| Learn | Security | Together |
The quieter you become, the more you are able to hear
Monday, September 21, 2015
Top 5 Websites To Learn How To Hack Like A Pro
Free Penetration Testing and Ethical Hacking Training Websites
Best Free Hacking Tutorials Resources to Become Pro Hacker

Sunday, September 20, 2015
15 Resources to learn C# programming for beginners
15 Resources to learn C# programming for beginners
by Prat on August 5, 2015 in Programming
C#
is a general-purpose and an object-oriented programming language and is
widely used in developing enterprise applications. C# was developed by
Microsoft and is the principal
What is a Metasploit
Metaspoit Framework is a open source penetration tool used for developing and executing exploit code against a remote target machine it, Metasploit frame work has the world’s largest database of public, tested exploits. In simple words, Metasploit can be used to test the Vulnerability of computer systems in order to protect them and on the other hand it can also be used to break into remote systems.
Ettercap Tutorial: DNS Spoofing & ARP Poisoning Examples
It features sniffing of live connections, content filtering on the fly and many other interesting tricks. It supports active and passive dissection of many protocols and includes many features for network and host analysis.
Download and Install
Download the install the Ettercap package from Ettercap.You can also install from the mirror as follows:
# apt-get install ettercap-gtk ettercap-commonThis article explains how to perform DNS spoofing and ARP poisoning using Ettercap tool in Local Area Network ( LAN ).
Warning: Do not execute this on a network or system
that you do not own. Execute this only on your own network or system for
learning purpose only. Also, do not execute this on any production
network or system. Setup a small network/system for testing purpose and
play around with this utility on it for learning purpose only.
Ettercap Basics
First let’s learn some basics about Ettercap. Ettercap has the following 4 types of user interface- Text Only – ‘-T’ option
- Curses – ‘-C’ option
- GTK – ‘-G’ option
- Daemon – ‘-D’ option
Launching an ARP Poisoning Attack
We have already explained about why we need ARP and the conceptual explanation of ARP cache poisoning in ARP-Cache-Poisoning. So please have a look into it, and this article will cover how to perform it practically.The following diagram explains the network architecture. All the attacks explained here will be performed on the following network diagram only. Using Ettercap in a production environment is not advisable.
WAN Attacks explained MSF 2015
WAN Attack explained video
https://www.youtube.com/watch?list=PL6pRPNzfppygZULn2zZZDOR_PcXp41imF&v=V6vvLhhhLq0
The Hacks of Mr. Robot: How to Hide Data in Audio Files
A you know, Mr. Robot
is my favorite TV show this year, and not just for the realistic
hacking. Rami Malek, the actor who plays Elliot, is incomparable in his
depiction of a young man with social anxiety who is alienated from a
superficial, materialistic society and wants to make a better world. I
believe we will see a lot more of this actor in coming years.
In addition, the writing is excellent, although some of the depictions of Evil Corp employees, especially Tyrell Wellick, are a bit two dimensional and cliché. Overall, though, this is one of the best TV shows since Breaking Bad!
As
the plot unfolds, it becomes clear that Elliot hacks and doxes the
people in his life (including himself), then stores the information he
finds onto CDs. He then labels them with some classic band label.

Many have wondered why he’d be doing that and how safe would that be?
In addition, the writing is excellent, although some of the depictions of Evil Corp employees, especially Tyrell Wellick, are a bit two dimensional and cliché. Overall, though, this is one of the best TV shows since Breaking Bad!
Many have wondered why he’d be doing that and how safe would that be?
The Hacks of Mr. Robot: How Elliot & Fsociety Made Their Hack of Evil Corp Untraceable
Well, the first season of Mr. Robot
just ended and Elliot and fsociety successfully took down Evil Corp!
They have effectively destroyed over 70% of the world’s consumer and
student debt! Free at last! Free at last!

Of course, global financial markets crashed as well, but that’s
another story.Although there were many elements that made the hack
successful, such as Darlene developing a zero-day exploit (I’ll
Subscribe to:
Posts (Atom)