5 Best Ways to Secure Mobile Users

As mobile devices have become essential part of human life, soon it will be used as a tool for the employee to enhance their productivity. While workplace flexibility and convenience is increasing, mobile employees are actually putting enormous amounts of company data at risk. Most of[...]

~ vendredi 30 septembre 2016 0 commentaires

WPA WPA2 Phishing Tool: Linset

Linset is not a social engineering tool that is used to hack without bruteforce; it requires only two programs that are lighttpd and php5-cgi.apt-get install lighttpdapt-get install php5-cgiAfter you unzip the download, place the linset folder found in the download into root. This folder[...]

~ mardi 27 septembre 2016 0 commentaires

Durvasav: Bruteforce Password Cracker

Durvasav bruteforce password cracker is a simple bruteforce password hash cracker program written in C language. It is a console program released under GNU GPL version 3 and runs on Windows. This tool is used to extract plain text from any standard hashes. It uses the OpenSSL library[...]

~ mardi 27 septembre 2016 0 commentaires

C Programming For Hackers - Part 4

[...]

~ jeudi 22 septembre 2016 0 commentaires

Open Source OSINT Assistant: DataSploit

The various Open Source Intelligence (OSINT) tools used to capture data, gives the user all the relevant information about the domain / email / phone number / person, etc. It allows us to expand our attack/defense surface by collecting relevant information about the target.DataSploit[...]

~ mardi 20 septembre 2016 0 commentaires

Has your password been leaked?

Don't want to read the theory? Just want to see if your password has been leaked. Click here or scroll down.How websites store dataWhen you create an account on a website, the website stores your registration details on it's SQL databases. Very few people, even within the company/website[...]

~ dimanche 18 septembre 2016 0 commentaires

C Programming For Hackers - Part 3

C Programming for Hackers - Part 2 ( Previous Part[...]

~ samedi 17 septembre 2016 0 commentaires

How to stop WhatsApp to share Mobile Number with Facebook

It’s been around more than two years that Facebook has officially acquired Whatsapp to expand the digital marketing landscape. Despite Whatsapp CEO Jan Koum said that user privacy wouldn’t suffer, the services are about to get a little bit friendlier with their data sharing.Whatsapp[...]

~ vendredi 16 septembre 2016 0 commentaires

4 Best Linux Command Line Books

Almost every geek is fascinated to Linux's complex beauty, security and flexibility but if you are a non-linux user or a beginner it is going to be headache to even extract a zip file and install a program using terminal. So if you want to learn Linux then I would strongly recommend[...]

~ vendredi 9 septembre 2016 0 commentaires

C programming for Hackers - Part 2

C Programming for Hackers - Part 3 ( Next Part )C Programming for Hackers - Part 1 ( Previous Part[...]

~ jeudi 8 septembre 2016 0 commentaires

C Programming for Hackers - Part 1

C Programming for Hackers - Part 2 ( Next Part[...]

~ jeudi 8 septembre 2016 0 commentaires

Facebook Bomb using VB-script

Script :' InputBoxesMessage = InputBox("What Is The Message?","WhatsApp DDos")MsgBox "VBScript Written By Priyank Gada"T = InputBox("How Many Times Needs It To Be Send?","WhatsApp DDos")If MsgBox("You've Filled It In Correctely", 1024 + vbSystemModal, "WhatsApp DDos") = vbOk Then' Go To WhatsAppSet WshShell = WScript.CreateObject("WScript.Shell")Return[...]

~ mercredi 7 septembre 2016 0 commentaires

Whatsapp Bomb using VB-Script

Today , we are going to learn how to bomb messages on web whatsapp using VB-Script.Explanation of the script.' InputBoxesThis section is the data input. Here we are taking inputs from the user . Contact stores the name of the contact. Message stores the message , T stores the times.' Go To WhatsAppThis section redirects the user[...]

~ mercredi 7 septembre 2016 0 commentaires

Create Your First Hidden Website with TOR

Want to explore the world of DarkNet and create your own Hidden Website with TOR? Ideal course is here “Create Hidden Website Using TOR for Beginners”. Now creating a hidden website on DarkNet is not difficult. Start as a beginner and explore the endless possibilities of using TOR web[...]

~ mercredi 7 septembre 2016 0 commentaires

Whatsapp 4G VIP SCAM - Technical Analysis

This is a short blog post describing about a recent hoax pertaining the WhatsApp 4.0 version. I would like to clearly highlight that there is no such application as 'Whatsapp 4G'. The version promises users  unrealistic features video calling, new whatsapp themes, delete sent[...]

~ mardi 6 septembre 2016 0 commentaires

Credit Card 101 - Part 1

Hello guys , we are back with another awesome article. In this series of articles ( credit card 101 ) we are going to learn about various credit cards , how credit cards work , how to hack credit cards and most important how to secure your personal credit card. So to start with credit[...]

~ dimanche 4 septembre 2016 0 commentaires

A Critical Vulnerability in Inteno Routers

Security researchers are warning users regarding new critical vulnerabilities in Inteno routers, which could allow remote attackers to replace the firmware on a device to take complete control over it and monitor the internet traffic.According to F-Secure, the issue affects the Inteno[...]

~ vendredi 2 septembre 2016 0 commentaires

Breaking The Great Wall of Web - XSS WAF Evasion CheatSheet

I think it's mandatory to give back to Security community from where we learn cutting edge techniques and information. Therefore after months of effort i am presenting to you a new WhitePaper titled "Breaking Great Wall of Web" without any strings attached. AcknowledgementsI would like[...]

~ jeudi 1 septembre 2016 0 commentaires

Want to become Security Engineer?

The risk of financial and reputation damage caused by a data breach has led to greater demand for security engineers, and a growing skills gap. However, with a growing skills gap comes greater opportunity for a fulfilling and lucrative career as a security engineer.So the question is[...]

~ dimanche 28 août 2016 0 commentaires

How to win against Phishing attacks?

A Phishing email will typically direct the user to visit a website where they are asked to update personal information, such as a password, credit card, social security, or bank account numbers, that the legitimate organization already has.Phishing attacks are originated by an attacker[...]

~ vendredi 26 août 2016 0 commentaires