Tag Archives: hacking

Priceline Open Redirect Hackerone Disclosure

What is open redirection? Open redirection is a type of vulnerability where by a website can redirect the user to any other website, this could be used by an attacker to send someone a malicious link to a legitimate site that redirects them to a fake site that steals credentials or downloads a backdoor to their machine.   Priceline Open

Read more

The Story Behind Anonymous | The Hacker Wars Documentary

What is Hacktivism? In Internet activism, hacktivism or hactivism (a portmanteau of hack and activism) is the use of technology to promote a political agenda or a social change.   Who are anonymous? The “man without a head” represents anonymity and leaderless organization. Anonymous is a decentralized international hacktivist group that is widely known for its various DDoS cyber attacks against several governments, government institutions and

Read more

10 Most Used Black Hat Hacking Tools | Kali Linux

So, right here I have populated a list of tools used by the most dangerous types of hackers.   Metasploit Framework . Nmap – network mapper. Acunetix WVS – web vulnerability scanner Maltego – powerful reconnaissance. SET – Social engineering toolkit (setoolkit) Nessus vulnerability scanner. Hydra – The powerful brute forcing tool Aircrack-ng – The professional wifi cracker. Wireshark – Packet analyzer.

Read more

Top 15 Tools Used In Cyber Security

  1. John the Ripper John the Ripper is one of the most popular password crackers of all time. It’s also one of the best security tools available to test password strength in your operating system, or for auditing one remotely. This password cracker is able to auto-detect the type of encryption used in almost any password, and will change its

Read more

How Cyber criminals Combat & Bypass Antivirus Solutions

In order to infect a computer with malicious software, cyber criminals must either: Force the user into launching an infected file or Try to penetrate the victim’s computer – via a vulnerability within the operating system or any application software that’s running on the machine At the same time, the more professional cyber criminals will also try to ensure their

Read more

Top 10 Linux Distro for Ethical Hacking and Penetration Testing

A security-focused operating system is a hacker’s best companion as it helps them to discover the weaknesses in computer systems or computer networks. Whether you are pursuing a career in Information Security or working as a security professional or you are interested in this specific field of knowledge, you must be known of a decent Linux distro that suits your

Read more

Reverse Engineering .NET Applications With DNSpy

Today, I will be demonstrating how to crack you’re very first crackme. What is a Crackme? A crackme (often abbreviated by cm) is a small program designed to test a programmer’s reverse engineering skills. Where Can I Download Crackmes To Practice? There are lots of crackme websites out there where security professionals can practice there reverse engineering skills, the one I used

Read more

How to Crack Facebook Accounts With FBKiller

Hi, folks, in this post I will be demonstrating how to recover a facebook account with FB killer. This program will attempt to crack a facebook account It has various bypass mechanisms that prevent from being locked out of the account you are recovering. Legal Disclaimer: This tool is not to be used for illegal purposes, hacking into other peoples

Read more

Cross Site Scripting Discovery With XSSPwn

Today, I will be showing you how to automatically test for Cross-Site-Scripting vulnerabilities with a tool I made called xsspwn. How does it work? Xsspwn is a Cross-Site-Scripting Testing tool, It will attempt to Inject payloads into a parameter for testing and when the scan finishes it will output all the potential Injections found. Scan output Brute forcing Sometimes, you need

Read more

How To Test Android Application Security Using Drozer & InsecureBankv2?

Let’s Begin! First of all, we need to forward the connection so type this command using the Android Debug Bridge (ADB) adb forward tcp:31415 tcp:31415 Funny, 31415 is the start of the mathematical constant PI. Now connect to drozer. drozer console connect How to Bypass the Login Screen? To bypass the login screen we first need to get the activity info.

Read more
« Older Entries