Second Slider


Cyber Security News

Cyber Security News/block-1

Hacking Tools

Hacking Tools/block-7

Security Awareness

Security Awareness/block-5

Latest Hack

Latest Hack/block-3

Website Hacking

Website Hacking/block-2

Data Breach

Data Breach/block-2

System Hacking

System Hacking/block-3



Super Hacking

Super Hacking/block-4

Cyber Security News

Cyber Security News/block-1

Hacking Tools

Hacking Tools

Latest Articles

WHO, Wuhan Virology Institute & Gates Foundation Hacked Amid Covid; Data Leaked by Hackers

The Gates Foundation, World Health Organization and Wuhan Institute of Virology have been hacked and data has been leaked online

Written By Manish Kumawat | New Delhi | Updated On: 

According to reports, the Gates Foundation, World Health Organization and Wuhan Institute of Virology  have been hacked and data leaked to the hackers group- A USA based Hacker Group Claims this hacking activity. Thousands of emails, passwords, and documents have been leaked online.

According to the SITE Intelligence Group Reports, 25,000 email addresses and passwords allegedly belonging to these organisation have been leaked to the Hackers.

Netizens react

After the news went viral on social media, users shared screenshots from each organization with users in their social media networks.

Hacking News Today

Hacking News Today

Hacking News Today, Cyber Security News, Ethical Hacking News Articles, Cyber Security Tutorials, Hacking Attacks News, Hacking News Today in India,USA,Australia,Germany,UK.

Hacking News Today, Cyber Security News Today, Ethical Hacking News, Hacking News in India, USA, UK, Australia, Germany.

Cross Site Scripting XSS attack Complete Tutorial guide

Cross Site Scripting XSS attack Complete Tutorial guide

Cross Site Scripting, XSS attack vulnerability, Firewall bypass, encoding bypass, URL encoding bypass xss, xss in bug bounty sites, xss in sites, xss vulnerable sites, bug bounty in xss vulnerability.

Cross-site scripting is a type of computer security vulnerability that is found in web-based applications which allows code injection by web users into any webpage that is viewed by other users. 

xss attack

XSS is made possible due to the fact that faulty coding causes XSS holes (vulnerabilities on websites that allows attackers to avoid security measures) in the client-side script that allows for insertion of malicious code. During an attack, “everything looks fine” to the end user, but in actuality they are subject to a wide variety of threats. XSS is a potentially dangerous vulnerability that is easy to execute and very long and arduous to repair. XSS holes exist in 7 out of every 10 websites. Many site owners do not consider an XSS hole to be a big threat, which is a commonly made mistake because the consequences of an XSS attack against web applications and its users have been proven to be extremely serious. 

The most frequent kinds of web applications that are victimized by XSS attacks are search engines, discussion boards, web-based emails, and posts. Even the most well-known websites in today’s world like Google, Yahoo!, MySpace, Facebook, PayPal, and WikiPedia were once victims. The most commonly used programming languages during XSS attacks are HTML, XHTML, JavaScript, and Adobe’s Flash. However the most popular and potentially the most detrimental language used by malicious attackers is JavaScript
How Cross-Site Scripting works: 
A website is vulnerable if it accepts and subsequently return the same input back to a user. The most common example is when a user does a search and the Web server returns the same data the user typed in. As an example, a user does a search for “XSS” and the browser returns a message of, “Your search for XSS returned the following.”

A cross-site scripting attack can be done rather easily to a Web server that is not properly protected. Web servers generate both text and HTML markup on their web pages. The client’s browser then interprets the web pages. HTML uses special characters to distinguish text from markup. Different characters are special at different points in the document, depending on the grammar. The less-than sign “

Types of XSS Attacks :

 There are three significant types of XSS vulnerabilities that exist and they are

 1.Non-persistent XSS 

2.Persistent XSS
3.DOM XSS(Document object model)
 1. Non-persistent XSS:
 It is also referred as reflected XSS vulnerability. If a web user provides data to a server- side script to instantly generate a resulting page back to him/herself, a resulting page without html encoding can be intercepted by an invalidated user. The malicious client- side code can then be injected into the dynamic page. The attacker can apply a little social engineering (which is the power to manipulate someone to perform actions) to persuade a user to follow a malicious URL that will inject code into the resulting page. After the attacker has accomplished that, he now has full access to that web pages content. 

reflected xss

2. Persistent XSS:

 It is also referred to as stored XSS vulnerability. This vulnerability is susceptible to the most powerful kinds of attacks. First, the data is stored on the server (in a database, file system, or other location) provided by a web application. Then it is later reopened and shown to other users on a webpage without any html encoding. An example of this is an online discussion or message board that allows users to sign in to post messages for other users to read. Persistent XSS is one of the more prestigious types of vulnerabilities because the malicious scripts are capable of being provided and used more than once. This means an attacker can exploit this vulnerability and affect a large magnitude of users. In addition to the huge number of users already at risk, this web application can also be infected by a cross-site scripting virus or worm.

stored xss

3.Document object model XSS:-

DOM Based XSS (or as it is called in some texts, “type-0 XSS”) is an XSS attack wherein the attack payload is executed as a result of modifying the DOM “environment” in the victim’s browser used by the original client side script, so that the client side code runs in an “unexpected” manner. That is, the page itself (the HTTP response that is) does not change, but the client side code contained in the page executes differently due to the malicious modifications that have occurred in the DOM environment.

This is in contrast to other XSS attacks (stored or reflected), wherein the attack payload is placed in the response page (due to a server side flaw).

DOM based xss

Reasons Why XSS Vulnerabilities are Exploited : –
·     Account Hijacking for identity theft 
·     Cookie theft/poisoning to acquire sensitive information 
·     Conduct phishing attacks 
·     Gain free access to otherwise paid for content 
·     False advertising

Steps for XSS Attack 
 In order to execute a basic cross-site scripting attack, we must follow these four simple steps:
 1. Select a target The first step is to select a target. This is done by searching for an XSS hole in a web-based application on a website.
 2. Testing The next step is to decide what kind of XSS hole this website contains because all XSS holes are different in how they are exploited. We need to check for different attack vectors so as to pass the server filter.

 3. XSS Execution                   
 Insert malicious script ( ex : cookie stealing script ) into the webpage 
4. Decide what to do with the data Once you get the user to execute the malicious script, their cookie will be sent to your CGI script. The last thing to do is to see if account hijacking is possible.

Steps to an XSS Attack
 In order for a malicious attacker to execute a basic cross-site scripting attack, they must follow these four simple steps:
 1. Select a target 
The first step is to select a target. This is done by searching for an XSS hole in a web-based application on a website. Once you have discovered an XSS hole, you must look to see if that website contains any kind of cookies. If it does not, then you have failed and you must continue to look for another website. If it does, then you have succeeded and it is now possible for you to steal that cookie. You have finally selected a target.
 2. Testing 
The next step is to decide what kind of XSS hole this website contains because all XSS holes are different in how they are exploited. You must then run some tests to make sure the output is authentic looking. If the website appears to be broken, then you must modify your coding until it looks legitimate. When this is complete, you then plug in your JavaScript, or another kind of client-side scripting code, directing it towards the XSS vulnerability.
 3. XSS Execution 
You are finally ready to distribute your malicious URL in any way that might potentially help you launch it. However, you should make sure to Hex encode your URL to make it seem less obvious of its malicious intent. Now all you have to do is sit and wait. If you are a more experienced attacker, you could even do a few redirects and some XSS combo’s to steal a user’s cookie, and return the user to the website without them knowing their cookie was even stolen.
 4. Decide what to do with the data . 
Once you get the user to execute your XSS hole, their cookie will be sent to your CGI script. The last thing to do is to use a program like Websleuth to see if account hijacking is possible.

A Practical Example of XSS on a Test Site
1.  Reflected Cross Site Scripting
Set security low
 Explore localhost IP in browser; now login with admin: password and select the reflected cross site scripting vulnerability from given list of vulnerabilities.

Now have a look over a small script which would generate an alert window. So in the given text field for “name” I will inject the script in the server.


dvwa reflected xss

Browser will execute our script which generates an alert prompt as showing following screenshot.
In low security it will easily bypass the injected script when an attacker injects it in the text field given for “name”which should be not left empty according developer.

2.  Stored Cross Site Scripting
 Set security low
Now have a look over a small script which would generate an alert window. So in the text area given for message I will inject the script which get store in the server.

dvwa stored xss

Now when user will visit this page to read our message his browser will execute our script which generates an alert prompt as showing following screenshot.


Firewalls, IDS and IPS are the most common security mechanisms that are often used to protect infrastructure from malicious attackers. Out of these, firewalls are the most commonly used, they are placed at the network layer and analyzes malicious packets as well as application layer, where their purpose is to monitor all HTTP and HTTPS traffic between clients and servers and based upon the pre-configured registered signatures in a data base.

1. Fingerprinting F5 BIG IP ASM
F5 is one of the world renowned Web application firewall’s with deep inspection capabilities, similar to citrixnetscaler F5 BiG IP ASM also adds certain cookies as a part of their HTTP communication. The following demonstrates a non-malicious GET request that was submitted to an application running behind an F5 BIG IP ASM firewall.

2. Fingerprinting Mod_Security 
Mod_security is an open source WAF specifically designed for Apache server, due to it being open-source it has been bypassed many times and hence the detection rules have been significantly improved. A malicious request sent to an application running behind mod_security returns a “406 Not acceptable” error along with it inside the response body it also reveals that the error was generated by mod_security.

3.Fingerprinting WebKnight 
Webknight is another very popular Web application firewall, it was specifically designed for IIS servers. The WAF works upon a blacklist and looks for common patterns for attacks such as SQL injection, Directory Traversal, XSS etc. Unlike, other WAF’s webknight is very easy to fingerprint a malicious request returns a “999 No Hacking” response.

4.Fingerprinting dotDefender 
dotDefender is another well-known WAF that was specifically designed for protecting .net applications against well known attacks. Similar to Mod_security and WebknightdotDefender also reveals itself inside the response body when a malicious request is sent to a webapplication running dotDefender.

5. Fingerprinting With Wafw00f
Wafw00f is a small tool written in python and is specifically used tool for fingerprinting Web application firewalls, it conducts five different tests to detect the WAF, such as keeping track of the cookies inside the http request, by analyzing http response received from sending malicious requests, by using drop packets such as FIN and RST and looking at the response received, by server cloaking i.e. modifying URL and altering methods and by testing for pre-built negative signatures which vary from a WAF to a WAF.

XSS General Filter Evasion Cheat Sheet

 All of us might have encountered one such end point that takes URL as parameter and redirects to it using  javascript like :

1.  \x[HEX] 

2.\u00[HEX] Format 1 : javascript: -- > \x6A\x61\x76\x61\x73\x63\x72\x69\x70\x74\x3a Format 2 : javascript: -- > \u006A\u0061\u0076\u0061\u0073\u0063\u0072\u0069\u007 0\u0074\u003a
\u006A\u0061\u0076\u0061\u0073\u0063\u0072\u0069\u0070\ u0074\u003aalert(1)

These are few alternatives to newline character which you can try if newline character is also blocked :
 [0x09] <---- Horizontal Tab 
[0x0d] <---- Carriage Return
\t <---- Horizontal Tab
 \n <---- Newline
\r <---- Carriage Return
Now let's assume
 'javascript:' and
 '\x' and 
'\u' and 
 and [\n,\t,\r] are blocked?? 

What happens if we try to escape any character that does not form a control char (\n,\t,\b,\v,\f,\r and of course \x,\u too) ?? The answer is NOTHING. So we can put escape char in front of any character except n,t,b,v,f,r,x,u and digits. 
Bypass : \j\av\a\s\cr\i\pt\:\a\l\ert\(1\)

Cross-site scripting is one of the most dangerous and most common website vulnerability on the internet. An XSS attack comes in many forms that range from something as small as pop up in a window, to something as destructive as a virus or a worm, and even worse; XSS is capable of compromising a person’s identity. Nobody in this world is ever completely safe from it. As XSS vulnerabilities continue to grow, the best way to protect yourself against it is to always be on the alert, and be aware of what you should do when you come across it.

Cross Site Scripting attack vulnerability, XSS vulnerability, Firewall bypass in xss, xss encoding bypass , URL encoding bypass xss vulnerability, xss in bug bounty sites, xss in sites, xss vulnerable sites, bug bounty in xss vulnerability.

Ethical Hacking Course in Greater Noida

Ethical Hacking Course in Greater Noida

Ethical Hacking Course Institutes in Greater Noida, India. Summer Internship in Ethical Hacking in Greater Noida, India. Cyber Security Internship Training in Greater Noida with live projects, and live hands on practice on Cyber Crime case studies in greater Noida.

Best Institute for Ethical Hacking Course in Greater Noida : Cryptus Cyber Security Pvt Ltd

About Company : CRYPTUS CYBER SECURITY is an Information Security Training and penetration testing Company. Cryptus helps to provide various awareness program and current updates in the field of cyber security. It has been providing advance training and services with upgraded content and technologies to IT professionals. Cryptus provide the organisation in IT sector with highly trained cybersecurity professionals. It Support 100% placement of its trainees at various security positions in IT sector.  The Company deals in Penetration Testing & Incident Response too. There are thousands of clients in the globe.

Cryptus Providing These Courses :

Why there is need of cybersecurity professional?

With the boom in digitisation, everything just shifting on the cyber world. In this techno-savvy environment, the world is becoming more and more digitally sophisticated and so are the cybercrimes. Today, data is one of the most valuable assets, yet often one of most vulnerable. So, for organisations, it’s absolutely important to hire cybersecurity expert to deter and preventing a security breach from happening. There come’s the need of the cybersecurity and which indeed create a demand for cybersecurity professionals.

How to Pursue Career In cybersecurity ?
Complete a Bachelor Degree : Various certain entry-level cyber security jobs can be acquired with an associate’s degree; most jobs require a four-year bachelor’s degree in cyber security or a similar area such as information technology or computer science.
Complete Higher Advance Training: Some positions require candidates to hold an advanced degree such as master’s incyber security. Prospective employers may offer tuition assistance to meet this goal.
Certifications in Cyber Security: Security Professional holds a wide variety of certifications. Some of the popular one’s are CertifiedEthical Hacker (CEH), Offensive Security Certified Professional (OSCP), CertifiedInformationSecurityManager (CISM), CertifiedInformationSystems SecurityProfessional etc.

Surveys and reports

Cybercrime will more than triple the number of job openings over the next 5 years.
By 2021, there will be 3.5 million unfilled security jobs and worldwide cybercrime will cost global business more than $6 trillion annually, according to report by Cybersecurity Ventures.

The National Association of Software and Services Companies (NASSCOM) recently estimated that India alone will need 1 million cybersecurity professionals by 2020 to meet the demands of its rapidly growing.

Contact To the Company : Cryptus Cyber Security Pvt Ltd
Company Website :
Email :
Phone no : +919643236524, +919582163345, +919911298894

How to download any movie easily

How to find any file download link easily by using google dorks
This is all about how to download hindi movies in full hd bluray, this is best best method than torrent. You can download hollywood movies as well. This is the google dorks technique to download any movies.

1. Download Bollywood hindi movies exter these google doeks on google and click on results

intext:"index of" hindi movies
intext:"index of" bollywood hindi movies
intext :"index of" movies

2. Download any Hollywood Movie

intext:"index of" hollywood movie name 

3. example to download hindi movies

intext:"index of" Dumbo download

intext:"index of" alita:battle angel download

intext:"index of" How to train your dragon : The hidden world download

intext:"index of" The Wandering Earth download

intext:"index of" Captain Marvel download

intext:"index of" Avengers: Endgame download 

intext:"index of" gully boy download

intext:"index of" URI download

intext:"index of" manikarnika download

intext:"index of" ek ladki ko dekha to aisa laga

intext:"index of" thackeray download 

intext:"index of" kesari download

intext:"index of" super 30 download

intext:"index of" amavas download

intext:"index of" Brahmastra download

intext:"index of" student of the year 2 download

intext:"index of" kalank download

intext:"index of" Luka Chuppi download

intext:"index of" Why Cheat India download

intext:"index of" Total Dhamaal download

intext:"index of" Avengers End game download

intext:"index of" Bharat download

intext:"index of" Badhaai ho download

intext:"index of" Setters Download

intext:"index of" Student of the year 2 download

intext:"index of" De De pyar de download

intext:"index of" Mental Hai kya download

intext:"index of" India's Most wanted download

intext:"index of" The Tashkent Files download

intext:"index of" Romeo Akbar Walter download

intext:"index of" Narendra Modi PM download

intext:"index of" Junglee Download

intext:"index of" Kesari Download

intext:"index of" Badla Download

intext:"index of" Total Dhamaal Download

intext:"index of" Thackeray Downlaod

intext:"index of" Simmba Download

intext:"index of" Kedarnath Download

intext:"index of" Stree Download

intext:"index of" Dhadak download

Now you can replace any file name instead of movie name