Ethical Hacking

Sensitive Data Exposure

SENSITIVE DATA EXPOSURE

Greetings!!! Hello Fellow Researchers, hope you are doing well and taking care of your health in this pandemic situation, my name is Mosin Khan. In this write up I am about to tell you how I saw Sensitive information on a Reset password page. I don’t have permission to disclose target information so, let’s call it example.com. …

SENSITIVE DATA EXPOSURE Read More »

Introduction to Web application Security

Hello Everyone, Hope Everyone is Safe and Secure. Today we are discussing about Introduction to Web Application Security Web security is the critical aspect for web applications. Web security is the  real issue associated with the Internet. It is expressed as the principle framework for the worldwide data society. Web applications provide an attractive interface for a client through a …

Introduction to Web application Security Read More »

How Hackers Use Message Mirroring App to Show All SMS Texts and Bypass 2FA Security

It’s no secret that usernames and passwords alone do not provide secure access to online services. According to a recent study, more than 80% of all hacking-related breaches were corrupted and caused by weak credentials, with 3 billion username / password combinations stolen in 2016 alone. As you can see, the implementation of two-step verification …

How Hackers Use Message Mirroring App to Show All SMS Texts and Bypass 2FA Security Read More »

How not to be Victimized by Cryptojacking

What is Cryptojacking? Script Jacking is malicious crypto mining that occurs when cybercriminals install hacking software on both work and personal computers, laptops and mobile devices. The software uses your computer’s abilities and resources to mine crypto currencies and steal crypto wallets owned by unsuspecting victims. Code deployment is simple, runs in the background and …

How not to be Victimized by Cryptojacking Read More »