Category: GBHackers On Security

Most Important Web Server Penetration Testing Checklist

Read the original article: Most Important Web Server Penetration Testing Checklist Web server pentesting performing under 3 major category which is identity, Analyse, Report Vulnerabilities such as authentication weakness, configuration errors, protocol Relation vulnerabilities.  1.  “Conduct a serial of methodical…

Operating Systems Can be Detected Using Ping Command

Read the original article: Operating Systems Can be Detected Using Ping Command Operating Systems can be detected using Ping Command, Ping is a computer network administration software utility, which used to find the Availability of a host on an Internet…

What is DNS Attack and How Does it Works?

Read the original article: What is DNS Attack and How Does it Works? DNS Attack is a type of cyber attack that exploits the weakness or vulnerability in Domain name system. Today, the internet has turned into an integral part…

Hackers Massively Scanning for SAP Recon Vulnerability

Read the original article: Hackers Massively Scanning for SAP Recon Vulnerability Last Week SAP releases updates to fix critical security vulnerability found in the SAP NetWeaver AS JAVA (LM Configuration Wizard) versions 7.30 to 7.50. The vulnerability can be tracked…

Top 10 Best Linux Distributions In 2020

Read the original article: Top 10 Best Linux Distributions In 2020 The Linux Distros is generally acknowledged as the third of the holy triplet of PC programs, simultaneously with Windows and macOS. Here we have provided you a top 10…

100,000 WordPress Sites Impacted with Cross-Site Scripting(XSS) Flaw

Read the original article: 100,000 WordPress Sites Impacted with Cross-Site Scripting(XSS) Flaw KingComposer, a WordPress plugin found installed with over 100,000 WordPress sites found vulnerable to Reflected Cross-Site Scripting. The vulnerability was found by the Wordfence security team with KingComposer…

How to Protect Your Smart Home from IoT Threats?

Read the original article: How to Protect Your Smart Home from IoT Threats? Our world is increasingly becoming digital as we are moving towards a society that is interconnected through a web of internet-enabled devices. We call this network or…

Most Important Network Penetration Testing Checklist

Read the original article: Most Important Network Penetration Testing Checklist Network Penetration Testing determines vulnerabilities in the network posture by discovering Open ports, Troubleshooting live systems, services and grabbing system banners. The pen-testing helps administrator to close unused ports, additional services,…