Profile

Cover photo
Rafay Baloch
Works at RHA
Attended Bahria Foundation School
Lives in -Pakistan
2,226 followers|26,311,878 views
AboutPostsPhotosYouTube+1's

Stream

Rafay Baloch

Shared publicly  - 
 
A good web vulnerability scanner should detect more than just vulnerabilities:
https://www.netsparker.com/blog/netsparker-knowledge-base-nodes/
Use the Netsparker knowledge base nodes to understand the target web application better and do a complete penetration test and identify all vulnerabilities.
1
Add a comment...

Rafay Baloch

Shared publicly  - 
4
Add a comment...
1
Ken Mad's profile photo
Ken Mad
 
hello
Add a comment...
Have him in circles
2,226 people

Rafay Baloch

Shared publicly  - 
1
Add a comment...
 
A Complete and Detailed Introductory Guide to Web Application Security:
https://www.netsparker.com/blog/getting-started-web-application-security/
4
1
Mustafa Qasim's profile photo
Add a comment...

Rafay Baloch

Shared publicly  - 
3
Khuram Nawaz's profile photo
 
bro can you post something about word press hacking?
Thanks in Advance :)
Add a comment...
People
Have him in circles
2,226 people
Work
Occupation
Ethical Hacker, Penetration Tester
Employment
  • RHA
    Founder/Admin, present
Places
Map of the places this user has livedMap of the places this user has livedMap of the places this user has lived
Currently
-Pakistan
Previously
- - - - karachi
Story
Tagline
Hey every one, I am a freelance Penetration tester and security expert, I got interested in hacking at the age of 14 and since then I am learning and exploring new things every day. I don't claim to be the best hacker in the world, however unlike lots of them I share what I learn.
Introduction

Rafay Baloch
Hacker, Blogger,Internet Marketor, Seo expert,Pianist, Web Entrepreneur

Founder of:
http://rafayhackingarticles.net/
www.hacking-book.com
www.techlotips.com
Education
  • Bahria Foundation School
Basic Information
Gender
Male
Relationship
In a relationship
Rafay Baloch's +1's are the things they like, agree with, or want to recommend.
What is the .htaccess file and what do I use it for? | Learn How To Hack...
www.rafayhackingarticles.net

.htaccess - The Point of Discussion HT(Hyper Text) access file is actually a directory level configuration file which supports handsome numb

DOM XSS Explained - Part 1 | Learn How To Hack - Ethical Hacking and sec...
www.rafayhackingarticles.net

Cross Site scripting (XSS) has been a problem for well over a decade now, XSS just like other well known security issues such as SQL, XPATH,

Hacker's Dome - First Blood CTF | Learn How To Hack - Ethical Hacking an...
www.rafayhackingarticles.net

When it comes to Information Security, there's a great way to learn, train and keep sharp your skills. This can be done using gamification m

A Tale Of A DOM Based XSS In Paypal | Learn How To Hack - Ethical Hackin...
www.rafayhackingarticles.net

We have already disclosed lots of findings related to DOM Based XSS and this article talks about a pretty interesting DOM Based XSS vulnerab

A Beginners Guide To Using IPTables | Learn How To Hack - Ethical Hackin...
www.rafayhackingarticles.net

ABSTRACT. Readers, there are numerous reasons ... It is well known that the Internet is an unmanaged an decentralized network, running under

The Hacker's Manifesto | Learn How To Hack - Ethical Hacking and securit...
www.rafayhackingarticles.net

Martial arts are part of an ancient culture, a people that has a very rich history. The term Kung Fu was created over 4000 years and at firs

Rhainfosec XSS Challenge 1 - Writeup | Learn How To Hack - Ethical Hacki...
www.rafayhackingarticles.net

On 7th January 2014, we announced an XSS challenge for the whole infosec community, the challenge was based upon blacklist based protection

RHAinfoSec XSS Challenge - 1 | Learn How To Hack - Ethical Hacking and s...
www.rafayhackingarticles.net

This turns out to be the first post of the Year 2014, I would like to start this post by wishing you a very happy new year, sorry for the de

How To Capture Passwords Across The Air - Network Traffic Analysis | Lea...
www.rafayhackingarticles.net

It is known that WireShark is a powerful tool that goes far beyond a simple sniffer. What many do not know is that there are several ways to

Code Igniter XSS Filter Multiple Bypasses | Learn How To Hack - Ethical ...
www.rafayhackingarticles.net

Recently we released our "XSS Filter Evasion Cheat Sheet", i was quite surprised to hear the community feedback. The total downloads have su

Bypassing Modern WAF's XSS Filters - Cheat Sheet | Learn How To Hack - E...
www.rafayhackingarticles.net

Last month i was asked by my university teacher "Sir Asim Ali" to write a paper on any topic related to "Computer Architecture" as a semeste

Understanding This Technique Called MySQL Injection | Learn How To Hack ...
www.rafayhackingarticles.net

ABSTRACT. It is known that computers and software are developed and designed by humans, human error is a reflection of a mental response to

7 Qualities of Highly Effective Hackers | Learn How To Hack - Ethical Ha...
www.rafayhackingarticles.net

When asked to write on this topic, I admit that it made me fringe just a bit. Because I don't consider myself to be a highly effective hacke

An Overview of Real World Account Hacking Strategies | Learn How To Hack...
www.rafayhackingarticles.net

In this method, the attacker attempts to direct unwary users to a fake login page, usually by spamming the url. Spam urls used to be most pr

phpThumb Server Side Request Forgery | Learn How To Hack - Ethical Hacki...
www.rafayhackingarticles.net

Recently me along with my friend "Deepankar Arora" discovered a server side request forgery vulnerability inside of the PHP Thumb's latest v

eLearnSecurity Web Application Penetration Testing (WAPT) - Course Revie...
www.rafayhackingarticles.net

As years passed by, we have seen an upward progression in the layer of insecurity starting from the physical layer attacks (Layer 1) towards

Memory Forensics, Analysis And Techniques PART 2 | Learn How To Hack - E...
www.rafayhackingarticles.net

INTRODUCTION. Volatility is a completely open collection of tools, implemented in Python under the GNU General Public License, for the extra

Memory Forensics, Analysis And Techniques Part 1 | Learn How To Hack - E...
www.rafayhackingarticles.net

ABSTRACT. Due to the increased number of cases of cyber-crimes and intrusions, along with the storage capacity of hard disks and devices, it

Importance Of Cryptography And Security Experts In Society. | Learn How ...
www.rafayhackingarticles.net

ABSTRACT. It is well known that philosophy hacker alters every decade, year, time, and your value. Currently the involvement of these citize

Error Based SQL Injection - Tricks In The Trade | Learn How To Hack - Et...
www.rafayhackingarticles.net

Trigger an error. In this article I am going to describe some simple tips and tricks, which are useful to find and/or exploit error based on