Profile cover photo
Profile photo
RafayHackingArticles
1,126 followers -
Learn Ethical Hacking And Security Tips From Experts.
Learn Ethical Hacking And Security Tips From Experts.

1,126 followers
About
Posts

Post has attachment
How Pakistan's Critical Infrastructure Was Hacked? - Technical Analysis
There have been multiple reports leaked from various sources about NSA hacking into Pakistan's Internet infrastructure ranging from Core Routers to Pakistan Telecommunication Green Line Communication Network in order to intercept Pakistan's civilian and mil...

Post has attachment
Is OneCoin A Scam? - Technical Analysis
TL;dr: People should refrain from any type of Pyramid Scheme especially when it comes to Cryptocurrency: Onecoin is a Cryptocurrency that has been dubbed as Ponzi Scam and the evidence surrounding it is considerate. The way it works is that members buy trai...

Post has attachment
NSA is Hacking Pakistan's Internet Infrastructure, Here's How.
There have been multiple reports leaked from various sources about NSA hacking into Pakistan's Internet infrastructure ranging from  Core routers to Pakistan Telecommunication Green Line communication Network in order to intercept Pakistan's civilian and mi...

Post has attachment
NSA is Hacking Pakistan's Internet Infrastructure, Here's How.
There have been multiple reports leaked from various sources about NSA hacking into Pakistan's Internet infrastructure ranging from  Core routers to Pakistan Telecommunication Green Line communication Network in order to intercept Pakistan's civilian and mi...

Post has attachment
Whatsapp 4G VIP SCAM - Technical Analysis
This is a short blog post describing about a recent hoax pertaining the WhatsApp 4.0 version. I would like to clearly highlight that there is no such application as ' Whatsapp 4G '. The version promises users  unrealistic features video calling, new whatsap...

Post has attachment
Breaking The Great Wall of Web - XSS WAF Evasion CheatSheet
I think it's mandatory to give back to Security community from where we learn cutting edge techniques and information. Therefore after months of effort i am presenting to you a new WhitePaper titled " Breaking Great Wall of Web " without any strings attache...

Post has attachment
Breaking The Great Wall of Web - XSS WAF Evasion CheatSheet
I think it's mandatory to give back to Security community from where we learn cutting edge techniques and information. Therefore after months of effort i am presenting to you a new WhitePaper titled " Breaking Great Wall of Web " without any strings attache...

Post has attachment
Google Chrome, Firefox Address Bar Spoofing Vulnerability
Introduction Google security team themselves state that " We recognize that the address bar is the only reliable security indicator in modern browsers " and if the only reliable security indicator could be controlled by an attacker it could carry adverse af...

Post has attachment
Wordpress Mobile Detector Incorrect Fix Leads To Stored XSS
Recently, Wordpress Mobile Detector plugin was in news for the " Remote Code Execution " vulnerability that was found inside the resize.php file. The vulnerability allowed an external attacker to upload arbitrary files to the server as there was no validati...

Post has attachment
Acunetix Website Hack And Lessons Learnt
Last night, Website of Acunetix (A Wellknown Automated Web Application Scanner) was hacked by Croatian hackers. From that point of this onward the website has been taken offline and acunetix team are reviewing the root cause for the hack. Currently the home...
Wait while more posts are being loaded