Saturday, October 31, 2015

Hackingloops Turn Social – Hackers First Social Networking Website

Hackingloops ~

Hey Friends, it’s your friend Lokesh, owner of Hackingloops.  I would like to thank all of you for support you have provided to make Hackingloops into a success. This motivates us to do something new and today with all your support we have added new features to Hackingloops. Hackingloops now allows you to interact with …

The post Hackingloops Turn Social – Hackers First Social Networking Website appeared first on Learn Ethical Hacking and Penetration Testing Online.



from WordPress http://ift.tt/1GSj4sE
via IFTTT

Vulnerabilities exposed in Network Time Protocol (NTP) by BU Researchers

Hackingloops ~

Vulnerabilities exposed in Network Time Protocol (NTP)  : Boston university researchers have identified multiple security vulnerabilities in Network Time Protocol i.e. NTP. These vulnerabilities can allow a hacker on network to manipulate time on computers and impact the cryptographic calculations; hackers can launch DDOS attacks and affect other security measures. BU Researchers conducted an attack …

The post Vulnerabilities exposed in Network Time Protocol (NTP) by BU Researchers appeared first on Learn Ethical Hacking and Penetration Testing Online.



from WordPress http://ift.tt/1PWx07N
via IFTTT

Facebook Messenger allows you to chat with Strangers without being Friends

Hackingloops ~

Facebook Messenger allows you to chat with Strangers without being Friends, Does this sounds strange? Off course not because Facebook Messenger allows you to chat with strangers. The most common problem that People usually face on social media websites like Facebook is receiving messages or friend requests from strangers which you don’t know. This functionality …

The post Facebook Messenger allows you to chat with Strangers without being Friends appeared first on Learn Ethical Hacking and Penetration Testing Online.



from WordPress http://ift.tt/1M2Lk8U
via IFTTT

Thursday, October 29, 2015

Common Vulnerability Scoring System for Penetration Testers

Hackingloops ~

Common Vulnerability Scoring System for Penetration Testing During Penetration Testing , we often have to send the report of the test , and provide the rating for the Vulnerabilities discovered during the test . Here is an Excellent Vulnerability score calculator “Common Vulnerability Scoring System“ from National Vulnerability Database . This Vulnerability reporting is important …

The post Common Vulnerability Scoring System for Penetration Testers appeared first on Learn Ethical Hacking and Penetration Testing Online.



from WordPress http://ift.tt/1ObXPVe
via IFTTT

Hackers Targeting Joomla Websites using SQL Injection Vulnerability

Hackingloops ~

Hackers targeting Joomla Websites using SQL Injection Vulnerability in Joomla CMS modules that was disclosed last week. Lot of attacks are being carried out against sites running old, unpatched versions of Joomla CMS. Experts warned Joomla webmasters that it’s quite easy for a hacker to gain full control of a website and execute additional attacks through the vulnerability. …

The post Hackers Targeting Joomla Websites using SQL Injection Vulnerability appeared first on Learn Ethical Hacking and Penetration Testing Online.



from WordPress http://ift.tt/1im9YZi
via IFTTT

Tuesday, October 27, 2015

How to Secure your Facebook Accounts From Hackers

Hackingloops ~

How to Secure your Facebook Accounts From Hackers Facebook is the lifeline of Social Networking these days . Millions of users are regitered on Facebook and Facebook has become the number one website . There is a lots of private data in our Facebook profiles which can be misused or must not be seen by …

The post How to Secure your Facebook Accounts From Hackers appeared first on Learn Ethical Hacking and Penetration Testing Online.



from WordPress http://ift.tt/1O5Bb0W
via IFTTT

SQL Injection Penetration Testing using NMAP

Hackingloops ~

SQL Injection Penetration Testing using NMAP Nmap has released a new NSE Script , HTTP-SQL-INJECTION.nse for the penetration testing , using Nmap for SQL Injection testing . This means the most popular network scanner now also offers to scan the web application for SQL Injection vulnerabilities . This Nmap script has a sole purpose of finding the SQL injection vulnerabilities …

The post SQL Injection Penetration Testing using NMAP appeared first on Learn Ethical Hacking and Penetration Testing Online.



from WordPress http://ift.tt/1jOvqIg
via IFTTT

Securing Your Gmail Account

Hackingloops ~

Securing Your Gmail Account GMail , Free Email from Google , is one of the most popular free email service . Almost everyone who is present online owns atleast one GMail email ID . Even though the GMail / Google take every effort to keep your Email accounts safe , the hackers still prey on …

The post Securing Your Gmail Account appeared first on Learn Ethical Hacking and Penetration Testing Online.



from WordPress http://ift.tt/1PRPYLS
via IFTTT

How Hackers Target You

Hackingloops ~

How Hackers Target You Hackers are all around us !  We are paranoid when it comes to our cyber security , Online account Passwords etc !!! In any hack , Human element is the weakest link . Social engineering is a technique where the hacker might trick the victim of the attack to make the …

The post How Hackers Target You appeared first on Learn Ethical Hacking and Penetration Testing Online.



from WordPress http://ift.tt/1WfKDO9
via IFTTT

SSH for Penetration Testing

Hackingloops ~

SSH for Penetration Testing SSH stands for Secure shell and works on Port 22 . As penetration testers we are aware of the uses and power of SSH on remote access of systems . During Penetration testing SSH might come handy as a powerful tool . This post will explain some of the techniques that …

The post SSH for Penetration Testing appeared first on Learn Ethical Hacking and Penetration Testing Online.



from WordPress http://ift.tt/1MfVmCw
via IFTTT

Saturday, October 24, 2015

Importance of Penetration Testing in Information Technology

Hackingloops ~

Penetration testing has become one of the most important concepts to identify and assess possible vulnerabilities and to ensure the security of information technology confidential data. Penetration testing is based on a testing procedure that is used to identify possible risks or vulnerabilities a specific network can face. It successfully point out the areas from …

The post Importance of Penetration Testing in Information Technology appeared first on Learn Ethical Hacking and Penetration Testing Online.



from WordPress http://ift.tt/1WbCKyz
via IFTTT