35.3 C
Delhi
Friday, May 30, 2025
crack password using hydra and burpsuit

How To Crack Web Form Passwords Using Hydra With Burpsuite In Kali Linux

0
In our previous article How To Crack Password Using Hydra In Kali Linux , we have discussed about THC Hydra- A tool for Online Password attacks. In this tutorial we will discuss...
StageFright 2.0 fixed

StageFright 2.0 Fixed: Google released an OTA for Nexus Devices.

0
StageFright 2.0 Fixed Few days back, the researchers warned google of the new Stage Fright Bug. This bug affected more than a billion devices that are running on Android OS. This...
Stage fright Bug 2.0: All Android Devices are Vulnerable to the Bugs

Stage fright Bug 2.0: All Android Devices are Vulnerable to the Bugs

0
Once again the Stage fright vulnerability is back, two new Android Stage fright vulnerabilities are recently disclosed. This time with some new tricks, an attacker can hack the Android Phone...
Phishing malware crashes ICICI bank

Phishing malware crashes ICICI bank

0
#Phshing Malware crashes ICICI bank .... https://t.co/a8vTOVvuob — Buffercode (@buffercoding) February 25, 2016   Official @ICICIBank_Care reply to tweet : @buffercoding Hi, ICICI Bank has a robust & multi-level security system for all its banking...
metasploit Unleashed

Explore into the Metasploit ( a Ultimate Hackers Tool)

0
  Metasploit is a complete and a Ultimate Security tool that provides information about Computer Security Vulnerabilities and also use in penetration testing .It was develop by HD Moore in...
Ten hilarious facts that only programmers can understand

Exploiting buffer overflows using command line

0
After reading our previous post: Next step moving towards exploit:Finding the return address ,it's time to do some command line exploits. So this post is regarding Exploiting buffer...
get into friends whatsapp

How to get into friends whatsapp and send messages

11
I don't know that how to Express this success !!! Everybody knows that hacking is just a creativity and finding the way to get deeper into the code. So...
Basic Linux exploits: Function Calling Procedure

Basic Linux exploits: Function Calling Procedure

0
Note: Hacking is not a joke so please keep patience and learn it step by step. Note: Before reading this post you must read : Learn hacking...

TalkTalk Cyber-attack: Another teenager arrested in London

0
Another teenager arrested in London. This time the British police arrested a 16 year old boy from Feltham in West London in case of TalkTalk data breach. On Monday, Metropolitan Police...
ISIS hackers hacked 54,000 twitter accounts

ISIS hackers hacked 54,000 twitter accounts: Publishing the secret information of CIA Head

0
The year has been bad so far for CIA and other US agencies, now this time ISIS hackers hacked 54,000 twitter accounts which also include the accounts of FBI...

Radio Wave Hack: It allows the hacker to control your phone from 16 feet...

0
Every day we get to know about a different hack and every hack has its own dependencies and capabilities. Now, this is crazy. Security researchers have discovered a new hack...

Now facebook introduced new “Facebook groups app” on 18 November

0
Facebook groups app for facebook lovers: Peoples use facebook to keep contact with friends and family who may live far from them or not. To keep in contact with friends...
whatsapp vs whatsapp plus

Recently Whatsapp Banned users for using Whatsapp Plus Application

0
OOOOhh cut off with friends due to using watsapp plus :( i missed my friends , my watsapp plus stop working :`( ...
Mac Malware: Time to test Mac security

Mac Malware: Time to test Apple’s Security

0
Last quarter shows an interestingly spike in malware activity that targeted Mac users only. New samples in the 1st 3 months of this year are nearly equal to the...
snap chat security break

Snapchat’s Security break by Steven Hickson

0
It's all about little bit of  simple programming and computer graphics . Snapchat's Security broke by Steven Hickson a programmer as well as a hacker  or you can say that every...
Anonymity buffercode

How to surf internet Anonymously

1
Hello friends this  post is about how to hide your machine IP for surfing internet Anonymously. To read this may bore you but keep patience because it is important....
ProxyHam : Anonymously Access Wi-Fi from 2.5-Miles Away

ProxyHam : Anonymously Access Wi-Fi from 2.5-Miles Away

0
Here we will discuss How to Anonymously Access Wi-Fi from 2.5 miles away using Dubbed Proxyham. It's always the matter of discuss when anonymity is in the frame. In...
Memory management in C Programming

Memory management in C Programming:Computer Memory

0
Memory management in C is one of the important topic as it's not only about memory management in c but also about Computer Memory Management. In this section you...
easy method to crack / hack trial version software

Trick to hack trial version software using RunAsDate utility tool

0
Here we will discuss a trick about how to hack trial version software in Windows based operating system. It is not exactly hacking of software instead you can call...

18,000 malicious apps are stealing the text messages from your android device

0
Knowing that there are number of Android apps that are stealing the copies of the text messages received or sent to your device may leave you a bit insecure,...

Exploit Development Process:Moving towards Real world Hacking

0
Now that we have covered basics of exploit , you are ready to look at real world examples like metasploit . As you all know - vulnerabilities in real...

CamScanner: Google store removed the app as it contains malware

0
Camscanner is scanner application available in google play and app store. Recently, it is found as a front for disseminating malware on gadgets and has been expelled by Google...
exploit search in metasploit

Explore and Search Exploit in Metasploit

0
Metasploit having a big name, when we talking about security. Metasploit was written in Perl as a portable network tool, In 2007 the Metasploit  Freamwork has completely rewritten in...
iphone 6s Malware

iOS Malware – YiSpecter

0
iOS Malware- YiSpecter Cybersecurity firm Palo Alto has recently discovered a new Malware in Apple named YiSpecter .I don't know what's wrong is going on with Apple as this is...
Malware analysis sandboxing

What is Sandboxing and How it works?

0
In this article, we will discuss sandboxing, how it works and list of free sandboxing environments, etc. Hybrid analysis, Malware analysis, and Threat analysis, they all use the same technology...

End-To-End Encryption is now on WHATSAPP

0
On Tuesday,Whatsapp's founder Jan Koum disclosed that all the messages and call which are done through Whatsapp are fully encrypted.Whatsapp is now lot more secure. All user those who want...