Posts

Showing posts from April, 2021

Introduction to OSINT (Open Source Intelligence)

Image
The internet has changed everything around us from education, healthcare, government interactions reaching social communication which receives the greatest impact. The Internet has redefined how people communicate with each other and revolutionized how corporations do business. Nowadays, the majority of world communications happen in what is known as Cyberspace.  According to  c ybersecurity ventures ,  by 2030, 90 percent of the human population, aged 6 years and older will be online, this means more than 7.5 billion Internet users. People now use the internet to purchase goods & services, entertainment, connect with other people, share information and files in addition to using social networking websites to communicate with friends and family members without any geographical barriers.  As the world continues to digitalize, digital societies will produce huge amount of digital data generated from people and business interactions in Cyberspace. Exploiting th...

How to hack Databases Easily

Image
  Hey Noobs! You may have heard of password hacking using various methods such as phishing, brute-forcing but what if you hack an entire Database.!!! Don't it sound amazing and risky at the same time, but don't worry, I won't tell you that it requires a lot of knowledge and in fact, even you are a beginner, you can do this, you are an intermediate, you will find this article really helpful, if you are an advanced hacker, this will ease your work. So, let's get to our point, You might have heard name of sqlmap before. Sqlmap is the best tool to automate XSS (Cross-Site Scripting) and sql injection tool used by hackers worldwide. We will be using sqlmap in this tutorial but not in a traditional way, we gonna live hack an entire database in the simplest way it can be. So, there are some requirements for it, You need a computer or a mobile and a good internet connection with python installed in it. Yes! That's all you want. The first step :- Download DBJACK :- DBJACK is...

How to hack Android Remotely Using Kali/Windows/Mac (Step-By-Step Tutorial)

Image
  Detailed Tutorial On How To Remotely Hack Android Device Note :- Follow each steps carefully then you can successfully do it, but if you get any error. Don't forget to mention it in comments. 1.Download Metasploit-framework If you are on a Linux machine (Kali or Parrot), It comes pre-installed. Else, you can download it on Windows and Mac too from  metasploit.com .  2.Downlaod Ngrok If you don't know what ngrok is, ngrok is a port-forwarding tool which can transfer WAN Connections on LAN. You can download it from  ngrok.com . And sign up for service, you can see further steps on their websites itself to install it. 3.Make your payload Now, comes the main step to finally build our malicious .apk file to send to the victim and hack it. For this, you'll first have to fire up ngrok terminal by this command ngrok tcp 4242 You will get a screen like this one below Here, as you can see my host is 8.tcp.ngrok.io and port is 19466 (This can be different in your device) Lea...

How to scan your home network (or any network) for vulnerabilities

Vulnerability management is a key responsibility of any IT security team or  managed security service provider , and it involves assessing, mitigating (if necessary) and reporting on any security vulnerabilities that exist in an organization’s systems and software. But vulnerabilities can be managed only if they have been discovered and identified, and the way to achieve this is through a comprehensive vulnerability scanning program. What is vulnerability scanning? A vulnerability scanner is an application that identifies and creates an inventory of all the systems (including servers, desktops, laptops, virtual machines, containers, firewalls, switches, and printers) connected to a network. For each device that it identifies it also attempts to identify the operating system it runs and the software installed on it, along with other attributes such as open ports and user accounts. See our picks for  top vulnerability scanning tools  and  top vulnerability management s...