Metasploit : Mobile Hacking
Hack Smart Phone Using Kali(Remotely)
Hello Hackers,
This is a tutorial explaining how to hack smart phones with kali.
STEP 1: OPEN KALI/PARROT:
# Open up your terminal...
Shellphish : A Phishing Tool
Shellphish is a tool used for phishing attacks, this tool offers phishing templates of more than 18 famous websites.
NOTICE: This article is for educational...
Latest Bluetooth hacking techniques expose new attack vectors for hackers
BlueBorne is a vulnerability discovered in several Bluetooth implementations.
Btlejacking relies on the jamming vulnerability tracked as CVE-2018-7252 and affects BLE devices with...
Best Hacking Documentaries That You Should Watch Right Now
In order to become an ethical hacker in the 21st century, you should know some coding laterally with good inspiration.
Crunch: Password Attacks
A crunch is a tool that is used to generate the wordlist, the wordlist is generated with all possible permutations and combinations, in which...
Hackers Leak Personal Data from Hundreds of German Politicians On Twitter
Germany has been hit with the biggest hack in its history.
A group of unknown hackers has leaked highly...
Setup Proxychains in Linux
What is Proxychains?
Proxychains is a tool that forces any TCP connection made by any given application to go through proxies like TOR or any...
Deep Web : How To Access it ?
Introduction:
There are many types of web ! but some of the main on which i will focus on my blog are:
1. Surface Web
2. Dark...
Database Hacking : Sql Injection
SQL injection is a very common technique for hacking web applications, SQL injection can easily destroy the database of the website.
SQL injection is the...
Smart Bulbs: Next big target for cyberattacks?
Researchers at UTSA have recently discovered that invisible wave spectrum in smart bulbs which come equipped with infrared abilities can be taken advantage of...