Hacking Wi-Fi Clients for Remote Access Using Rouge Access Point Evil Twin Metasploit, BeEF, Wifiphisher

phone

Hacking Wi-Fi Clients for Remote Access Using Rouge Access Points Welcome back in this Tutorial you will learn how to compromise a device though use of PNL’s. What are PNL’s ? PNL stands for preferred network list, Wireless devices send PNL requests to check if a network is available. The idea is to find all networks the … Read more

Creating Wordlists with Crunch Kali Linux

crunch-kali-linux

Hello welcome back, Today I will show you how to generate wordlists in Crunch using Kali Linux. If you are using a different Operating System or you do not have crunch installed please download it now. Crunch comes pre-installed in Kali Linux in this tutorial we will be using Kali Linux 2017.2 In many of … Read more

Zusy: New PowerPoint Mouseover Based Malware

zusy malware

#Hackers have found a way to download a malicious file when a hover action is performed over a #hyperlink. The interesting fact about this technique is that it did not rely on Macros, JavaScript or VBA for the execution method. This makes it unique as it does not uses normal exploitation methods as most of … Read more

Dvmap: Android-Rooting Trojan with Code Injection Ability

dvmap android rooting trojan

Earlier today Security researchers at Kaspersky Lab released a blog post explaining about an Android-rooting trojan with code injection ability spreading through the Android official play store (Google Play Store). The attackers are using several techniques to hack fool the google’s security framework, earlier this week we have mentioned in our blog post how hackers … Read more

kwetza – Python script to inject existing Android applications with a Meterpreter payload

kwetza-python-script

kwetza – Python script to inject existing Android applications with a Meterpreter payload Kwetza is a tool created by Chris Le Roy (@brompwnie) chris@sensepost.com that allows you to infect an existing Android application with a Meterpreter payload. Kwetza infects an existing Android application with either custom or default payload templates to avoid detection by antivirus. … Read more

10 Youngest Hackers Who Caused Chaos

young-hacker

10 Youngest Hackers Who Caused Chaos

Today we are going to be looking at the 10 youngest hackers who Caused Chaos. When we think of hackers we always think of someone like this.

anonymous

This is not the case and has become a stereotype there are much younger Hackers starting to pop up all over. Today we will list the 10 youngest Hackers that caused Chaos.

  1. Kristoffer Von Hassel
  2. Betsy Davies
  3. CyFi
  4. Youngest Hacktivist
  5. Ryan Cleary and Jake Davis
  6. CoD Hacker
  7. DJ Stolen
  8. Aaron Bond
  9. TeamP0ison
  10. Real Life Ferris Bueller

Anonymous – Web Warriors Full Documentary

anonymous

Anonymous – Web Warriors Full Documentary

Anonymous – Web Warriors Full Documentary focuses on the world famous computer virus Blaster a self-replicating Worm. Blaster was so powerful your Network and Systems could be effected only by having it left online and did not require any additional software to replicate its self through out other computer networks.

SQLiScanner – Automatic SQL injection with Charles and SQLMap API

sqlscanner

Automatic SQL injection with Charles and sqlmap api Download SQLiScanner (Credits 0xbug) – http://0r1.me/SQLiScanner/ Github: https://github.com/0xbug/SQLiScanner Installation Preferably, you can download SQLiScanner by cloning the Git repository: git clone https://github.com/0xbug/SQLiScanner.git –depth 1 You can download sqlmap by cloning the Git repository: git clone https://github.com/sqlmapproject/sqlmap.git –depth 1 SQLiScanner works with Python version 3.x on Linux and … Read more

WiFi-Pumpkin – Framework for Rogue Wi-Fi Access Point Attack

pumpkin

WiFi-Pumpkin – Framework for Rogue Wi-Fi Access Point Attack WiFi-Pumpkin is a very complete framework for auditing Wi-Fi security. The main feature is the ability to create a fake AP and make Man In The Middle attack, but the list of features is quite broad. DOWNLOAD WIFI-PUMPKIN CREDITS P0cL4bs Installation Python 2.7 git clone https://github.com/P0cL4bs/WiFi-Pumpkin.git … Read more

Russian Hackers using Google’s APM Service to hack Gmail Users

gmail hacking campaign

  Everyone is crazy about hacking social media accounts of people, meanwhile, some target social media accounts of celebrities or high ranked officials of the country. Gmail has 1 Billion monthly active users and going on, Gmail is also used for official works by many officials. If such email accounts can be hacked then it can … Read more

Top 10 Hacking Tools

top-10-hacking-tools

Top 10 Hacking Tools Wireshark Wireshark is an open source packet analyzer. It is used to troubleshoot networks, it provides quick and easy network analysis, Originally Wireshark was named Ethereal until May 2016 due to trademark issues. Wireshark is cross-platform and will run on Linux, MacOS, and Windows it uses the Qt widget toolkit to … Read more

How to Hack Web Browsers Using BeEF Framework

beef-xss-1

How to Hack Web Browsers Using BeEF (The Browser Exploitation Framework) What is BeEF? BeEF is short for The Browser Exploitation Framework. It is a penetration testing tool that focuses on the web browser. Amid growing concerns about web-borne attacks against clients, including mobile clients, BeEF allows the professional penetration tester to assess the actual … Read more

Android Malware And The Way You Are Infecting Yourself

android-mobile-1

Android is used by 328 million users worldwide, the operating system has dominated the smartphone market. Android, by 3rd quarter of 2016 covered 88% of the smartphone market. Being so popular, the developers showed huge interest in building applications for the platform, in a result of which, the android play store (google play store) now … Read more

The Social-Engineer Toolkit (SET) v7.6.4 released

social-engineer-toolkit-set

The Social-Engineer Toolkit (SET) v7.6.4 released The Social-Engineer Toolkit (SET) is an open-source penetration testing framework designed to perform advanced and quick attacks against targets SET exploits the human weakness within the system rather then targeting system exploits directly SET relies on trickery and deception SET targets the human error aspect of security. it uses … Read more

EternalRocks: New Malware is Even More Dangerous than WannaCry

Last Few weeks have had a rattling effect on the field of Cyber Security.  Where Security Researcher’s had a hard time for finding solutions to prevent the society from an explicitly dangerous Ransomware WannaCry. The Ransomware So far has affected around 300,000 computers in around 150 countries all over the globe, managing to fund a six … Read more

Around 25 Percent TalkTalk Customers Could Still Be Left With Vulnerable Routers

Up to 25 Percent of TalkTalk UK Customers Could Still Left With Vulnerable Routers Around 25 Percent TalkTalk UK Customers Could Still Be Left Vulnerable Routers Back in late 2016 exploits were found in D-Link DSL-3680 routers provided by TalkTalk. This exploit known as in the Hacker World as PixieWPS exploit left many home owners and … Read more

WannaCry? No Thanks! I have Free Decryption Tool

Wannacry Decrypt

A simple Ransomware which got widely spread around the globe rising tensions around different Cyber Security Firms. The Ransomware so far has made a huge impact by affection around 200,000+ computers around the globe and was able to make 6 digits for the people behind this evil Ransomware. The Ransomware was using an SMB remote … Read more

WannaCry : All You Need To Know About This Trendy Ransomware

wannacry

From the Start of this year, the Ransomware attacks are taking place in different regions around the globe. One such big ransomware which simple peeps into your computer like a boss and asks you WannaCry? Yes true it really does that, How it does? , what the damage caused by this ransomware? everything we are … Read more

Hack Wi-Fi Networks Without Cracking with Wifiphisher

Hack Wi-Fi Networks Without Cracking Wifiphisher

Hack Wi-Fi Networks Without Cracking Wifiphisher Welcome back in the last wireless hacking tutorial we talked a little about hacking WPA/WPA2 passphases using brute forcing methods. In this tutorial Hack Wi-Fi Networks Without Cracking Wifiphisher we will talk about hacking WPA/WPA2 networks without using brute force methods. By creating a Evil Twin access point that … Read more