How “WordPress SEO By Yoast” Could Get Your Site Hacked [Security Alert]

If you are running your site on WordPress platform and using this [Wordpress SEO By Yoast] awesome plugin then i would advise you to first update it before further reading the article, if not already. A huge flaw was found in the plugin by a freelance security consultant Ryan Dewhurst which puts your site in danger and could even get it hacked.


You can read more about the technical aspect of the bug from WPScan Vulnerablility Database.
According to it ”

The authenticated Blind SQL Injection vulnerability can be found within the 'admin/class-bulk-editor-list-table.php' file. The orderby and order GET parameters are not sufficiently sanitised before being used within a SQL query.

In layman’s terms a malicious hacker could change your database by making an logged-in author visit a malformed URL through Social Engineering.

The severity of the bug was so huge that it made the WordPress team to force-push this update by which the plugin will be updated automatically if the auto-update feature is not turned-off. The update will be automatically rolled to you if you are,

  • running on 1.7 or higher, you’ll have been auto-updated to 1.7.4.
  • If you were running on 1.6.*, you’ll have been updated to 1.6.4.
  • If you were running on 1.5.*, you’ll have been updated to 1.5.7.

Yesterday Yoast team released a blog-post outlining the bug and what they did to patch the flaw.

So all in all if your on older version of the plugin then you must update it as soon as possible to avoid any risks of your site getting hacked or compromised.

Note: WordPress SEO By Yoast Premium users need to manually update the plugin by going to Plugins->Installed Plugins->Wordpress SEO By Yoast and clicking on ‘update plugin’.

Top 50 Hacking Tools That You Must Have

Whether you are a Penetration tester, a hacker or an aspiring newbie trying to learn Cyber Security, you must have a nice catalogue of tools to make your life easier. While these tools do make working simpler but cannot compensate for the vast amount of knowledge required in this field. Ethical hacking and online security involves a lot efforts. Many tools are used to test and keep software secure. The same tools can also be used by hackers for exploitation.


A hacking tool is a computer program or software which helps a hacker to hack a computer system or a computer program.

 In this post i’m going to mention 50 different tools under 9 categories that your ‘Hack Lab’ must have. Most of the tools mentioned in this post are pre-included in Kali Linux which you can install to have them at once.
Intrusion Detection Systems :-
These are the tools you must have if you’re building a hack lab for penetration testing or for any security arrangement. They help you detect of any threats that might harm the system.
  • Snort
  • NetCop

Encryption Tools :-
While the above tools do identify any suspicious activity but they can’t protect your data, you need encryption tools for that.
  • TrueCrypt (The project has been shut down and no longer supported)
  • OpenSSH
  • Putty
  • OpenSSL
  • Tor
  • OpenVPN
  • Stunnel
  • KeePass

Port Scanners :-

The next big thing is Port Scanners, you can’t penetrate a network without knowing what services are running on what ports.
  • Nmap
  • Superscan
  • Angry IP Scanner

Packet Sniffers :-

These tools let you intercept traffic incoming/outgoing from the network.
  • Wireshark
  • Tcpdump
  • Ettercap
  • Dsniff
  • EtherApe

Traffic Monitoring :-
These tools let’s you monitor and analyze what is currently going on in a network.
  • Splunk
  • Nagios
  • P0f
  • Ngrep  

Vulnerability Exploitation :-

These are the hardcore tools that you will use after identifying the flaw or loop hole in the security of a network.
  • Metasploit (The Best)
  • Sqlmap
  • Sqlninja
  • Social Engineer Toolkit
  • NetSparker
  • BeEF
  • Dradis

Packet Crafting :-
Packet Crafting tools facilitate finding vulnerabilities within the firewall.
  • Hping
  • Scapy
  • Netcat
  • Yersinia
  • Nemesis
  • Socat

Password Crackers :-
These tools let you crack passwords a computer has stored in it or is transmitting over the network.
  • Ophcrack
  • Medusa
  • RainbowCrack
  • Wfuzz
  • Brutus
  • L0phtCrack
  • Fgdump
  • THC Hydra
  • John The Ripper
  • Aircrack
  • oclHashcat
  • Cain and Abel

Wireless Hacking :-

If a network have a Wi-fi access point then it can easily be broken into. Various encryption methods like WEP, WPA/WPA2  or even the latest WPS have some serious security flaws. These tools help you intrude much easily.
  • Aircrack-ng
  • Kismet
  • InSSIDer
  • KisMAC
These were some of the tools which must be in any Cyber Security Researcher’s arsenal.
So, What are you waiting for – Let the hacking begin..!!
Did I miss some other cool tools which must be in this list, do let me know in the comments.

Easiest Way To Find Vulnerablility (Bugs) In A Website

In this post we’re going to discuss an automated vulnerability discovery tool for websites – Uniscan. This tool is the creation of SourceForge Project and is written in perl language.
It scan websites and web applications for various security issues like SQLi, RFI, LFI, XSS etc.For this tutorial, we are going to use Kali Linux because Uniscan is preinstalled and it saves us a lot of hassle. If you don’t have kali linux installed or cannot figure out how to install it, I would recommend taking a look at my previous post – How To Install Kali Linux.Running and using Uniscan is quite simple, just open up a Terminal Window and type ‘uniscan‘ and the list of options and examples will be listed.



Check Out : Easy Ways To Prevent DDOS Attacks

Scanning :-
In the image above under the Usage heading examples are given on using Uniscan, try the first option.


The above example scans a single url for basic information.

Fingerprinting :-
With the option ‘j’ uniscan would fingerprint the server of the url. Server fingerprinting simply runs commands like ping, traceroute, nslookup, nmap on the server ip address and packs the results together.


Another option is ‘g’ which does web based fingerprinting. It looks up specific urls.



Search The Search Engines :-
Uniscan can also perform bing and google searches and store the result in a text file. The i option can be used for searching bing and o operator for google. To search bing for all domains hosted on a given ip address issue the following command :
Replace the x’s with your target ip. The results are saved in a file called sites.txt which can be found at ‘/usr/share/uniscan’. They should ideally be saved in the home directory of the user or the working directory.
For searching google, use the following command :
Use this tool carefully because google may block too many automated search queries.
As the internet is endless so are the possibilities of using this tool. So go and find those vulnerabilities on them websites.

How to Check SQL Injection in your site in 3 Steps ?

I’m learning SQL injection (SQLi) indepth so I’ll try teaching you guys a little of that as well.SQLi is the most popular attack on any website these days.There has been an enormous increase in SQL programmers and websites,and the biggest problem with SQL is “Either your perfect/hacked”.Due to poor coding programmers often leave vulnerabilities in their site and hackers its our job to inform them and patch them up.So lets see how to check if a site if vulnerable to SQLiSince this is still the basic,there is nothing much to do.All you have to is:

  • Get a site which uses SQL queries.For your convinc,in simpler terms it is any site which has “”.You must have seen tons of such sites.Note: NOT all sites which have “=” use SQL queries it might also use “PHP Get/Post method”.
  • Once,you have a site like then just insert a inverted comma(‘) like this “′”.
  • If the site is vulnerable to SQL then it would return an error something like this.You might get an error like this “You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ” AND single_group = “S”‘ at line 1”
This error need not be the same always, as long as you get an error you can tell that the site is vulnerable to SQLi and its up to you to report this to the site admin.