Yet now I have never started any series on any topic. So I thought, it would be good to post a series on something like a tutorial on Python for beginners. Python is the language for hackers. It is simple and flexible hence anyone can easily understand and start programming. It supports major and most of the platforms. With Python you can avoid the most irritating things that you would come across while programming in C, that is, pointers. You can avoid the whole memory management while you are working with Python, but yet it is a powerful language which can be used for exploit development, further to design and build security tools. Continue reading
I got few mails asking for some tricks to access restricted websites in college or office Wi-Fi without using proxy. Generally, if you use proxy to access some website then it might take you some more time to load the page than usual, but a VPN connection rather will improve your speed. In this article I will be helping you to set up a free VPN account for unlimited access to often blocked websites like Torrents, Facebook and YouTube. Continue reading
Hello everyone, this is my first article on this blog. I am Kumar Srinath pursuing my Bachelor’s degree, Patna. I’m fond of programming stuff. Well, you might have read few articles on C programming by Nilesh, I’m just going to take that further providing you with an ample of articles. Today I am going to discuss about control statements. So let’s get started…
There are two types of control statements:
1. Decision control statements
2. Loop control statements Continue reading
Well, most of you might be wondering after reading the title of this article, so firstly let me tell you this. Today I am going to give an introduction to the dark side of internet where there lies no rules, no law enforcement and complete access to the information that is not known to most of the people. We live in a society where people believe that if there is no answer provided by Google then it might have never existed, but what if I tell you that the internet what you see is just 1% of the actual web. There lays information hidden to people, which is nearly 10,000 terabytes, which is 500 times larger than the web we see (Surface web). The figures are taken from a research conducted Bergman in 2001. Currently the deep web is much wider than the figures above.
In this article I will be discussing the truth behind the Dark Web. It is also known as the Invisible Web or Hidden Web. Continue reading
Hello guys, it’s been a quite long time I have delivered you some good stuff, so today I decided to write about hacking Facebook accounts by phishing. Generally, phishing is stealing usernames and passwords using a fake page. Suppose, you want to hack a victim’s Facebook account, so you create a page which looks very similar to facebook and host it somewhere so that your victim can login. When the victim tries to log into his account, he is redirected to the given page and his credentials are sent to you through an email or simply get recorded in some text file.
Today we are going to create a Facebook phishing using simple HTML and PHP coding. Let’s get started..!!! Continue reading
Hello guys, it’s been a long time I have put the courses page on this blog but I wasn’t able to start courses because I was out of time. So finally I decided to buy some time to start courses. Actually it’s also been a month I have written an article here, this is because I am working on Windows applications development since few weeks. I am planning to make some sort of port scanners, keyloggers and brute forcer in C#. And recently I have started another blog too, for putting my Windows application’s source code over there.
So coming to the topic, I have finalized the date for starting the Ethical Hacking course on our blog. Continue reading
Hello guys! I have been working on PostgreSQL database and attempting to attack it since a few days.
The reason for this is, I want to get access to my college database and gain some juicy information.
So what I did firstly is I scanned the entire network for open ports using nmap. Since I’m using
Kali Linux, it is directly available from the terminal by typing nmap. You can scan a server and
get a list of open ports and the services running at it just by typing, nmap -sV [ip_address].
The above command scans the entire 1024 trusted ports in the victim’s computer and gives a list of open
ports, services running at the ports. The programs that run at a particular port are known as daemons. Continue reading