Sunday, February 23, 2025

Vulnerability Analysis

Oracle Patches 32 Critical Flaws in MySQL, WebLogic Server, & VirtualBox VM

Oracle has released a list of security patches for more than 130+ products. These products were used in several industries, including banking, communication, enterprise,...

What is Vulnerability Assessment In Cybersecurity? – A Comprehensive Guide

One of the best methods for finding potential security gaps in your company's cybersecurity design is a vulnerability assessment.You risk losing sensitive information...

Perform Vulnerability Scanning in Your Network using Maltego

Maltego is an intelligence-gathering tool, that is available for Windows, Mac, and Linux. We will be using Kali Linux where it's known by default....

How to Perform Manual SQL Injection With Double Quotes Error-Based String Method

If you are trying to hack the databases with methods like single quotes error-based Manual SQL Injection, Integer based injection but the databases are not...

Lynis – Open Source Security Auditing & Pentesting Tool – 2023

Lynis is an open-source security auditing tool. Its main goal is to audit and harden Unix and Linux-based systems. It scans the system by performing...

SQLMAP-Detecting and Exploiting SQL Injection- A Detailed Explanation

Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over database servers.It comes...

BrutePrint – Bruteforce Attack to Bypass User Authentication on Smartphones

A novel assault named 'BrutePrint' has been unveiled by the joint efforts of Tencent Labs and Zhejiang University researchers, enabling the forceful extraction of...

CISA Warns that Hackers Actively Exploiting Samsung Vulnerability

CISA has issued a recent warning regarding a security flaw that impacts Samsung devices, enabling attackers to circumvent Android's address space layout randomization (ASLR)...