Welcome to KaffeNews
  • FOCA

Metadata Extraction using FOCA

In this Information age, Data is very crucial. From Information security point of view also data is what everybody is behind. Data loss for any organization can have a very negative impact financially as well as reputation wise. Most of […]

By: | Analyst| Tags: | Comments: 0
  • CSRF tester
  • CSRF tester

Cross Site Request forgery (CSRF)

Cross Site Request forgery (CSRF) is a kind of Web Application attack which tries to exploit the trust the website has in user’s browser. In this attack the attacker sends a crafted URL to the victim and if the victim […]

By: | security, Testing Framework| Tags: | Comments: 0
  • creepy

Creepy

Most of us use social networks and image sharing platforms without realizing how much information we might be leaking without realizing it. Sometimes we even reveal our current location through these platforms. Creepy is a python application which can extract […]

By: | Analysis, CYBINT| Tags: | Comments: 0
  • Sploitego
  • Sploitego

Sploitego: Maltego Local Transforms

There are many tools out there which can be used for the recon phase of a Pentest, but Maltego stands out of all. Maltego is basically an OSINT (Open Source Intelligence) and forensics application which is very useful for the […]

By: | CYBINT, Testing Framework| Tags: | Comments: 1
  • Trend Micro OSCE Server and Client Issue Optimization as part of Enterprise End Point Security

Trend Micro OSCE Server and Client Issue Optimization as part of Enterprise End Point Security

Abstract In this paper, I have discussed various issues pertaining to Trend Micro. Issues and solutions discussed here are for both servers and clients that are running Trend Micro OSCE. Some critical issues are also discussed, they are combined with […]

Fake Linkedin Reminder

  After being in an hibernation for several months, I believe that it is the right time to get back into business. Having said that, I was going through the SPAM folder along with a friend of mine on a […]

By: | Phishing, spam| Tags: | Comments: 0

THC-Hydra 7.3

THC-Hydra 7.3 Updates: * Hydra main: – Added -F switch to quit all targets if one pair was found (for -M) – Fixed a bug where hydra would terminate after reporting a successful login when an account would accept any […]

By: | Tools| Tags: | Comments: 0
  • Malware Issue Optimization in a Production Environment
  • malware

Malware Issue Optimization in a Production Environment

Abstract It was all about the work, I was involved where I had to provide solution for issues on malwares, initially the work started with solving all the issues using an anti-virus but the thought provoked me; why can’t there […]

  • NTP_configuration_in_windows

NTP Configuration in Windows Environment

This post is been referred to a document that provides you a apprehensive set of steps (document enclosed in the link below) that helps you to configure NTP in windows. Where you need to edit the registry entries to get […]

By: | Books, Conditions, Contributing| Tags: | Comments: 2

THC-IPV6 v 1.9

The THC IPV6 ATTACK TOOLKIT (THC-IPV6) is a complete tool set to attack the inherent protocol weaknesses of IPV6 and ICMP6, and includes an easy to use packet factory library Features: added new tool: detect_sniffer6 (Windows, Linux, *BSD, OS X, […]

By: | Tools| Tags: | Comments: 0
css.php
Contact us

We're not around right now. But you can send us an email and we'll get back to you, asap.

Questions, issues or concerns? I'd love to help you!

Click ENTER to chat