21MarPhishing With a Rogue Wi-Fi Access PointSomething smells fishy.. Learn how to carry out a phishing attack to hack facebook or gmail (or anything!) using a rogue Wi-Fi access point. 21MarThe Art of Human HackingThe seven deadly sins of social engineering Learn about the weaknesses of humans and how we can exploit them by social engineering attacks and techniques using Phishing. 21MarIntroduction to Social EngineeringExploiting Humans Social Engineering is the art of exploiting humans. We're going to take a look at a few examples of attacks and techniques that can be used to hack humans. 11MarInformation Gathering with theHarvesterDedicated to Billy (...) theHarvester is a tool for gathering publicly searchable information on your targets which could be anything from individuals to websites to companies. theHarvester can find e-mail accounts, subdomain names, virtual... 11MarHow to Hack Webcams RemotelyYou should probably tape over all your cameras Learn how to hack into anyone's webcam remotely. Using this simple technique we can hack the cameras in laptops, desktops or even smartphones. 7MarThe CIA Rule Book on Malware CreationIt's all out in the open now From the CIA leaks published by WikiLeaks, here is the secret to CIA's offensive security approach. Let's learn how the CIA makes malware. 26FebHow to make your own virusesA recipe for disaster Learn how to create your very own viruses by using batch files. Here are a few ideas of what you can make your virus do. 21FebIntroduction to Batch File VirusesLet the game begin Get started with creating simple and effective batch file viruses. Quick to build with deadly results, batch file viruses are sure to get the job done. 6FebFolder BlasterThe more annoying the better Learn how to create a batch file virus that can create a ridiculously large number of folders to prank and annoy your enemies. 5FebApplication FlooderAnnoy the hell out of your victims Learn how to create a batch file virus that opens up an insanely large number of windows to annoy your enemies and prank your friends! 4FebFork BombOnce a classic, always a classic Learn how to create a batch file virus that can completely eat up all of a system's memory and cause the computer to crash and become corrupted. 3FebWiping Out MemoryObliviate Learn how to create a batch file virus that can completely and permanently delete everything on a computer with one line of code! 13JanIntroduction to DDOSThe digital nuke A distributed denial of service (DDoS) attack is one in which a large number of compromised systems connect to a single target (like a website), thereby causing denial of service... 8JanHow to (Really) Hack Facebook.And how to protect yourself from these hacks Is your girlfriend cheating on you? Want to read your husband's messages? Let's learn all about how to take over someone's facebook account. 1NovAnonymousWe are Legion. We do not forgive. We do not forget. Get to know the most infamous and powerful group of hackers: Anonymous. Who are they? What do they do? And how does one join them? 28OctWebsite HacksLet's do some damage Hacking is a growing threat for every business both large and small. Whether it’s stealing private data, taking control of your computer, or shutting down your website, hackers can seriously... 28AugDisabling AntivirusAmbush, disarm and attack Learn how to disable your victim's antivirus so that you can unleash the baddest of viruses upon them. Let your malware breathe a sigh of relief. 26AugRemote KeyloggersDeleting your browser history is no good now In this tutorial, we’ll attempt to remotely install a keylogger. This one is actually quite basic, so without further ado, let’s begin. Fire up Metasploit and let’s get started. Like... 22AugThe Heartbleed BugA heartbreaking tutorial On April 7, 2014, OpenSSL received a fix to a very popular and controversial vulnerability- The Heartbleed bug. On that day, over half a million web servers were found to... 20AugAuroraAn old internet explorer hack Learn about the infamous Aurora hack and how it brought down Internet Explorer version 6 to it's knees. 16AugExploitation: ExamplesJust like in the movies. Except Real. Let's take a look at a few examples of how exploitation modules work in Metasploit to bring your target to their knees. 12AugExploitation: BasicsHit them where it hurts Learn the basics of exploitation in Metasploit and become familiar with a few commands that are used throughout the Metasploit framework. 9AugExploring NmapMeet your new best friend Nmap (Network mapper) is one of the most popular hacking and penetration testing tools used to scan hosts and services on a network to find security holes. 5AugInformation GatheringKnow thy enemy Nmap (“Network Mapper”) is a free and open source utility for network exploration and security auditing. Many systems and network administrators also find it useful for tasks such as network... 1AugCommands Crash CoursePractice is everything Learn about the most commonly used commands in the Metasploit framework and how to use them in your journey to become a successful penetration tester. 29JulIntroduction to MetasploitOur very own manhattan project.. Metasploit is a tool developed by HD Moore in 2003. In a nutshell, it is used to exploit vulnerabilities in daemons(background) running on an open port. It is extremely powerful... 22JulCreating Wordlists With CrunchYou can hide, but you cannot escape Sometimes life leaves us with no options. You’ve tried all the other methods of cracking open an encrypted file or gaining access to a WPA Wi-Fi network but nothing seems... 18JulTHC HydraYou think your passwords are safe? Let's see... One of the biggest security holes in any seemingly secure networks or systems are passwords. Install a $500 anti-virus, specifically hire a cyber security team, do anything and everything you... 13JulHow to Hack Wi-Fi (WEP) - IIWith time, every system can be hacked into For this tutorial you need external WiFi adapter or have Kali installed in your Hard Drive, not a virtual machine. Otherwise, look for the method using normal windows OS in... 25JunMore On Hacking WiFiThe final touches... Learn the inner workings of how WiFi hacking tools work, and how to use them to own wireless networks anytime and anywhere. 23JunHow to Hack Wi-Fi (WPA/WPA2)Breaking the unbreakable WPA/WPA2 supports many types of authentication beyond pre-shared keys. aircrack-ng can ONLY crack pre-shared keys. So make sure airodump-ng shows the network as having the authentication type of PSK, otherwise,... 21JunHow to Hack Wi-Fi (WEP)Preying on the hopelessly weak Tools Required: CommView for WiFi: http://tamos.com/download/main/ca.php Aircarck-NG GUI: http://aircrack-ng.org/ Install CommView. While installation you maybe asked whether you want to install the application in VoIP mode or Standard mode. Both... 19JunR.A.T'sIf only this was a website on cuddly creatures.. Here is an introduction to Remote administration tools. These are generally called RATs, and yes they have a vicious bite. although this page doesn’t teach you how to blast open... 11JunPracticing For DDOSHow do you defend against a nuclear bomb? What we’ll attempt to do in this article is similar to testing a nuclear bomb (okay, not really). But still, there’s no way to tell exactly what will happen, other... 9JunProtecting Against DDoSHow do you protect against a nuke? Learn about the various defenses against distributed denial of service (or DDoS) attacks to protect your systems. 7JunHow To Launch a DDoS AttackAll systems are go Learn how to launch your very own distributed denial of service (DDoS) attack and bring down a website for fun and profit (and jail time). 12MayOverloading MemoryThe thing about machines is that they all have a limit This virus combines the best of the fork bomb and the application flooder. It creates a new batch file in the same directory and then copies itself onto this new... 11MayPhishing (Old)The ultimate gullibility test Learn how phishing works and how you can perform a phishing attack yourself to obtain the password to your victim's account. 29AprUSB StealerJust like those unrealistic movies and TV shows, except this one's real. There’s a lot of people in the world and even more online accounts. Every security system has a flaw and what we’re going to discuss here is just that. Most...+1 143k Pin 86k Tweet 309kShare 252kReddit 117kShares 907k