The Hackr

What is Footprinting

Hello friend, today we gonna learn what footprinting is, steps involved in it. Footprinting is the process of accumulating data regarding a specific network environment for the purpose of revealing system vulnerabilities. It is the very first step...

Find Critical Information about a Host using DMitry

Deepmagic Information Gathering Tool otherwise called Dmitry is a command line application with the ability to gather as much information as possible about a host.  It is an open source project coded in C. Its base functionality is able to gather...

Create a Backdoor Trojan Using Beast

‘Beast’ is a Windows based backdoor trojan horse, commonly known as “RAT” or Remote Administration Tool. It is written in Delphi. It uses the typical client-server model for launching an attack. It is somewhat similar to...

Build a Computer Virus Using TeraBIT

Ever wondered how to build a Computer Virus! A computer virus is basically a malware that, when executed, replicates itself by modifying other computer programs and inserting its own code. Be it your archive full of songs or the boot-sector of your...

How to Archive and Compress Data in Linux

Most of us are probably familiar with the .zip or .rar type of data compression. The .zip ulitlity is often used in Windows. Usually in Linux to install a new piece of software or system firmware, files downloaded are usually compressed or combined...

#trending

dmitry

Find Critical Information about a Host using DMitry

Deepmagic Information Gathering Tool otherwise called Dmitry is a command line application with the ability to gather as much information as possible about a host.  It is an open source project coded in C. Its base functionality is able to gather...


Warning: A non-numeric value encountered in /var/www/wp-content/themes/gridlove/core/template-functions.php on line 163
tar image

How to Archive and Compress Data in Linux

Most of us are probably familiar with the .zip or .rar type of data compression. The .zip ulitlity is often used in Windows. Usually in Linux to install a new piece of software or system firmware, files downloaded are usually compressed or combined...


Warning: A non-numeric value encountered in /var/www/wp-content/themes/gridlove/core/template-functions.php on line 163
password hack

Reveal Saved Passwords in Browser using JavaScript Injection

JavaScript is a high-level, dynamic, untyped, and interpreted run-time language. Majority of websites employ it, and all modern web browsers support it without the need of any plugins. But along with this comes some additional security issues that...


Warning: A non-numeric value encountered in /var/www/wp-content/themes/gridlove/core/template-functions.php on line 163
delete files

How to Securely delete Files in Linux Using shred command

May it be your kids assignment or sophisticated military intel, everyone today needs data privacy. Most of us think that a file on a system once moved to trash and emptied then, completely erases the file. It’s not true. What Happens When We...


Warning: A non-numeric value encountered in /var/www/wp-content/themes/gridlove/core/template-functions.php on line 163

#crunchies

#trending

up