. . .

Welcome To Hacking Playground

Top 10 Linux Distro for Ethical Hacking and Penetration Testing

A security-focused operating system is a hacker’s best companion as it helps them to discover the weaknesses in computer systems or computer networks. Whether you are pursuing a career in Information Security or working as a security professional or you are interested in this specific field of knowledge, you must be known of a decent […]

Advertisements

Dragonblood – WPA3 Wifi Vulnerability Allows Hackers To Steal Wifi Password

Security researchers discovered new vulnerabilities in the WPA3-Personal protocol which allow potential attackers to crack Wi-Fi network passwords and get access to the encrypted network traffic exchanged between the connected devices. According to a press release from the Wi-Fi Alliance, the devices impacted by these security vulnerabilities in the WPA3 Wi-Fi standard “allow collection of side channel information on […]

Syncing Your Hard Drive To Mega Cloud

Welcome, if you have clicked on this link, then you are either curious on how to sync your hard drive to the cloud or you have lost all your files once before and would like to know how to use the cloud to back up all your files, you have come to the right place […]

Phishing For Passwords Using Ngrok & EvilPhisher

This post talks about how hackers can creating malicious pages to phish for passwords What is Phishing? Phishing is where a malicious person clones a website and injects a malicious php script that allows them to capture the post request which contains the username/password. How Complex is it? Phishing is such an easy way to […]

Learn How Crackers Phish For Serial Numbers

Today, I will show you how to reverse engineer software to find the serial number. Let the cracking begin. The first thing we need to do is a debugger, the one I’m using is  x64dbg. What we need: Debugger (x64dbg or ollydbg) The crackme. All these can be downloaded below: Download Debugger Download Crackme Attach […]

Reverse Engineering .NET Applications With DNSpy

Today, I will be demonstrating how to crack you’re very first crackme. What is a Crackme? A crackme (often abbreviated by cm) is a small program designed to test a programmer’s reverse engineering skills. Where Can I Download Crackmes To Practice? There are lots of crackme websites out there where security professionals can practice there reverse engineering […]

How to Crack Facebook Accounts With FBKiller

Hi, folks, in this post I will be demonstrating how to recover a facebook account with FB killer. This program will attempt to crack a facebook account It has various bypass mechanisms that prevent from being locked out of the account you are recovering. Legal Disclaimer: This tool is not to be used for illegal […]

Cross Site Scripting Discovery With XSSPwn

Today, I will be showing you how to automatically test for Cross-Site-Scripting vulnerabilities with a tool I made called xsspwn. How does it work? Xsspwn is a Cross-Site-Scripting Testing tool, It will attempt to Inject payloads into a parameter for testing and when the scan finishes it will output all the potential Injections found. Scan output […]

How To Test Android Application Security Using Drozer & InsecureBankv2?

Let’s Begin! First of all, we need to forward the connection so type this command using the Android Debug Bridge (ADB) Funny, 31415 is the start of the mathematical constant PI. Now connect to drozer. How to Bypass the Login Screen? To bypass the login screen we first need to get the activity info. Now lets […]

Android Exploitation Setting up the Lab

I will be demonstrating today how to setup drozer and inseucrebankv2 for android exploitation. Prerequisites: I’m going to assume you have Kali Linux setup in a virtual machine, and you know the basics of Kali. Let’s Begin Type in the following command to install drozer. Now type in this command to install ABD (Android Debug Bridge). […]

%d bloggers like this: