted or scammers require a ransom. As they say, the last one laughs […]

Dark Web: Everything You Need to Know about the Invisible Web

By Shaurya Sharma 0 Comment April 4, 2018

Dark Web: Everything You Need to Know about the Invisible web Dark Web – this term refers to a set of websites that are visible in public while having a hidden IP address of the server on which they are located. These sites can be visited by all web users, but it is very difficult […]

What is Email Harvesting and Safety Tips

By Shaurya Sharma 0 Comment December 7, 2016

Email harvesting is the process of obtaining a huge quantity of email addresses through various methods. The goal of harvesting email details is for use in bulk emailing or for spamming. The most common method of email collection is by using specialized harvesting software known as harvesting bots, or farmers. Spammers harvests email addresses through […]

error: Content is protected by Cyberops !!