Quoting the author: IT has been more than six years since the advent of HTML5 (dated back 2008), and as the time has passed by we have seen more and more websites utilizing HTML5 features and have witnessed that technologies like flash and silverlight are d...
Do you need expert help in gaining access/passwords to Facebook, gmail, Instagram, bbm, yahoo-mail, snap-chat, twitter,
Hotmail, badoo, zoosk, various blogs, icloud, apple accounts etc. Password retrieval, breaching of bank accounts: (for
local and international banks, block transfers, make transfers), clear debts, pay for bills at give a way rates also
provide cheap Holiday booking, breach of web host servers, firewall breaches, application cracks, change of school grades,
professional hacking into institutional servers, clearing of criminal records, mobile airtime recharge, keylogging,
smartphone,tablet portable device hacks, pc hacks on any OS and ip tracking and general tracking operations..........
- RHAFounder/Admin, present
- Bahria Foundation School
Sucuri WAF XSS Filter Bypass | Learn How To Hack - Ethical Hacking and s...
Introduction. Sucuri Cloud Proxy is a very well known WAF capable of preventing DOS, SQL Injection, XSS and malware detection and prevention
Multiple PDF Vulnerabilities - Text and Pictures on Steroids
I had the pleasure to talk at the HackPra in Bochum on 22.10 this year. My topic was about Adobe Reader and the vulnerabilites I found in ve
Android Browser Cross Scheme Data Exposure Attack | Learn How To Hack - ...
tl;dr This exploit is an issue present in Android browser < 4.4 and several other android browsers which allows an attacker to read sqlite c
Bad Meets evil - PHP meets Regular Expressions | Learn How To Hack - Eth...
This article would briefly discuss the reason why Regular Expressions might not be suitable for filtersand how things could turn miserably b
Google Patches Second "Same Origin Policy" Bypass Flaw in Android Browse...
A Same Origin Policy (SOP) bypass vulnerability has been identified in the Android browser installed by default on versions of the operating
A Tale Of Another SOP Bypass In Android Browser < 4.4 | Learn How To ...
Since, my recent android SOP bypass [CVE-2014-6041] triggered a lot of eruption among the infosec community, I was motivated to research a b
Android Browser Same Origin Policy Bypass | Learn How To Hack - Ethical ...
Introduction. Same Origin Policy (SOP) is one of the most important security mechanisms that are applied in modern browsers, the basic idea
A Simple Design Flaw In WhatsApp Leading To DOS | Learn How To Hack - Et...
WhatsApp is the choice of millions of people across the world for sending free messages, pictures, audios etc. As a reason of which it has b
Puffin Web Browser Pop Up Recursion Vulnerability - DOS | Learn How To H...
During my recent security research on "Puffin Web Browser" I found several security bugs with "Puffin Web Browser" ranging from low to high
Ethical Hacking and Penetration Testing Guide - Rafay Baloch - Google Books
books.google.com.pk - This book introduces the steps required to complete a penetration test, or ethical hack. Requiring no prior hacking ex
Puffin Web Browser Address Bar Spoofing Vulnerability | Learn How To Hac...
During my recent research on Mobile browsers i have managed to find couple of interesting vulnerabilities such as SOP bypass, Denial of serv
Rhainfosec XSS Challenge 2 - Writeup | Learn How To Hack - Ethical Hacki...
A Simple Design Flaw In Qmobile's Messaging System | Learn How To Hack -...
Introduction. This post describes a simple design flaw inside of Qmobile handsets and describes why you shouldn't rely upon built in passwor
RHAinfoSec XSS Challenge - 2 | Learn How To Hack - Ethical Hacking and s...
If all you can do is ">, then our humble apologies this challenge is not for you. The WAF can be very hard, if you don't know how to properl
Hardening Wordpress Security By Monitoring Malicious User Activities | L...
WordPress has become the most popular content management system; it drives more than 20% of the websites on the internet. Such popularity ha
Indispensible Need of National CERT in Pakistan | Learn How To Hack - Et...
In this advanced era where science and technology have become quite advanced, it leave not be incorrect to state that technology has become
DDOS: The Modern Website's Kryptonite | Learn How To Hack - Ethical Hack...
Denial of Service and the Distributed Denial of Service Attacks have recently emerged as one of the most newsworthy, if not the greatest, we
elearnsecurity Advanced Reverse Engineering Of Software - Review | Learn...
There is a saying "To understand how something works, you must take it apart and unravel its secrets" that's exactly what reverse engineerin
What is the .htaccess file and what do I use it for? | Learn How To Hack...
.htaccess - The Point of Discussion HT(Hyper Text) access file is actually a directory level configuration file which supports handsome numb
DOM XSS Explained - Part 1 | Learn How To Hack - Ethical Hacking and sec...
Cross Site scripting (XSS) has been a problem for well over a decade now, XSS just like other well known security issues such as SQL, XPATH,