Using the HTML5 Fullscreen API for Phishing Attacks a

Go ahead – hover your mouse over the link to see where it goes on the status bar on the bottom of your browser.

you’ll find that it’s a completely normal link and lets understand how attackers benefit from this vulnerability.

DNS Zone transfer issue in Anna university

Please note : This is not a Vulnerability or a bug , that i am exploiting. I am showing a popular Misconfiguration issue, that often many overlook.

What to do to get into Cyber Security domain ?

I have been getting a lot of queries on why cyber security is tough, and what one should do to secure a place in this cyber security world. I have shared my thoughts. Please comment your opinions, will be happy to hear.

Previous Next

Cybersecurity Awareness Through Media

  Vinod collaborates with broadcast and online media and for more than a decade, he has dedicated himself to create cybersecurity awareness among people.

Online Security During the Pandemic

The lockdown due to pandemic has forced the majority of the workforce to work from home.

Recover Stored wifi Passwords

  (netsh wlan show profiles) | Select-String “\:(.+)$” | %{$name=$_.Matches.Groups[1].Value.Trim(); $_} | %{(netsh wlan show profile name=”$name” key=clear)} | Select-String “Key Content\W+\:(.+)$” | %{$pass=$_.Matches.Groups[1].Value.Trim(); $_} | %{[PSCustomObject]@{ PROFILE_NAME=$name;PASSWORD=$pass }} | Format-Table -AutoSize >> vino_wifi.txt

What OS should I use for Hacking ?

Lot of people constantly ask me what operating system should i use for hacking ? Penetration Testing ? Vulnerability Assessment ? Security research ? Is it Kali Linux ? Parrot OS ? and do real hackers use these operating systems?

Keep Me Informed

Subscribe to Vinod's weekly newsletters to get regular updates on his blogs, events, speeches, and current activities.