Home Ethical Hacking

Ethical Hacking

The term “white hat” in Internet slang refers to an ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies that ensures the security of an organization’s information systems.

The History of Encryption

Encrypting communications is a very old idea. People have found the need to send private communications for most of the history of civilization. The need for privacy...

What is Information Security?

Information security sometimes shortened to Infosec. It is not all about securing information from unauthorized access.Basically,Information Security is...

TechHacker Pre-Hacking Giveaway Winners

Congratulations to all the winners. I really appreciate your participation. Keep going and all the best for your future in ethical hacking! Arindam...

Buffer Overflow Attacks

Another way of attacking a system is called a buffer overflow (or buffer overrun) attack. Some experts would argue that the buffer overflow occurs as often as...

Ethical Hacking – Terminologies

Following is a list of important terms used in the field of hacking. Adware − Adware is software designed to force pre-chosen ads to display on your system. Attack...

Burp Suite 2.0 beta now available

Burp Suite 2.0 beta is now available to Professional users. This is a major upgrade, with a host of new features, including: A new crawler, able to automatically handle sessions,...
GitHub

All Core Features of GitHub is Now Free for Everyone

GitHub has been able to cram in a lot of features for free for everyone who was paid before. How did that happen? - Microsoft's acquisition.

Ethical Hacking – Famous Hackers

We will have a brief synopsis of some of the famous Hackers and how they became famous. Jonathan James Jonathan James was an American hacker, illfamous as the first juvenile sent...

Session Hijacking

Another form of attack is session hacking or hijacking. TCP session hijacking is a process where a hacker takes over a TCP session between two machines. Because...
owasp

OWASP Top 10 Web Application Vulnerability 2020

1. Injection Injection flaws occur when untrusted data sent to an interpreter through a form input or some other data submission to a web...
Hide picture