36.9 C
Delhi
Wednesday, April 24, 2019

A new Zero-Day vulnerability in recently patched Flash Player

It seems to be no benefits of fixing the issues in its latest patch that was released by Flash Player yesterday. Adobe is trying its best to make the Flash...

Exploit Development Process:Moving towards Real world Hacking

Now that we have covered basics of exploit , you are ready to look at real world examples like metasploit . As you all know - vulnerabilities in real...
The Pirate Bay Four

“The Pirate Bay Four” Acquitted In Criminal Copyright Case

The Founders of Pirate Bay - Gottfrid Svartholm, Fredrik Neij, Peter Sunde and Carl Lundström were acquitted (Free from charge) by a Belgian court Thursday of charges alleging criminal copyright infringement and...
Basic Linux exploits: Function Calling Procedure

Basic Linux exploits: Function Calling Procedure

Note: Hacking is not a joke so please keep patience and learn it step by step. Note: Before reading this post you must read : Learn hacking...
Guccifer hacker extradited to the US

Guccifer hacker extradited to the US

Guccifer is a egregious Romanian hacker,whose real name is Marcel Lazar Lehel has been permitted to abandon to the United States to face Computer Intrusion and Identity theft charges...

Stone tether smallest tracking device finds your lost items

Stone tether smallest tracking device: Technology has made life easier if you fail to remember something. A new device is becoming to discover your lost items. Its name is stone...

End-To-End Encryption is now on WHATSAPP

On Tuesday,Whatsapp's founder Jan Koum disclosed that all the messages and call which are done through Whatsapp are fully encrypted.Whatsapp is now lot more secure. All user those who want...
Baidu SDK Bug

Baidu SDK Bug: Puts over 100 Million devices at risk

Researchers recently found that Baidu’s software development kit (SDK) is vulnerable to a bug that can allow the hacker to gain the backdoor like access to a user’s device....
Anonymity buffercode

How to surf internet Anonymously

Hello friends this  post is about how to hide your machine IP for surfing internet Anonymously. To read this may bore you but keep patience because it is important....
Ten hilarious facts that only programmers can understand

Exploiting buffer overflows using command line

After reading our previous post: Next step moving towards exploit:Finding the return address ,it's time to do some command line exploits. So this post is regarding Exploiting buffer...
British Intelligence Agency can hack any Smartphone.

British Intelligence Agency can hack any Smartphone.

Yes it is true, British Intelligence agency has the power to hack any Smartphone in the World. This fact was disclosed by former NSA contractor Edward Snowden, he told...
Tor

How to surf web anonymously ??

Continue with our previous post How to surf web anonymously ...... Today i am going to tell you one of the best solution to surf web anonymously... In my personal point...
ios 9.0.2 bypass

IOS 9.0.2 fixes the Lock screen ByPass Bug

IOS 9.0.2 fixes the Lock screen Bypass Bug After the launch of its latest version of iOS, Apple has rolled out two minor updates for its operating system (iOS9.0.1 and...
android banking trojan

Android Banking Trojan Hiding In Apps Under Different Names: Targeting over 420 apps worldwide

Beware if you recently have installed any funny video application from Google Play Store as it may contain android banking Trojan. Most of the people love to watch funny videos...
How to Choose a Router for Your Business

How to Choose a Router for Your Business

If you think that choosing a router for your business is an easy task, you have no idea how wrong you are. It is not like choosing a standard...
best compiler for c / c++

Basic Linux Exploits:Make your Pc more secure

Basic Linux Exploits:Make your Pc more secure and learn the basics of computer world Why study Exploits? Before learning exploits ,one should know about vulnerability.What does it means in the world...
exploit search in metasploit

Explore and Search Exploit in Metasploit

Metasploit having a big name, when we talking about security. Metasploit was written in Perl as a portable network tool, In 2007 the Metasploit  Freamwork has completely rewritten in...
easy method to crack / hack trial version software

Trick to hack trial version software using RunAsDate utility tool

Here we will discuss a trick about how to hack trial version software in Windows based operating system. It is not exactly hacking of software instead you can call...
Install Honeypot in Kali-4

How to Install Honeypot on Kali Linux

In this article we will show how to install Honeypot in Kali Linux. The Pentbox is Security suite that can be use for penetration testing to perform various operations. The...
crack password using hydra and burpsuit

How To Crack Web Form Passwords Using Hydra With Burpsuite In Kali Linux

In our previous article How To Crack Password Using Hydra In Kali Linux , we have discussed about THC Hydra- A tool for Online Password attacks. In this tutorial we will discuss...
VDI

VDI Deployment Mistakes

Firstly, we should know about VDI. It stands for Virtual Desktop Infrastructure. It is a practice which hosts desktop operating system within a Virtual Machine (VM) running on a...
Adware,, Android Virus, Android malware

9 Million Google play users infected by Adware (Android Virus)

Adware (Android virus) Adware is a type of malware that automatically shows advertisement, banner or pop up on user's mobile or computer. Adware or we can say these type android...
Loki Botnet, malware, Security Threat, Loki, Botnet

Loki Got an upgrade – Loki Botnet new varient Detected

Loki Botnet (Malware) works in the same way as Marvel's Villen cum hero works (Trick the user and steal the information). Loki botnet, A bot (malware) which was detected...
Sound-Fix in Kali

Important things to do after installing Kali Linux

There are small set of important softwares that are required after installation of Kali Linux. Linux operating system is not too much user friendly but it is highly flexible...

An Almost Impossible To Detect Phishing Attack Using Punycode

In our previous article How to secure you account from phishing page, we discussed about how to create and detect whether a page is a phishing page or original...
Hacking with Android Smartphone using zANTI 2

Hacking with Android Smartphone using zANTI2

Download zANTI 2.2(Apk) Hacking with Android Smartphone using zANTI2 zANTI2 is a Network Analysis and penetration suit developed by ZImperium family as a software developer and researcher, the name zANTI2 comes...