Cover photo
Rafay Baloch
Works at RHA
Attended Bahria Foundation School
Lives in -Pakistan
2,226 followers|26,311,878 views


Rafay Baloch

Shared publicly  - 
A good web vulnerability scanner should detect more than just vulnerabilities:
Use the Netsparker knowledge base nodes to understand the target web application better and do a complete penetration test and identify all vulnerabilities.
Add a comment...

Rafay Baloch

Shared publicly  - 
Add a comment...
Ken Mad's profile photo
Ken Mad
Add a comment...
Have him in circles
2,226 people

Rafay Baloch

Shared publicly  - 
Add a comment...
A Complete and Detailed Introductory Guide to Web Application Security:
Mustafa Qasim's profile photo
Add a comment...

Rafay Baloch

Shared publicly  - 
Khuram Nawaz's profile photo
bro can you post something about word press hacking?
Thanks in Advance :)
Add a comment...
Have him in circles
2,226 people
Ethical Hacker, Penetration Tester
  • RHA
    Founder/Admin, present
Map of the places this user has livedMap of the places this user has livedMap of the places this user has lived
- - - - karachi
Hey every one, I am a freelance Penetration tester and security expert, I got interested in hacking at the age of 14 and since then I am learning and exploring new things every day. I don't claim to be the best hacker in the world, however unlike lots of them I share what I learn.

Rafay Baloch
Hacker, Blogger,Internet Marketor, Seo expert,Pianist, Web Entrepreneur

Founder of:
  • Bahria Foundation School
Basic Information
In a relationship
Rafay Baloch's +1's are the things they like, agree with, or want to recommend.
What is the .htaccess file and what do I use it for? | Learn How To Hack...

.htaccess - The Point of Discussion HT(Hyper Text) access file is actually a directory level configuration file which supports handsome numb

DOM XSS Explained - Part 1 | Learn How To Hack - Ethical Hacking and sec...

Cross Site scripting (XSS) has been a problem for well over a decade now, XSS just like other well known security issues such as SQL, XPATH,

Hacker's Dome - First Blood CTF | Learn How To Hack - Ethical Hacking an...

When it comes to Information Security, there's a great way to learn, train and keep sharp your skills. This can be done using gamification m

A Tale Of A DOM Based XSS In Paypal | Learn How To Hack - Ethical Hackin...

We have already disclosed lots of findings related to DOM Based XSS and this article talks about a pretty interesting DOM Based XSS vulnerab

A Beginners Guide To Using IPTables | Learn How To Hack - Ethical Hackin...

ABSTRACT. Readers, there are numerous reasons ... It is well known that the Internet is an unmanaged an decentralized network, running under

The Hacker's Manifesto | Learn How To Hack - Ethical Hacking and securit...

Martial arts are part of an ancient culture, a people that has a very rich history. The term Kung Fu was created over 4000 years and at firs

Rhainfosec XSS Challenge 1 - Writeup | Learn How To Hack - Ethical Hacki...

On 7th January 2014, we announced an XSS challenge for the whole infosec community, the challenge was based upon blacklist based protection

RHAinfoSec XSS Challenge - 1 | Learn How To Hack - Ethical Hacking and s...

This turns out to be the first post of the Year 2014, I would like to start this post by wishing you a very happy new year, sorry for the de

How To Capture Passwords Across The Air - Network Traffic Analysis | Lea...

It is known that WireShark is a powerful tool that goes far beyond a simple sniffer. What many do not know is that there are several ways to

Code Igniter XSS Filter Multiple Bypasses | Learn How To Hack - Ethical ...

Recently we released our "XSS Filter Evasion Cheat Sheet", i was quite surprised to hear the community feedback. The total downloads have su

Bypassing Modern WAF's XSS Filters - Cheat Sheet | Learn How To Hack - E...

Last month i was asked by my university teacher "Sir Asim Ali" to write a paper on any topic related to "Computer Architecture" as a semeste

Understanding This Technique Called MySQL Injection | Learn How To Hack ...

ABSTRACT. It is known that computers and software are developed and designed by humans, human error is a reflection of a mental response to

7 Qualities of Highly Effective Hackers | Learn How To Hack - Ethical Ha...

When asked to write on this topic, I admit that it made me fringe just a bit. Because I don't consider myself to be a highly effective hacke

An Overview of Real World Account Hacking Strategies | Learn How To Hack...

In this method, the attacker attempts to direct unwary users to a fake login page, usually by spamming the url. Spam urls used to be most pr

phpThumb Server Side Request Forgery | Learn How To Hack - Ethical Hacki...

Recently me along with my friend "Deepankar Arora" discovered a server side request forgery vulnerability inside of the PHP Thumb's latest v

eLearnSecurity Web Application Penetration Testing (WAPT) - Course Revie...

As years passed by, we have seen an upward progression in the layer of insecurity starting from the physical layer attacks (Layer 1) towards

Memory Forensics, Analysis And Techniques PART 2 | Learn How To Hack - E...

INTRODUCTION. Volatility is a completely open collection of tools, implemented in Python under the GNU General Public License, for the extra

Memory Forensics, Analysis And Techniques Part 1 | Learn How To Hack - E...

ABSTRACT. Due to the increased number of cases of cyber-crimes and intrusions, along with the storage capacity of hard disks and devices, it

Importance Of Cryptography And Security Experts In Society. | Learn How ...

ABSTRACT. It is well known that philosophy hacker alters every decade, year, time, and your value. Currently the involvement of these citize

Error Based SQL Injection - Tricks In The Trade | Learn How To Hack - Et...

Trigger an error. In this article I am going to describe some simple tips and tricks, which are useful to find and/or exploit error based on