Dark Net… Best Darkweb Links 20 Nov 201724 Jul 2020 Disclaimer: We are not responsible for anything you may access or view on the darkweb. This post is for educational purposes. Please be cautious and enter at your own risk,…
Dorking… Google Dorking 16 Nov 201720 Nov 2017 As you all know Google is the most popular search engine in the world. Google serves almost 80% of the search queries on the internet. It itself a big achievement. By doing power…
AppSec… OWASP Security Shepherd – Security Misconfiguration – Solution – LSB 2 Nov 201712 Dec 2019 Welcome back to another OWASP Security Shepherd solution. This challenge is called Security Misconfiguration. So we are given a Username and Password field and we can get the result key…
AppSec… you.dj Unlock The Sampler 30 Oct 201710 Aug 2018 If you've ever used the DJ application you.dj as a normal user you will have used the sampler to add various sounds to your mixes. But as a normal user…
Entertainment… KRACKing WPA2 19 Oct 201719 Oct 2017 Our main attack is against the 4-way handshake of the WPA2 protocol. This handshake is executed when a client wants to join a protected Wi-Fi network, and is used to…
AppSec… Owasp Security Shepherd – Poor Data Validation – Solution – LSB 8 Sep 201710 Jun 2019 Welcome hackers to a new OWASP Security Shepherd solution. The challenge in question is the Poor Data Validation and this happens when data is only checked on the client side.…
AppSec… How to Hijack Web Browsers Using BeEF 28 Aug 20177 Nov 2017 Welcome back my fellow hackers! Today we’re going to be introducing a new tool for hacking web browsers. Often times, we will need to exploit a variety of vulnerabilities associated…
AppSec… Security Shepherd Solutions 20 Aug 201715 Oct 2018 The OWASP Security Shepherd project is a web and mobile application security training platform. Security Shepherd has been designed to foster and improve security awareness among a varied skill-set demographic.…
Dark Net… How Elliot & Fsociety Made Their Hack of Evil Corp Untraceable 17 Aug 201717 Aug 2017 Welcome back, my tenderfoot hackers! Well, the first season of Mr. Robot just ended and Elliot and fsociety successfully took down Evil Corp! They have effectively destroyed over 70% of the world's…
Entertainment US government subcontractor leaks confidential military data 5 Jan 20175 Jan 2017 The leak exposed personal data including Social Security numbers to the assigned posts of critical members of the US military, some of whom hold the highest levels of security clearance.…
Education… How To Use Netcat to Establish and Test TCP and UDP Connections 25 May 20162 Dec 2019 Introduction Linux is known for having a great number of mature, useful command line utilities available out of the box in most distributions. Skilled system administrators can do much of…
Entertainment Hacker fans give Mr. Robot website free security checkup 24 May 201624 May 2016 The USA Network show Mr. Robot has drawn a good deal of praise for its accurate (relative to other TV shows) portrayal of hacking and computer security. So, naturally, the…
Android… Resources for Rooting your Android Device 11 May 201625 Jun 2020 As Android matures, the wide-open style of root access we may have grown used to with legacy versions has gone away. Because Android is designed for mobile devices, the focus…
#Metasploit… Metasploit for the Aspiring Ethical Hacker, Part 1 1 Mar 201614 May 2019 Metasploit was developed by HD Moore as an open source project in 2003. Originally written in Perl, Metasploit was completely rewritten in Ruby in 2007. In 2009, it was purchased…
#career… Sniffing Access Points and Mac Addresses Using Python 4 Feb 201625 Aug 2019 Well, once again it’s time to do something interesting using python and reveal the power of python programming. We will learn how to use a library in python called Scapy.…
#Metasploit… Exploring the Hacker Tools of Mr. Robot 15 Sep 201525 Aug 2019 Over the years the most famous hacking tool that has made it into the movies is Nmap. When producers of a movie actually try to put a dose of reality…