Hello everyone, this is my first article on this blog. I am Kumar Srinath pursuing my Bachelor’s degree, Patna. I’m fond of programming stuff. Well, you might have read few articles on C programming by Nilesh, I’m just going to take that further providing you with an ample of articles. Today I am going to discuss about control statements. So let’s get started…
There are two types of control statements:
1. Decision control statements
2. Loop control statements Continue reading
Well, most of you might be wondering after reading the title of this article, so firstly let me tell you this. Today I am going to give an introduction to the dark side of internet where there lies no rules, no law enforcement and complete access to the information that is not known to most of the people. We live in a society where people believe that if there is no answer provided by Google then it might have never existed, but what if I tell you that the internet what you see is just 1% of the actual web. There lays information hidden to people, which is nearly 10,000 terabytes, which is 500 times larger than the web we see (Surface web). The figures are taken from a research conducted Bergman in 2001. Currently the deep web is much wider than the figures above.
In this article I will be discussing the truth behind the Dark Web. It is also known as the Invisible Web or Hidden Web. Continue reading
Hello guys, it’s been a quite long time I have delivered you some good stuff, so today I decided to write about hacking Facebook accounts by phishing. Generally, phishing is stealing usernames and passwords using a fake page. Suppose, you want to hack a victim’s Facebook account, so you create a page which looks very similar to facebook and host it somewhere so that your victim can login. When the victim tries to log into his account, he is redirected to the given page and his credentials are sent to you through an email or simply get recorded in some text file.
Today we are going to create a Facebook phishing using simple HTML and PHP coding. Let’s get started..!!! Continue reading
Hello guys, it’s been a long time I have put the courses page on this blog but I wasn’t able to start courses because I was out of time. So finally I decided to buy some time to start courses. Actually it’s also been a month I have written an article here, this is because I am working on Windows applications development since few weeks. I am planning to make some sort of port scanners, keyloggers and brute forcer in C#. And recently I have started another blog too, for putting my Windows application’s source code over there.
So coming to the topic, I have finalized the date for starting the Ethical Hacking course on our blog. Continue reading
Hello guys! I have been working on PostgreSQL database and attempting to attack it since a few days.
The reason for this is, I want to get access to my college database and gain some juicy information.
So what I did firstly is I scanned the entire network for open ports using nmap. Since I’m using
Kali Linux, it is directly available from the terminal by typing nmap. You can scan a server and
get a list of open ports and the services running at it just by typing, nmap -sV [ip_address].
The above command scans the entire 1024 trusted ports in the victim’s computer and gives a list of open
ports, services running at the ports. The programs that run at a particular port are known as daemons. Continue reading
Hello buddies! Today I am sharing some review on the latest pen-testing tool Kali Linux which is funded and developed by Offensive Security. It seems to have a great success. They have made this a complete new brand because they have many bug issues with BackTrack and to sort them all they had to re-write the whole software.
Here is some more information about Kali Linux. Continue reading
Hey guys, today I thought to talk about a vulnerability which is found on MySQL and MariaDB databases. I have surfed and went through a lot of written stuff to get a proper understanding about this vulnerability. Actually I was completely unaware of this stuff! I came knew about this when I just scanned my college’s Online Information System (OIS) and I got an alert saying “MySQL/MariaDB sql/password.c is vulnerable”. When I researched over this topic, I have come up with a notion to hack into my college’s information systems. Well, I will let you guys know once I successfully perform that, but right now I’m on a vacation so I’ll give a try when I move back. Continue reading