DISCLAIMER

Featured

Any actions and or activities related to the material contained within this website is solely your responsibility. The misuse of the information in this website can result in criminal charges brought against the persons in question. KASUR will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this website to break the law.

This site contains materials that can be potentially damaging or dangerous. If you do not fully understand something on this site, please leave this site now! Refer to the laws in your province/country before accessing, using, or in any other way utilizing these materials. These materials are for educational and research purposes only. Do not attempt to violate the law with anything contained here. Neither administration of this server, the authors of this material, or anyone else affiliated in any way, is going to accept responsibility for your actions.

Your usage of this website constitutes your agreement to the following terms:

  • All the information provided on this site are for educational purposes only. The site is no way responsible for any misuse of the information.
  • “KASUR” is a team that provide site related to Computer Security and not a site that promotes hacking / cracking / software piracy.
  • This site is totally meant for providing information on “Computer Security”, “Computer Programming” and other related topics and is no way related towards the terms “CRACKING” or “HACKING” (Unethical).
  • All the information on this site are meant for developing Hacker defense attitude among the users and help preventing the hack attacks. KASUR insists that these information shall not be used for causing any kind of damage directly or indirectly. However you may try these codes on your own computer at your own risk.
  • The word “Hack” or “Hacking” that is used on this site shall be regarded as “Ethical Hack” or “Ethical Hacking” respectively.

We believe only in White Hat Hacking. On the other hand we condemn Black Hat Hacking.

We reserve the right to modify the Disclaimer at any time without notice.

 

Best regards,

KASUR TEAM
2001586205     Andriana Pratama Putra
2001622614     Veber Sormin

How to Detect and Avoid Phishing

On our previous post, we already talked about phishing. Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message to obtain sensitive information such as usernames, passwords, and credit card details (and money), often for malicious reasons, by disguising as a trustworthy company. Phishing is an example of social engineering techniques used to trick users, and exploits weaknesses in current web security. This time, we will tell you how to avoid it by detecting it first.

Continue reading

Footprinting a Webserver

Before we do footprinting, we have to understand what footprint is. Footprinting (also known as reconnaissance) refers to the process of collecting as much as information as possible about the target system to find ways to penetrate into the system. Information such as ip address, Whois records, DNS information, an operating system used, employee email id, Phone numbers etc is collected. These information is very useful to a hacker who is trying to crack a whole system.

Continue reading

Web Application Fingerprinting

One of the first tasks when conducting a web application penetration test is to try to identify the version of the web server and the web application. It allows us to discover all the well-known vulnerabilities that are affecting the web server and the application.This process is called web application fingerprinting and in this article we will see how to perform it.

Continue reading

What is Social Engineering and How Does it Work?

Social engineering is still one of the most common means of cyber-attack, primarily because it is highly efficient. To criminals, the user is the weakest link in the security chain. Social engineering is one of the biggest problem in IT security today. It’s so effective because it targets at the human level as opposed to the technical level. While you can patch up technical vulnerabilities, it’s way harder to address vulnerabilities caused by human error. An education process is vital for end users to understand the dangers of social engineering and to avoid falling for such scams.

Continue reading

How to Utilize Search Engine with Google Search Operators

What is Google search operators? According to moz.com, Google search operators are special characters and commands (sometimes called “advanced operators”) that extend the capabilities of regular text searches. Search operators can be useful for everything from content research to technical SEO (Search Engine Optimization) audits. In a word, It is an act of searching using Google search engine to find anything that is left behind by system admin or web developer, that is not meant to be public consumption.

Continue reading

Enumerating Target Using WPScan

In this section we will talk about how to enumerate our target using WPScan. So, what is enumeration? According to Tutorialspoint.com, Enumeration belongs to the first phase of Ethical Hacking, i.e., “Information Gathering”. This is a process where the attacker establishes an active connection with the victim and try to discover as much attack vectors as possible, which can be used to exploit the systems further. In a nutshell, enumeration can be used to gather information.

Continue reading