Breaking News

Who IS White And Black Hat Hacker

    Hackers are not so much much cynic, Some are ethical and some are chronic, We are ethical means , full of ethics, We are authorised not misuse our hacking tricks, Our aim is to target the victim, Especially the black hat hacker,whose intention …

Read More »

WORK OF HACKER

Work of hacker

      As you know hackers are anonymous, That’s why they are very famous, They do what they like, So,they can hack facebook,twitter an hike, Don’t give challenge to hacker, They are more dangerous than crackers, Hacker steals the information , Cracks the password …

Read More »

Who is hacker

  Hackers took technology at an extreme height, But some are black and rest are white, White hat hackers have always right thinking, But black  hat have always feeling of embarrassing, Some hack for fun, some for duty, white hat hacker is the medium to …

Read More »

FOOTPRINTING ★

Today topic is footprinting, How its working now we are talking, Network,website,server all these r parts of footprinting, & not 2 forget the information gathering & social engineering, Footprinting is just to trace the victims, & let the target permanently grim, First part of hacking …

Read More »

Penetration Testing Tools in Kali Linux

Penetration Testing Tools in Kali Linux

Many companies are providing Penetration testing services and developing own it security audit and testing tools. Those tools are helpful to perform pentesting. Here I used Pentesting actually Pentesting, pen testing, and pentest are belongs to penetration testing, and some time pen test. Many institute …

Read More »

Mutillidae Part 2: Command Injection Database Interrogation

Command Injection in mutillidae

Web Penetration Testing Mutillidae Part 2: Command Injection Database Interrogation  What is Mutillidae? Mutillidae is  a free, open source, Vulnerable Web-application provide a target for Web-Security analyst. It have OWASP-Top10 Vulnerability, and designed by OWASP. What is command Injection? Command Injection is a web-vulnerability that …

Read More »

Watch Dragon ball super