How To Crack Web Form Passwords Using Hydra With Burpsuite In Kali Linux
In our previous article How To Crack Password Using Hydra In Kali Linux , we have discussed about THC Hydra- A tool for Online Password attacks. In this tutorial we will discuss...
StageFright 2.0 Fixed: Google released an OTA for Nexus Devices.
StageFright 2.0 Fixed
Few days back, the researchers warned google of the new Stage Fright Bug. This bug affected more than a billion devices that are running on Android OS.
This...
Stage fright Bug 2.0: All Android Devices are Vulnerable to the Bugs
Once again the Stage fright vulnerability is back, two new Android Stage fright vulnerabilities are recently disclosed.
This time with some new tricks, an attacker can hack the Android Phone...
Phishing malware crashes ICICI bank
#Phshing Malware crashes ICICI bank .... https://t.co/a8vTOVvuob
— Buffercode (@buffercoding) February 25, 2016
Official @ICICIBank_Care reply to tweet :
@buffercoding Hi, ICICI Bank has a robust & multi-level security system for all its banking...
Explore into the Metasploit ( a Ultimate Hackers Tool)
Metasploit is a complete and a Ultimate Security tool that provides information about Computer Security Vulnerabilities and also use in penetration testing .It was develop by HD Moore in...
Exploiting buffer overflows using command line
After reading our previous post: Next step moving towards exploit:Finding the return address ,it's time to do some command line exploits. So this post is regarding Exploiting buffer...
How to get into friends whatsapp and send messages
I don't know that how to Express this success !!! Everybody knows that hacking is just a creativity and finding the way to get deeper into the code. So...
Basic Linux exploits: Function Calling Procedure
Note: Hacking is not a joke so please keep patience and learn it step by step.
Note: Before reading this post you must read :
Learn hacking...
TalkTalk Cyber-attack: Another teenager arrested in London
Another teenager arrested in London.
This time the British police arrested a 16 year old boy from Feltham in West London in case of TalkTalk data breach.
On Monday, Metropolitan Police...
ISIS hackers hacked 54,000 twitter accounts: Publishing the secret information of CIA Head
The year has been bad so far for CIA and other US agencies, now this time ISIS hackers hacked 54,000 twitter accounts which also include the accounts of FBI...
Radio Wave Hack: It allows the hacker to control your phone from 16 feet...
Every day we get to know about a different hack and every hack has its own dependencies and capabilities.
Now, this is crazy. Security researchers have discovered a new hack...
Now facebook introduced new “Facebook groups app” on 18 November
Facebook groups app for facebook lovers:
Peoples use facebook to keep contact with friends and family who may live far from them or not. To keep in contact with friends...
Recently Whatsapp Banned users for using Whatsapp Plus Application
OOOOhh cut off with friends due to using watsapp plus :(
i missed my friends , my watsapp plus stop working :`(
...
Mac Malware: Time to test Apple’s Security
Last quarter shows an interestingly spike in malware activity that targeted Mac users only. New samples in the 1st 3 months of this year are nearly equal to the...
Snapchat’s Security break by Steven Hickson
It's all about little bit of simple programming and computer graphics . Snapchat's Security broke by Steven Hickson a programmer as well as a hacker or you can say that every...
How to surf internet Anonymously
Hello friends this post is about how to hide your machine IP for surfing internet Anonymously. To read this may bore you but keep patience because it is important....
ProxyHam : Anonymously Access Wi-Fi from 2.5-Miles Away
Here we will discuss How to Anonymously Access Wi-Fi from 2.5 miles away using Dubbed Proxyham. It's always the matter of discuss when anonymity is in the frame. In...
Memory management in C Programming:Computer Memory
Memory management in C is one of the important topic as it's not only about memory management in c but also about Computer Memory Management. In this section you...
Trick to hack trial version software using RunAsDate utility tool
Here we will discuss a trick about how to hack trial version software in Windows based operating system. It is not exactly hacking of software instead you can call...
18,000 malicious apps are stealing the text messages from your android device
Knowing that there are number of Android apps that are stealing the copies of the text messages received or sent to your device may leave you a bit insecure,...
Exploit Development Process:Moving towards Real world Hacking
Now that we have covered basics of exploit , you are ready to look at real world examples like metasploit . As you all know - vulnerabilities in real...
CamScanner: Google store removed the app as it contains malware
Camscanner is scanner application available in google play and app store. Recently, it is found as a front for disseminating malware on gadgets and has been expelled by Google...
Explore and Search Exploit in Metasploit
Metasploit having a big name, when we talking about security. Metasploit was written in Perl as a portable network tool, In 2007 the Metasploit Freamwork has completely rewritten in...
iOS Malware – YiSpecter
iOS Malware- YiSpecter
Cybersecurity firm Palo Alto has recently discovered a new Malware in Apple named YiSpecter .I don't know what's wrong is going on with Apple as this is...
What is Sandboxing and How it works?
In this article, we will discuss sandboxing, how it works and list of free sandboxing environments, etc. Hybrid analysis, Malware analysis, and Threat analysis, they all use the same technology...
End-To-End Encryption is now on WHATSAPP
On Tuesday,Whatsapp's founder Jan Koum disclosed that all the messages and call which are done through Whatsapp are fully encrypted.Whatsapp is now lot more secure.
All user those who want...