Category Archives: Information Gathering

The Story Behind Anonymous | The Hacker Wars Documentary

What is Hacktivism? In Internet activism, hacktivism or hactivism (a portmanteau of hack and activism) is the use of technology to promote a political agenda or a social change.   Who are anonymous? The “man without a head” represents anonymity and leaderless organization. Anonymous is a decentralized international hacktivist group that is widely known for its various DDoS cyber attacks against several governments, government institutions and

Read more

10 Most Used Black Hat Hacking Tools | Kali Linux

So, right here I have populated a list of tools used by the most dangerous types of hackers.   Metasploit Framework . Nmap – network mapper. Acunetix WVS – web vulnerability scanner Maltego – powerful reconnaissance. SET – Social engineering toolkit (setoolkit) Nessus vulnerability scanner. Hydra – The powerful brute forcing tool Aircrack-ng – The professional wifi cracker. Wireshark – Packet analyzer.

Read more

Top 15 Tools Used In Cyber Security

  1. John the Ripper John the Ripper is one of the most popular password crackers of all time. It’s also one of the best security tools available to test password strength in your operating system, or for auditing one remotely. This password cracker is able to auto-detect the type of encryption used in almost any password, and will change its

Read more

How to Install OSIF Inside Termux

OSIF is an accurate facebook account information gathering, all sensitive information can be easily gathered even though the target converts all of its privacy to (only me), though the data will still be easy to collect. Sensitive information about residence, date of birth, occupation, phone number and email address. Installation and Using OSIF $ apt-get update $ apt-get upgrade $

Read more

Using SQLmap To Take Over Databases

Sqlmap Sqlmap is one of the most popular and powerful sql injection automation tool out there. Given a vulnerable http request url, sqlmap can exploit the remote database and do a lot of hacking like extracting database names, tables, columns, all the data in the tables etc. It can even read and write files on the remote file system under

Read more

Extract Email, Phone Numbers of Facebook friends with OSIF Tool | Kali Linux

Facebook is one of the biggest companies with a huge user database and that is why it is the first choice for hackers to gather information about a person. Many people on Facebook do not care about privacy and that is the golden point for hackers. The users put their phone numbers, E-mails and make them public. This makes easier

Read more