Articles
Internet comes with full of productivity & entertainment solutions. Being anonymous is...
Many times pentesters/ security researchers needs to scan URLs or they need to do penetration...
Windows is the most popular operating system. Because of its easy usability, easy to...
ANDROID ARCHITECTURE – Hardware Components :- Hardware components interact with the drivers...
Earlier in part I we have shown adb hacks which are used in testing or foot printing phases. That...
Different automation & manual tools/ techniques are used in pentesting. Considering on the...
BABYSPLOIT INTRO:- Babysploit is a pentesting tool kit used in initial phase of pentesting....
Steganography is a common term that is used in hiding or encrypting any personal information. The...
According to the ethical hacking researcher, the backdoor is malware that is used to break the...
According to ethical hacking courses, metasploit is the most popular tool used in pentesting....
WhatsApp, a very popular mobile application used for chatting, sharing different types of files....
Phishing attacks are very common these days. Most large companies face phishing attacks....
JOHN THE RIPPER:- John the Ripper is a password cracker tool, that tries to detect weak...
There are many tools used to crack Wifi access points. Most of the Wifi authentication uses...
Windows shell is what, every hacker loves. Various Windows payloads are designed to bypass...
TWOFI:- Twofi was written by Robin Wood at DigNinja. This tool can be used to grab the contents...
As per ethical hacking consultants, malware has been around in the Internet world forom long...
CRUNCH INTRO:- While cracking the password, the attacker always needs a wordlist. Normally,...
DNSENUM. Dnsenum which is used to gather information about the target. Quite similar to (DIG)...
WEB APPLICATION FIREWALL BASICS:- WAF (Web application firewalls) plays an important role in...
Pentesting is all about showing and reporting problems in web/mobile applications. This is the...
MALTEGO INTRO:- According to ethical hacking courses, Maltego is a tool used in information...
ENUM4LINUX:- Enum4linux is used to extract information from Windows and samba hosts, ethical...
Social engineering has always been on top list in hacking world. The most simple and efficient...
Data breaching in these days have been common. Many of the popular websites are targeted at data...
DNSMap: DNSMap is a tool used to gather subdomains & information of subdomains for a target...
SHODAN:- Shodan is a scanner that finds devices connected over the internet. Shodan can find...
Wifi networks are day to day getting popular because of the large demand of internet users....
There are many tools available that can find exploits. These tools more often work in an...
OSINT (Open Source Intelligence) is a way to collect data from public sources. There are many...
Information gathering is not an easy task. In many phases, the pentester has to go through many...
Scanning is the initial phase of pentesting. Security researchers/ pentesters are very well aware...
WPSCAN:- WPScan finds vulnerabilities in wordpress websites. This tool is known for scanning...
Android is an open-source platform where any individual developer can implement ideas into an...
Everyone knows about phishing pages and its cause. Phishing pages are spoofs of original web...
Core dumps or memory dumps are created when the program is executed. A dump consists of modules...
Social Engineering attacks still work. Most of the attackers use social engineering methods to...
Using Metasploit is not a difficult thing anymore. Because there are many resources available...
Sniffing is an essential phase in pentesting. Many times security researchers/ pentesters want to...
X (Twitter) is the most popular social network platform nowadays. On X (Twitter) users post their...
The Internet is the hub of web applications. Many past developers have made numerous web...
There are many tools which are used in gathering information. These tools gather information but...
You normally use Google to find anything online. Google is the most widely used search engine...
Aircrack-ng is the most popular way for hacking wifi passwords. However, this method takes a...
Phishing is what most victims fall into the trap of fake pages. There are many methods for...
Regular updates of any operating system are a good maintenance option. It not only keeps...
Hacking is getting day by day easier. Many independent security professionals are developing...
Distributed denial of service attack is a popular attack used to target any website to make them...
Nowadays internal & external networks are not secure, according to ethical hacking...
As per ethical hacking investigators, Tor is very popular for being anonymous over the internet....
Whenever you open your email ID, you can probably see lots of unknown emails with unknown URLs....
WHAT IS SHIP SATELLITE COMMUNICATION? According to the ethical hacking researcher at the...
Everyone would have been well-known for capturing network packets using analyzer tools. But very...
INTRODUCTION:- In this digital era, our information is more public than private. The massive...
Different users have their requirements for using any application. For finding any good...
Mobile has become a more important part of our life. No one can live without their mobile...
Surveillance which is done by Government Organizations/ Law enforcement for the security of the...
AUTOMATER:- Automater is a tool to analyze URL, IP, and MD5 hash for intrusion analysis....
According to experts in security audits, from the May update of 2019, Windows Sandbox is...
In some phases of information gathering. A Pentester is required to scan some of the IP addresses...
Many open-source developers want to show their skills by developing web applications. Every...
What is ONIOFF:- Onioff is a tool written in Python. It basically inspects the deep web URLs or...
In most cases, pentesting is done manually. Where pentester uses all the tools available over the...
The KillShot tool can crawl target web applications and find backend web technologies, identify...
There are many tools used by network administrators to scan networks. Continuous network scanning...
MEDUSA INTRO:- Medusa is used to brute force using the IP address and the hostname. It generally...
MITM INRO:- MITM (Man in the middle attack) is another method where attackers sniff the running...
As per ethical hacking experts, the Internet is full of anonymous things. A lot of users surf the...
As per ethical hacking professionals, Nbtstat is a network tool that is used to check the running...
Information gathering is a crucial part of exploiting any website. Many tools are available...
A tool available to any user OnionShare appeared in 2017 and, according to network security...
There are many tools for pentesting that are commonly used by pentesters and by security...
Information gathering is a long process in pentesting. Various tools gather information from...
NETBIOS ENUMERATOR:- Netbios suggested how to use remote network support. Netbios enumerator...
SPARTA INTRO:- Sparta is the GUI (Graphical User Interface) Kali application used in information...
METAGOOFIL INTRO:- Metagoofil is a tool designed to gather information like public documents...
Social engineering is a trick to enter credentials on malicious web pages by manipulating human...
Shodan is very popular to search for vulnerable devices over the internet. As Shodan ping all the...
We have shown many scanning tools where you can gather a lot of information about your target, in...
Email spamming has been most common for the last 10-20 years. There are many individuals or...
In today’s digital life privacy matters a lot for any user. Especially, if the user is surfing...
INFOGA INTRO:- Infoga is the tool designed for gathering the email information of the...
TOR EXIT RELAY SCANNER:- As we all know Tor is used for anonymous communication in an anonymous...
Trape Intro:- Trape is an OSINT (Open Source Intelligence Tool) a tracking tool in which you can...
Pentesters/ security researchers use many devices for testing their hacking skills or finding new...
XSS-Shell Intro:- XSS Shell framework uses cross-site scripting to get a reverse shell. To attack...
The Internet is full of new features. Nowadays you can see new websites, and new features to...