Friday, June 23, 2017
Dual Boot Kali and windows 10

Dual Boot Kali 2.0 and Microsoft Windows 8, 8.1, 10

Dual Boot Kali 2.0 and Microsoft Windows 8, 8.1, 10 The most popular Kali Linux was released on last week at DefCon 23 in Las Vegas.Kali is successor of Backtrack based on...
Step-by-Step Guide to Install Kali 2.0 Linux in VMware workstation 11

Step-by-Step Guide to Install Kali 2.0 Linux in VMware workstation 11

The New Kali 2.0 codename as Kali Sana, is an open-source penetration testing platform having pre-installed hundreds of Hacking ,Reverse Engineering, Forensics and Penetration Testing tools. Kali 2.0 was redesigned user interface...
Kali Linux

Managing Kali Linux Services

Managing Kali Linux Services   Kali Linux is a specialized Linux distribution aimed to test Network. The default Kali installation comes with several services preinstall like SSH, HTTP, MySQL, etc. These services would...
final Wifi crack

Hack WPA2 Encrypted Wi-Fi Networks using Aircrack-ng

Hack  WPA2 Encrypted Wi-Fi Networks using Aircrack-ng | Kali-Linux Hello friend ,In this article I will demonstrate how to crack or hack some one's WiFi Network just in simple steps ,for this...
Format string exploits

Format string exploits

Format string exploits became public in late 2000. It is easy to find errors in format string in comparison of buffer overflows. Once errors are spotted, they are usually eradicated(removed) quickly....
pentestbox , pentest box

PentestBox: A Portable Penetration Testing Distribution for Windows Environments

Download SourceForge                                              Download Torrent PentestBox is a portable penetration...
metasploit Unleashed

Explore into the Metasploit ( a Ultimate Hackers Tool)

  Metasploit is a complete and a Ultimate Security tool that provides information about Computer Security Vulnerabilities and also use in penetration testing .It was develop by HD Moore in 2003 using...

Exploit Development Process:Moving towards Real world Hacking

Now that we have covered basics of exploit , you are ready to look at real world examples like metasploit . As you all know - vulnerabilities in real world are...
Exploit Shell code using Command-line

Exploit using shell code from command line

After reading our previous post:Exploiting buffer overflows using command line it's time to do Exploit Shell code using Command-line but I think you do want to clear your doubt of previous...
Sound-Fix in Kali

Important things to do after installing Kali Linux

There are small set of important softwares that are required after installation of Kali Linux. Linux operating system is not too much user friendly but it is highly flexible operating system....
How to Install Kali without any Problem

Complete Guidance to Install Kali linux in Dual Boot Mode without any Problem

Before start Complete Guidance to Install Kali linux in Dual Boot Mode without any Problem remember it's slogan:- The Quiter you become ,the more you are able to hear Do you want to...

How has open source changed the way students learn new technology

Open-Source Software (OSS):                                                   is computer software with...

Latest tech trends (Internet of Things -IoT , mobile app development , cloud/distributed computing)

  The Internet of Things? The Internet of things, also known as the Internet of objects, refers to the networked interconnection of everyday objects. The Internet of Things, or IoT, is emerging as the...
Basic Linux Exploits : Moving towards exploit

Basic Linux Exploits: Moving towards exploits

Note: Hacking is not a joke so please keep patience and learn it step by step. If you have read all our previous posts , you are ready to exploits the system. So...
Bacic Exploits : Stack Operations

Basic Exploits : Stack Operations

Note: Hacking is not a joke so please keep patience and learn it step by step. Stack Operations First and the most important topic to learn the basics of Exploits is Stack Operations...
Lava Iris Selfie 50 Affordable 5 inch HD Smartphone

Lava Iris Selfie 50 Affordable 5 inch HD Smartphone

Lava Launched it new Lava Iris Selfie focused smartphone is 5-inch HD display smartphone loaded with Android KitKat version 4.4.2.Lava Iris powered by 1.2GHz Quad Core Processor and 1GB of RAM...

How to secure your account from phishing attacks on Internet

Note: Instead of using backtrack use Kali Linux | Rebirth of BackTrack, the Penetration Testing Creating Phishing page to know the safety cautions on Internet To know the cautions we must know how to...
BBM Blackberry new privacy : timer and restrict message

BBM BlackBerry now features timer just like Snapchat

Here is a good news for all BBM ( BlackBerry Messenger) Lovers, new Privacy features update which is live by BBM BlackBerry Application for all Android, ios or windows device. Now you...