ETHICAL HACKING

Bug Bounty Programs in 2018 – Top 15

A bug bounty program, also called a vulnerability rewards program (VRP), is a crowdsourcing initiative that rewards individuals for discovering and reporting software bugs. Bug bounty programs are often initiated to supplement internal code audits and penetration tests as […]

HACKING

Top 10 Penetration Testing Tools

Penetration Testing tools help in identifying security weaknesses in a network, server or web application. These tools are very useful since they allow you to identify the “unknown vulnerabilities” in the software and networking applications that can […]

ETHICAL HACKING

Most Common Web Security Vulnerabilities

OWASP or Open Web Security Project is a non-profit charitable organization focused on improving the security of software and web applications. The organization publishes a list of top web security vulnerabilities based on the data […]

BLACKHAT

How to Hack WiFi (Wireless) Network

Wireless networks are accessible to anyone within the transmission radius.  This makes them vulnerable to attacks. Hotspots are available in public places such as airports, restaurants, parks, etc. Here, we will introduce you to common […]