Posts

Showing posts from June, 2021

How to Protect Your Smartphone from Being Hacked!

Image
There are many types of reasons of smartphones being hacked. But here we will only know about some big and common reasons and ways to avoid them. Internet  Malwares and Viruses The first reason is that if you use the Internet very much, then you must be downloading many types of document files from the Internet. So all these which you download along with these malware viruses are also downloaded in your phone. When you download a file into your phone using the Internet, viruses are also installed inside your mobile in attachment with them. These viruses can be very dangerous. It can also work as a back door for your phone, if you don't know about the back door, then let me tell you about the back door in which files the hackers add the viruses and malwares , such as in an app and a PDF. Viruses can be added to a zip file , apk file, PDF file and this is what hackers do. They add viruses and malwares to any file, and make it viral in the internet or put it in the internet,...

11 Most Useful Linux Commands!

Image
  cd (Change Directory)  – If you want to get into another folder, then this command is used like  cd /Desktop  is used to get into the Desktop Folder. ls (List Directory Content)  – This command lists all the directories which are present in a particular folder. pwd (Present Working Directory) –  This command displays the folder in which you are working presently. mkdir (Make Directory) –  This command is used to create a new directory in the system. rmdir (Remove Directory) –  This command is used to remove a particular directory. clear –  This command is used to clear the page like if you use clear command in your terminal then the terminal page will clear. locate –  It’s meaning is clear from its name to find any file. If you type  locate ‘file name’  then it will show all the locations where this file name directory is present. man –  This command is used to opening a manual page of a particular command....

Seeker - Trace Anyone's Location!

Image
First we need to clone this tool from it's Github repository using following command: git clone https://github.com/thewhiteh4t/seeker The screenshot of the command is following : trace mobile location After cloning finished we need to go in seeker's directory, to do that and to see the files we use cd command and ls command so we apply both commands together: cd seeker && ls   The screenshot is following: seeker trace mobile location of anyone Here we can see the files. First we need to run the  installer.sh  . This tool also can be run from mobile devices using Termux app. Termux is a terminal emulator with an extensive Linux package collection. If we use a mobile device and using Termux application then we choose the  termux-install.sh  installer file. So, the command for our Kali Linux system will be following: sudo bash install.sh This will install all requirements to run seeker. The screenshot is fol...

What Is Tor Browser? Why It is Used ?

Image
  What is Tor? The Tor Project is a non-profit organization that conducts research and development on online privacy and anonymity. It is designed to stop people - including government agencies and companies - from studying your location or tracking your browsing habits. Based on that research, it provides technology that removes Internet users and websites through “transfers” run by thousands of volunteers around the world, making it very difficult for anyone to find a source of information or location for a user. Its software package - Tor's browser - can be downloaded and used to use that technology, with a different version available on Android smartphones. How to use the Tor Browser For most people, using Tor Browser is as easy as downloading and running it, just as you can download Chrome or Firefox. If you have never used Tor, the first thing you will notice is that it is slower - or at least, slower than normal internet browsing. However, Tor has accelerated ...

Gadgets We Hackers Have!

Image
Source : @IamDeadHacker   Sometimes, during security audits, we may encounter a situation where everything is being managed correctly. In other words security patches, policies, network segmentation, antivirus, and user awareness, to name just a few measures, are being applied properly. That’s when, in order to continue the analysis from the perspective of a security researcher or consultant, social engineering and a number of other tools, some of which we will look at in this post, start to play more importance, being perhaps the only ones that can allow an attacker to penetrate the target system. The tools in question are mainly pieces of hardware designed for   security research  or projects. So here’s a list of the 10 tools every white hat hacker needs. #1 Raspberry Pi 3 Raspberry Pi 3 Model B. Source:  raspberrypi.org We are now on the third generation of these low-budget computers, which can be used in multiple ways. A classic example in security...

13 BEST Operating System (OS) for Hacking in 2021

Image
Ethical hacking is identifying weaknesses in computer systems or networks to exploit its vulnerabilities so they can be fixed later. Hackers use various techniques to identify threats and thereby increase the security of the device. These people can utilize Linux based operating system to hack PC or network. It contains a wide range of applications to prevent cybersecurity attacks. Following is a handpicked list of Top OS for Hacking with their popular features and download links. BEST OS for Hacking: Top Picks 1) Kali Linux     Kali Linux is a Security Distribution of Linux specifically designed for digital forensics and penetration testing. It is one of the best hacking OS which has over 600 preinstalled penetration-testing applications (cyber-attack performs against computer vulnerability). This OS can be run on Windows as well as Mac OS. Features: It can be used for penetration testing. This platform is available in 32 bits as well as 64 bits. Kali Linux can...