Get Even More Visitors To Your Blog, Upgrade To A Business Listing >>

Blog Directory  >  Internet Blogs  >  Learn How To Hack - Ethical Hacking and security internet Blog  > 

Is OneCoin A Scam? - Technical Analysis
2017-05-02 08:34
TL;dr: People should refrain from any type of Pyramid Scheme especially when it comes to Cryptocurrency:Onecoin is a Cryptocurrency that has been dubbed as Ponzi Scam and the evidence surrou… Read More
Whatsapp 4G VIP SCAM  - Technical Analysis
2016-09-06 18:12
This is a short blog post describing about a recent hoax pertaining the WhatsApp 4.0 version. I would like to clearly highlight that there is no such application as 'Whatsapp 4G'. The v… Read More
2016-07-12 20:03
When asked to write on this topic, I admit that it made me fringe just a bit. Because I don't consider myself to be a highly effective hacker. I find myself as a noob everywhere that I'm try… Read More
Acunetix Website Hack And Lessons Learnt
2016-06-05 08:57
Last night, Website of Acunetix(A Wellknown Automated Web Application Scanner) was hacked by Croatian hackers. From that point of this onward the website has been taken offline and acunetix… Read More
How Much Do Hackers Know About You?
2016-04-13 14:07
The threat of black hat hackers has never been greater than now, considering the increasing organization of their efforts to make a dollar off of your digital assets and information. The com… Read More
2016-01-17 16:51
Every single day i get emails in my inbox and on my facebook page from users querying about how to recover hacked facebook account and a common problem i see in all of them is that they… Read More
2015-07-21 22:24
It seems that in recent years most of society, especially the younger generations, have turned to texting as their preferred mode of conversation. The infinite ability to communicate with ot… Read More
2015-04-25 14:10
IntroductionSucuri Cloud Proxy is a very well known WAF capable of preventing DOS, SQL Injection, XSS and malware detection and prevention. It acts as a reverse proxy which means that all th… Read More
2015-04-18 07:31
On 11th April Giuseppe Trotta and myself organized a CTF (Capture The Flag) competition for Cyber Secure Pakistan (A conference that combines all the stakeholders). The challenge was hosted… Read More
2014-12-14 19:40
0x01: Introduction to ModemsThe term DSL modem is technically used to describe "a modem which connects to a single computer, through a USB port or is installed in a computer PCI slot". The m… Read More
2014-09-20 18:39
This is a continued post from Code Execution in PHP; you can read the first post here, so if you haven't read that before please go ahead and read it first or else you would have problem und… Read More
2014-08-03 06:12
While being impressed by Collin Mulliner's research on smart phones, I found myself very curious trying to find vulnerabilities inside it and i found several ones out. In this shor… Read More
2014-07-12 18:58
There have been a lot of lock screen bypasses lately in almost every mobile deice such as iPhone, Samsung galaxy, HTC etc and if you observe carefully most of them rely upon abusing the "Eme… Read More
2014-06-28 18:50
Lately, A lot of people have been asking me the reason of my absence and not being active on RHA. The answer is that there are countless factors to which I have lost count myself. Had it bee… Read More
2014-06-16 16:26
Last week, we announced our second XSS challenge after the tremendous success of our first XSS challenge. The challenge was based upon a blacklist based protection and the goal was to execut… Read More
2014-06-09 04:55
Update: The results are announced here.Welcome readers,After a tremendous response with our first XSS challenge, we decided to make your lives a bit harder this summer by launching another X… Read More
2006-06-07 11:16
Introduction We have already disclosed lots of findings related to DOM Based XSS and this article talks about a pretty interesting DOM Based XSS vulnerability i found long time back ins… Read More
2006-06-07 11:16
ABSTRACTReaders, there are numerous reasons ... It is well known that the Internet is an unmanaged an decentralized network, running under a set of protocols, which are not designed to ensur… Read More
2006-06-07 11:16
Every single day i get emails in my inbox and on my facebook page from users querying about how to recover hacked facebook account and a common problem i see in all of them is that they… Read More

Share the post

Learn How To Hack - Ethical Hacking and security


Subscribe to Learn How To Hack - Ethical Hacking And Security

Get updates delivered right to your inbox!

Thank you for your subscription