Category Archives: Phishing

The Story Behind Anonymous | The Hacker Wars Documentary

What is Hacktivism? In Internet activism, hacktivism or hactivism (a portmanteau of hack and activism) is the use of technology to promote a political agenda or a social change.   Who are anonymous? The “man without a head” represents anonymity and leaderless organization. Anonymous is a decentralized international hacktivist group that is widely known for its various DDoS cyber attacks against several governments, government institutions and

Read more

How Cyber Criminals Fish For Passwords From Their Phone

What is Phishing? A Phishing attack is an attack vector used by cyber criminals to clone a legit site that has malicious code injected into it that steals a users password. Once the victim clicks on the link they are sent to the hackers website when the victim types in there password, it is then hijacked by the attacker.  

Read more

10 Most Used Black Hat Hacking Tools | Kali Linux

So, right here I have populated a list of tools used by the most dangerous types of hackers.   Metasploit Framework . Nmap – network mapper. Acunetix WVS – web vulnerability scanner Maltego – powerful reconnaissance. SET – Social engineering toolkit (setoolkit) Nessus vulnerability scanner. Hydra – The powerful brute forcing tool Aircrack-ng – The professional wifi cracker. Wireshark – Packet analyzer.

Read more

Top 15 Tools Used In Cyber Security

  1. John the Ripper John the Ripper is one of the most popular password crackers of all time. It’s also one of the best security tools available to test password strength in your operating system, or for auditing one remotely. This password cracker is able to auto-detect the type of encryption used in almost any password, and will change its

Read more