World’s first Power outage using Malware

Die Hard 4.0 seems real enough now as we have the world’s first power outage accomplished by a malware. The culprits are…..you guessed it, the blackhats. Now hackers have used a highly elegant and destructive malware to successfully infect at least three regional Ukrainian power authorities. So, their pre-Christmas 23rd December was pretty much a …lights out. The […]

Continue Reading

Search engine for hackers, and it lists every device on the net

Meet Censys, a Shodan like search engine for hackers. Last month the security consultants at the SEC realized that the work-shy manufacturers of IoT(Internet Of Things) using the same old set of hardcoded cryptographic keys leaving over 3 million of IoT devices vulnerable to mass hijacking. But how did they found out the exact number?? Easy! Censys told […]

Continue Reading

Top 10 insecure programming languages

New research shows that scripting languages cause web vulnerabilities To this news, I was like.WHHHHHHHAAAAAAAAAAttt?? But it is true. A new research showed that scripting languages, in general, spawn security vulnerabilities regarding web applications. Now this got many on the web their panties got all twisted. As millions are websites are now under potential security […]

Continue Reading
Upload c99 php webshell

10 benefits to Upload c99 php webshell | SQL injection Test

What after Upload c99 php webshell Hey, Here is very important thing that what will you do after upload c99 PHP webshell. Ok first I am going to what is c99 php and what the use of this. So let me introduce first “c99.php is a webshell written in php languge used for” : Travel across directories […]

Continue Reading
Run Netcat commands through webshell

Run Netcat commands through webshell | SQLi Test 6

Run Netcat commands through webshell As we have discussed about web shell in previous tutorial. “Netcat is a computer networking service for reading from and writing to network connections using TCP or UDP. Netcat is designed to be a dependable back-end that can be used directly or easily driven by other programs and scripts”. Video:

Continue Reading

SQL Injection Attack Creating and Uploading Web shell | SQL injection test 5

SQL Injection Attack Creating and Uploading Web shell Web shell is a type of shell it can be used to run commands on the victim server through web site. it directly interact with the command line of server. Creating a webshell backdoor in php language then upload on the server by sql injection attack. Video:

Continue Reading