Quantcast
Channel: Hackers Online Club (HOC)
Browsing all 855 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

How To Bypass .htaccess Controls in Oracle Reports For CVE-2012-3152 And...

How To Bypass .htaccess Controls in Oracle Reports For CVE-2012-3152 and CVE-2012-3153Security researcher Dana Taylor discovered CVE-2012-3152/3153 back in 2011/2012. Some system administrators created...

View Article


Image may be NSFW.
Clik here to view.

The Truth About Cloud Security in the Healthcare Industry

The Truth About Cloud Security in the Healthcare IndustryIt's More Secure Than You ThinkYou don't have to sacrifice security when you use the cloud.Cloud security problems - hyperbole or reality? There...

View Article


Image may be NSFW.
Clik here to view.

Yahoo Discloses Another Hack Over 1 Billion User Accounts Breached

Yahoo Discloses Another Hack Over 1 Billion User Accounts BreachedToday's company disclosed that its users got Hacked and Breached more than one Billion user accounts.Bob Lord, Yahoo's chief...

View Article

Image may be NSFW.
Clik here to view.

Wifi-Dumper: An Open Source Tool To Dump Wi-Fi Profiles And Clear Text Passwords

This is an open source tool to dump the wifi profiles and cleartext passwords of the connected access points on the Windows machine. This tool will help you in a Wifi penetration testing. Furthermore,...

View Article

Image may be NSFW.
Clik here to view.

BARF: Binary Analysis And Reverse Engineering Framework

A Multi-platform open source Binary Analysis and Reverse engineering Framework.The analysis of binary code is a crucial activity in many areas of the computer sciences and software engineering...

View Article


Image may be NSFW.
Clik here to view.

Crash Any iPhone To Send A Contact File Message

How To Crash Any iPhone Messages App Security researcher Vicedes3 explains that how can we crash any iPhone Messages App. In the Video he describes that bug affects any Apple device running on iOS  9...

View Article

Image may be NSFW.
Clik here to view.

Hakku A Framework For Penetrating Testing And Developed On Arch Linux

Hakku A Framework For Penetrating Testing And Developed on Arch LinuxWhat is Hakku Framework?Hakku is simple framework that has been made for penetration testing tools. Hakku framework offers simple...

View Article

Image may be NSFW.
Clik here to view.

Cyber Criminals Attacking On Web Databases And Asking To Pay For Ransom

Stop To Pay Ransomware Said Security Researcher. Hackers were wiping the databases of unprotected MongoDB installs and encrypt with ransom.Recently some Cyber Attackers are hijacking databases of...

View Article


Image may be NSFW.
Clik here to view.

Windows Malware Analysis Essentials ($30 Value) FREE For a Limited Time

Windows Malware Analysis Essentials ($30 Value) FREE For a Limited TimeMaster the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set.This book will guide...

View Article


Image may be NSFW.
Clik here to view.

How To Exploit A Common Cryptographic Flaw

Want to know how to exploit a common cryptographic flaw or forge administrator cookies, recover passwords?This is an introductory course on cryptography, freely available for programmers of all ages...

View Article

Image may be NSFW.
Clik here to view.

Damn Vulnerable Web Sockets (DVWS): Vulnerable Web Application Which Works On...

Damn Vulnerable Web Sockets (DVWS) is a vulnerable web application which works on web sockets for client-server communication. The flow of the application is similar to DVWA. You will find more...

View Article

Image may be NSFW.
Clik here to view.

New Ransomware SPORA Encrypts Your Data Offline

New Ransomware SPORA Encrypts Your Data OfflineSecurity researchers found new Ransom family SPORA that can designed to encrypt your data offline. Spora does not renamed the encrypted files. Currently...

View Article

Image may be NSFW.
Clik here to view.

What is Cross Site Request Forgery (CSRF) Vulnerability Attack?

Cross site request forgery (CSRF) Attack One of the Web Trending Vulnerability.Hi guys!! Today we will talk about one of the trending vulnerability cross site request forgery attack.Below I have...

View Article


Image may be NSFW.
Clik here to view.

How To Secure Your Wi-Fi Network

How to Secure Your Wi-Fi Network?Wireless local area networks (WLANs) have become quite popular in recent years, in both home and business networks. A wireless network is easy to set up and can quickly...

View Article

Image may be NSFW.
Clik here to view.

MongoDB-HoneyProxy: A Honeypot Proxy For MongoDB Server

MongoDB-HoneyProxy: A Honeypot Proxy For MongoDB ServerWhen run, this will proxy and log all traffic to a dummy mongodb server. MongoDB-HoneyProxy was created in response to the 'MongoDB...

View Article


Image may be NSFW.
Clik here to view.

Facebook Awarded $40000 Bug Bounty For Remote Code Execution Vulnerability

Facebook Awarded $40,000 Bug Bounty to Security Researcher For Remote Code Execution Vulnerability.Yes, you heard right its $40,000 and its higher bug bounty ever from Facebook. Andrey Leonov, a...

View Article

Image may be NSFW.
Clik here to view.

The Essentials of Information Security Kit: 2nd Edition

The Essentials of Information Security Kit: Includes a Free PC Security Handbook - 2nd Edition eBookDownload this kit to learn everything you need to know about Information Security.The Essentials of...

View Article


Image may be NSFW.
Clik here to view.

This Chinese Selfie App Is Spying On Your Smartphone

This Chinese Selfie App Is Spying On Your SmartphoneAccording to report, a selfie app Meitu collects your smartphone data and send it to Chinese Server.Meitu is available for both Android and iPhone...

View Article

Image may be NSFW.
Clik here to view.

NewYork Times And BBC Twitter Account Gets Hacked

New York Times And BBC Twitter Account Gets Hacked And Posted Fake News About US President Donald Trump and Russian President Putin.Fake tweets posted from @NYTvideo and @BBC Northampton which is...

View Article

Image may be NSFW.
Clik here to view.

ReverseMap - To Analyse SQL Injection Attempts in Web Server Logs

ReverseMap - To Analyse SQL Injection Attempts in Web Server LogsThe program can either be run in batch mode or interactive mode. In batch mode the program will accept Apache web server logs and will...

View Article
Browsing all 855 articles
Browse latest View live