Category Tech
OPERATING SYSTEM
What is an Operating System? The recent advancements in technologies, where every gadget is considered a smart device has really revolutionized the world. Almost everyone has access to this devices be it mobile phones, tablets, laptops, smart watches or even…
NESSUS – after 2020, safety comes first!!
What we are going to see about Nessus. In the following purview, we are going to talk about Nessus. A cybersecurity software, which scans vulnerability and penetrates testing in your system. Learn what is it? why should you use it?…
YouTube Algorithm: An Amazing Guide 1.0
YouTube has an ever-changing algorithm that directs the flow of media for content creators and content watchers alike. Let’s understand this mess a bit better. Introduction Youtube, the castle of ultimate media sharing, is a platform where people, for other…
The Awesome Suite, Aircrack-ng Part 1
In this article let’s go over what Aircrack-ng Suite is and how to use it. We will also see how to detect if there are invaders in your network and how to ban them from entering our network property again!…
Zphisher 2.2 : Phishing Attack on LinkedIn
Phishing Attack is a type of attack where the attacker pretends a be from the legitimate organization and sends fraudulent emails or texts subjective to their attack therefore tricking the victim into revealing sensitive, personal information in the hand of…
BeEF Framework 1.0
Disclaimer – Firstly, I would like to make something clear. If you intend to hack someone you’ve come to the wrong place. It is absolutely contemptible if you want to hack someone without their consent and with the tools available,…
SQL Map: tool 2001
SQL map is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection faults and hacking databases. What Is SQL Injection? SQL Injection is a code injection technique where an attacker executes malicious SQL queries…
Arch VS Ubuntu: Which Linux Distribution is the Better One?
Arch Linux and Ubuntu are two major Linux distributions that get a lot of attention and have dedicated fanbases. They are used as base distributions for other systems that are forked off of them… But, how they are doing things is quite different, and a…
The Invisible Browser in the Browser
In this Article we will learn about an advanced phishing technique called Browser in the Browser or in-short BitB Attack. Introduction A penetration tester and security researcher known as “mr.d0x” recently exposed a phishing technique. Phishing is a cybercrime in…
Burp Suite : Application Security Testing Software
If you are worried about the security testing of your website, then have a look at the Burp Suite that can test your website security efficiently. Here I am giving all the information needed for the use of Burp Suite.…
Wireshark : Network Protocol Analyzer
Wireshark is world famous widely used network protocol analyzer. It is open-source packet analyzer which is free to use. In initial stage original name of project was Ethereal later in 2006 it was renamed due to trademark issues. What is…
IP Address (IPV4 and IPV6)
What is an IP Address? IP Address stands for Internet Protocol Address. This is a logical address assigned to a system so that it can be identified in different networks. It is said logical as the IP address is not…
Using code to Track Phone & Computers on the Internet: A Complete 101
How to find the exact location of a phone or a target computer using the internet? Steps to achieve the tracking: Creating HTML page The main goal is to give the target a URL to a website and when that…
Neural Networks: The Artificial Brain
If you are aspiring to learn about Neural networks, then you are at right place. Here I’m going to give a detail note on Artificial Neural network with a common examples. What is Neural Network ? Neural Network is series…