Posts

Protect Your Credentials From Hackers.

Image
We all know that our password can be known only by us, but you are really wrong the Techies(hackers) can know your each step, what you are doing and what you’re going to do they can know your entire schedule. Let us discuss how can you protect from them. Step 1:           Don't put your passwords related your pet name, mother or father name, girl friend or boyfriend name, roll number’s, room number's, favorite colour or food and places names, mobile numbers. Step 2:           Don't try to put any one of them, try to protect your account from new and strong password like all combinations of numbers, lower and upper-case alphabets, special characters. Step 3:           If your password is simple and same as others then your Caught. You have been hacked.   Step 4:            Update your password at least once in a week. Then your account may has s...

How To Access FTP using CMD

Image
How to access FTP using CMD. To initiate an FTP session from the Windows command prompt, follow these steps: Establish an Internet connection as you normally do. Click  Start , and then click  Run . In Windows 7 or later versions A command prompt will appear in a new window. Type  ftp < insert your FTP host address here > Press  Enter . If the initial connection is successful, you should be prompted for a username. Type it in and press  Enter  again. (If connecting anonymously, type  anonymous ) You should now be prompted for a password. Type it in and press  Enter  once more. NOTE: For security reasons, you will not be able to see your password as you type it. (If connecting anonymously, use your email address as the password) If all is well, then you should now be connected to the remote FTP site. Type  dir  and then press  Enter  to see a list of files and folders. To end your FTP session, type...

List Of Operating systems Are Used By Hackers.

Image
Favourite Operating Systems Of Hackers : So check out 17 best Linux distro for hacking purposes : 1. Kali Linux Kali Linux  maintained and funded by Offensive Security Ltd. is first in our list. Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing. Kali is the one of the best and favourite operating systems of hackers. It was developed by Mati Aharoni and Devon Kearns of Offensive Security through the rewrite of BackTrack, their previous forensics Linux distribution based on Ubuntu. Kali Linux has a dedicated project set-aside for compatibility and porting to specific Android devices, called Kali Linux NetHunter. It is the first Open Source Android penetration testing platform for Nexus devices, created as a joint effort between the Kali community member “BinkyBear” and Offensive Security. It supports Wireless 802.11 frame injection, one-click MANA Evil Access Point setups, HID keyboard (Teensy like...

Advanced SQL Injection

Image
                                                                   Sqlmap Tricks for Advanced SQL Injection Sqlmap is an awesome tool that automates SQL Injection discovery and exploitation processes. I normally use it for exploitation only because I prefer manual detection in order to avoid stressing the web server or being blocked by IPS/WAF devices. Below I provide a basic overview of sqlmap and some configuration tweaks for finding trickier injection points. Basics Using sqlmap for classic SQLi is very straightforward: ./sqlmap.py -u 'http://mywebsite.com/page.php?vulnparam=hello' The target URL after the -u option includes a parameter vulnerable to SQLi (vulnparam). Sqlmap will run a series of tests and detect it very quickly. You can also explicitly tell sqlmap to only test specific parameters with...