You can register an iTabCode account to be able to view iTabCode without ads. ( Registration is Free ) Register Now

security

  1. x32x01

    SSLscan - Find SSL Vulnerability

    Usually most of web applications use SSL to communicate with the server. In that case their should be some flaws or misconfiguration to scan them we use the most popular tool sslscan. sslscan is comes pre-installed in Kali Linux. Use of sslscan is very easy open your terminal and type following...
  2. x32x01

    Configuring The ProxyChains

    Sometimes we need to remain untraceable while performing a penetration testing activity. Proxychains helps us by allowing us to use an intermediary system whose IP can be left in the logs of the system without worry of it tracing back to us. Proxychains is a tool that allows any application to...
  3. x32x01

    WPScan - Find Vulnerabilities in WordPress Websites on Kali Linux

    WordPress is the leading CMS (Content Management System) in today's world. Tons of people making their website using WordPress, for an idea WordPress powers over 75 million sites on the web. This is huge. Almost 37.8% of the internet captured by WordPress. But in news we can see that many...
  4. x32x01

    Install and Use Vega on Kali Linux 2020 - Web Penetration Testing

    Vega is an open source and cross platform web application penetration testing tool built in Java. Vega has a JavaScript based API which makes it even more powerful and flexible. In our today's article we are going to install and use Vega on our Kali Linux 2020.4 system without getting any error...
  5. x32x01

    The Cybersecurity Behind Live Casinos

    Cybersecurity plays an essential role in every sector of any financial institution. But here we are specially talking about live casinos. The live casinos are 100% legal and safe as their cybersecurity is highly protective. Due to their day to day huge transactions, they spent a large amount...
  6. x32x01

    NIPE - Fully Anonymize Total Kali Linux System

    Becoming anonymous is a very good way to hide ourself form all kind of surveillance. But we get only few option because VPN is really bad, specially those free one. Free VPN's keeps logs and we can be traced. We can use TOR network, not the browser only. Tor can't be traced easily it is very...
  7. x32x01

    Andriller - Forensic Investigation of Android Phone on Kali Linux

    Android holds its position as the leading mobile phone operating system in worldwide. Having an Android phone is very common nowadays. Forensic testing of an Android phone is very crucial for every digital forensics experts. In today's digital forensics article we are going to learn about...
  8. x32x01

    Why is Data Security Significant? 6 Beneficial Ways to Boost Data Security Premises

    The internet has evolved topically and internally; therefore, it has expanded the usage of different network-enabled devices. Even, the IoT devices are making a craze in the industry. But, the fun fact is connecting everything in a single thread of communication, the internet. But, it has...
  9. x32x01

    MobSF - Mobile Security Framework on Kali Linux

    In today's detailed article we are going to install and use MobSF aka Mobile Security Framework on Kali Linux. After that we can run digital forensics test on any mobile application (Android, iPhone & Windows) and know much more about it. This will be very beneficial for digital forensics...
  10. x32x01

    How to Install Tor Browser on Ubuntu 20.04

    Tor Browser is a customized version of Firefox that routes the web traffic through the Tor network, making it private and anonymous. When you browse the Internet with the Tor Browser, the connection to the website you are viewing is encrypted and protected from network surveillance and traffic...
  11. x32x01

    Netcat - Total Guide Beginner to Advance

    We usually use Netcat to get reverse shell, but from port scanning, file transfer to banner grabbing and exploit, everything is possible with netcat. In our this detailed guide we will learn why Netcat is called "Hacker's Swiss Army Knife". In our this detailed guide we will learn the uses of...
  12. x32x01

    Wapiti - Automated Vulnerability Scanner

    Wapiti is an advanced automated command line vulnerability scanner. It helps penetration testers and bug bounty hunters to scan web based application to make it secure or search for loopholes. It is free and open source and has had some recent edits and updates. It comes with Kali Linux...
  13. x32x01

    ZAP - Most Used Web Vulnerability Scanner

    OWASP ZAP is a multipurpose scanning tool that helps a lot penetration testers and bug bounty hunters for finding vulnerabilities on web app. ZAP stands for Zed Attack Proxy. It is loaded with proxy, active and passive vulnerability scanners, fuzzer, spider, HTTP request sender & many more...
  14. x32x01

    SkipFish - Web Application Scanner

    SkipFish is an active web application security scanner developed by Google's information security engineering team, Michal Zalewski, Niels Heinen and Sebastian Roschke. SkipFish comes preinstalled with Kali Linux and it can identify various vulnerabilities inside a web application. SkipFish...
  15. x32x01

    Ncrack - Crack Network Credentials in Minutes

    Ncrack is a high-speed network authentication cracking tool. It was built to help companies secure their networks by proactively testing all their hosts and networking devices for poor passwords. Security professionals also rely on Ncrack when auditing their clients. Ncrack comes pre-installed...
  16. x32x01

    Scan Web Applications Using Metasploit

    In penetration testing and bug bounty fields, scanning a website for vulnerabilities is the most crucial part. In our previous articles we had talk about some website or web application scanner like SkipFish and Wapiti, but in our this article we are going to talk about scan website using...
  17. x32x01

    Pixie Dust Attack - Crack Wireless Routers [Easy Guide]

    Wi-Fi Protected Setup (WPS) was introduced in 2006 by Cisco for home users who wanted to connect their home network without the trouble of remembering hard passwords for the WiFi. It used an eight digit PIN to authenticate a client to the network (by PIN/Push Button/USB/Near-field communication...
  18. x32x01

    Airgeddon - Easy Wireless Network Security Auditor

    Airgeddon is a multi-featured tool for penetration testing on WiFi system or wireless networks. This all-in-one WiFi auditing tool is written in bash by v1s1t0r1sh3r3. Key-Features of Airgeddon Airgeddon has so much features for WiFi hacking. They are following: Interface mode switcher...
  19. x32x01

    Volatolity - Digial Forensic Testing of RAM on Kali Linux

    In our some previous articles (Scalpel, Foremost etc) we have discussed how to can run digital forensics on hard disk drives. But data is not only stores there this included RAM and the swap partition, or paging, file, which is an area of the hard disk drive. Now the issue is RAM's data is very...
  20. x32x01

    Easysploit - Easy & Automatic Metasploit

    EasySploit is a lazy script for metasploit. It is a automatic scripts to make metasploit payload and start listeners. Easysploit is very easy to use for even beginners. In today's article we learn how we can install Easysploit on our Kali Linux system and use it. Before installing and using...
Top