To do and NOT to do under DDoS

DDoS (Distributed Denial of Service) is a type of attacks to interrupt the continuous healthy response of a server, it's considered one of the hardest attacks to mitigate and has harvested so many sites. To understand how deep, bad and well hidden this type of attacks...

You got “email hacked” message? Here is what you need to do

Almost Daily, we get mails from our readers reporting that their mails got hacked. After getting a copy of these mails, we found out that all mails contain the same message but in different wording and in different language. In English, Korean or Japanese. I am sure...

Important commands to rescue hacked servers.

This post will you a boost in tracing the trails of your server intruder. You can use this post as a reference for your periodic server health checks as well. This is a very important article for server security specialists, white hats and developer in general....

Security Articles

To do and NOT to do under DDoS

To do and NOT to do under DDoS

DDoS (Distributed Denial of Service) is a type of attacks to interrupt the continuous healthy response of a server, it's considered one of the hardest attacks to mitigate and has harvested so many sites. To understand how deep, bad and well hidden this type of attacks...

You got “email hacked” message? Here is what you need to do

You got “email hacked” message? Here is what you need to do

Almost Daily, we get mails from our readers reporting that their mails got hacked. After getting a copy of these mails, we found out that all mails contain the same message but in different wording and in different language. In English, Korean or Japanese. I am sure...

Important commands to rescue hacked servers.

Important commands to rescue hacked servers.

This post will you a boost in tracing the trails of your server intruder. You can use this post as a reference for your periodic server health checks as well. This is a very important article for server security specialists, white hats and developer in general....

White Hat Hacking : Apple open redirect vulnerability

White Hat Hacking : Apple open redirect vulnerability

What is Open Redirect vulnerability? Open redirect vulnerabilities allow the attacker to use a well known website name to redirect the visitor to another website. As mentioned in Everything is vulnerable ( Q4 in internet wars ). You should pay attention to URLs you...

White Hat Hacking – RedHat Cross Site Scripting ( XSS )

White Hat Hacking – RedHat Cross Site Scripting ( XSS )

White Hat Hacking - Redhat cross site scripting ( XSS ) Using an ordinary Cross site scripting payload, The vulnerability could NOT be exploited. However, I tried to put the payload inside a JavaScript file with JPG extension and the trick worked ! Payload :...

Everything is vulnerable II : Internet wars

Everything is vulnerable II : Internet wars

Q1. Why was this post written ? This post is highly recommended for all web surfers regardless of their interests; from online shoppers to social networks users. Millions of defrauding are attempted every day and actually many succeed! As a matter of fact, if you have...

Everything is vulnerable : Introduction

Everything is vulnerable : Introduction

“Everything is vulnerable” is a series of posts about computer vulnerabilities, malwares, hacking and security. There is one fact to Illustrate and one goal to reach. The fact : Everything is vulnerable. The goal : Everything can be secured ! This series contains a...

White Hat Hacking : Microsoft XSS & malicious payloads

White Hat Hacking : Microsoft XSS & malicious payloads

This vulnerability allows sending malicious files to a 3rd party using Microsoft AFKAR ( Arabic word for ideas ) service.. Proof of concept 1- Use a binary code or interpretted code for 'callback' parameter value ( Like the python code used in the example ). Or HTML...

Are you under attack? We can help