Metasploit outside LAN
Downloading NGROK and setting up an account
Using it in msfvenom
Starting a listener
Setting up NGROK
Setting up ngrok is fairly simple.
Go to their...
Apple App Store: What’s next?
While the Google Play Store is no stranger to malware-infected apps, the App store seems to be experiencing its first slice of it. Recently,...
Millions of dollars stolen in scam by taxi drivers in Toronto, Police arrests six
Since 2018, the Greater Toronto Area is facing a major taxi fare scam that involves drivers defrauding customers.
The criminal drivers rely on...
Google Play Store: A hub for spreading malware?
A report by Russian security firm Doctor Web has suggested that several of the Google Play Store's apps were spread malware known as "The...
Emotet Banking Trojan is back again
Emotet, the infamous banking trojan has emerged again in the radar after a dip in its activity.
The latest version of Emotet can...
Deep Web : How To Access it ?
Introduction:
There are many types of web ! but some of the main on which i will focus on my blog are:
1. Surface Web
2. Dark...
This Skype vulnerability allows you to bypass Android’s phone lock
A security researcher found a vulnerability in Skype’s Android app which allows users to access several app functions without entering the passcode...
Pentagon Impedes 36 Million Malicious Emails Each Day
The Defense Information Systems Agency conducts an assessment of DoD web browsing practices to determine the utility of bandwidths.
The US navy spends around $160...
Database Hacking : Sql Injection
SQL injection is a very common technique for hacking web applications, SQL injection can easily destroy the database of the website.
SQL injection is the...
Shellphish : A Phishing Tool
Shellphish is a tool used for phishing attacks, this tool offers phishing templates of more than 18 famous websites.
NOTICE: This article is for educational...