Posts

TYPES OF HACKERS

Image
Types of Hackers:- These are the following types of a hacker who rule the virtual world.It would be so interesting to know about the cultures of hacking.Their life style is entirely different from ordinary people.They have extraordinary talents and skill in technology.A domain expert will always contribute to the domain he is working on.But hackers are the personalities who play roles on all the field by nature.Hacker cannot be the only male; they are well performing female pirate too.The black hats call them Anonymous because they don’t want that reputation to be valid for a single person or group. Script Kiddies types of hackers Script Kiddies are those don’t have proper knowledge of technology without which they just try to do some fun tricks. They use to hack games, create an impression of other they are the best hackers. They just steal data from the weakest network by attacking the system. They use some old traditional tools like Metasploit, LOIC. They also do some stealing ...

HOW TO HACK LEVEL 1

Introduction Welcome to how to hack, hacking course. In a computerized world, technical effort to enter the virtual world called networks and get access to anything on particular network is called hacking.The hacker is who is the one who is personally and totally engaged in hacking activities.The terms hacking is the historical word which is not a necessity for the computer system.The malicious programming attacks over the internet at a specific network. If the hacker involved in attacking the network without the knowledge of host then they are called black hats, if someone testify a hackable network for vulnerability then they are called as white hat hackers. Let us make your way easier to get into topic, dont skip the detailes.We concered about your time, we made everything little shorter. Origins of Hackers M.I.T. engineers in the 1950s and 1960s first spreading hacking all over the world first time. In beginning it was started as a fun and testing activity of the internet in ...

TYPES OF HACKING ( BEGINNER LEVEL )

Image
Types of Hacking Computer Terminals (Servers): The method of taking control of terminals or completely make it is useless or crash it. These are the common types of hacking used from ancient times of hacking. 1. Denial of Service Types of Hacking The most common methodology of attack is DoS attack which is also called as Denial-of-Service. This method of hacking may crash your system completely or make your computer or server entirely busy without allowing to access. There is also an important point to be noted in the DoS attack; your computer will become a participant to be DoS attacker from another server or computer if your system is attacked in this method. 2. Distributed DoS Types of Hacking Distributed DoSs are the coordinated DoS which have the multiple sources.A DDoS is extremely difficult to block because it will be multiple, changing and they have the multiple Pubic addresses. 3. Sniffing Types of Hacking TCP is the packet which is the protocol always get connected betwee...

HOW TO BE ANONYMOUS DURING HACKING

Image
If you wish to start your career in the hacking domain, then the main thing you need to consider about is anonymity. So, what you need be concerned is how to be anonymous. The basic techniques of anonymous will be discussed. Let’s discuss A. VPN VPN is known as Virtual Private Network. 1) VPN The mobile or computer will get connected to a new network; we will be accessing the internet in the name of IP address provided by VPN provider. The VPN that your getting connected should be so secure enough or reputed one. Or else you’re in a vulnerability point of action. So always be cautious on connecting to any network. Let me tell you something about IP address. If you connected to the internet, then google “what is my IP” you will get your dynamic IP address which is given by your mobile network service provider which may change by an hour, a day no longer than that. Static Public IP is costly. If you are a broadband provider then you can have a one public static IP address, Enterpr...

HOW TO HACK A WIFI NETWORK USING CMD IN WINDOWS

Image
Windows command prompt is a great tool for the people who love command interface rather than Graphical UI. There are a lot of features which are still not implemented in Graphical User Interface can be accessed via CMD. In my previous articles, I’ve talked about a lot of CMD commands. In this article, I am going to share how to find out the password of all connected devices using CMD along with suitable screenshots for clear understanding. Before going further, you should know one thing that whenever you connect to a Wi-Fi network and enter the password, Windows creates a WLAN profile of that Wi-Fi network. These WLAN profiles are stored in the computer alongside other required details of the Wi-Fi profile. We can uncover these WLAN profiles later by simply using Windows CMD. You can find out all the connected networks and their passwords by using simple commands. These commands can also uncover the Wi-Fi passwords of the networks which are not connected at the moment but were connec...

How To Create A Hacking Pendrive That Can Steal Passwords From Victims Computer

In this tutorial as Steal Passwords I am going to show you that how to make a Portable Hacking device with a Pendrive that can hack most of the online passwords from victims computer and with the help of this program you can also help your friends and relatives to recover their forgotten passwords or you can say as Steal Passwords, Yes you heard it right after following this tutorial you can hack like a pro and the tutorial is very easy. Anyone who has a basic computer knowledge can do this tutorial Easily. During the time of tutorial if you find any queries then please feel free to ask us by simply commenting in the comment box and we will get to you asap. How To Create A Hacking Pendrive That Can Steal Computer Passwords Things You Need: 1. Pen Drive 2. Computer/Laptop 3. Web Browser Pass View() Step 1: Download Web Browser Pass views Zip file from the above link Step 2: Insert your Pendrive to your Computer and then Quick Format It as NTFS Step 3: Create a New Folder in yo...

WOW!!!! ETISALAT INTRODUCED "TIME BASED BROWSING" FOR DEVICES/PC

Image
In spite of all the gross amount of money hanging on their neck, Etisalat is still trying their best to manage the company, so as for them not to loose their precious customers. Etisalat has punch the clock with their own time based data plan called Blaze On, powered by Comptel’s FWD solution. I can tell you that there is nothing as good as a timely based unlimited data plan in an environment of good network reception. Timely based data plan was firstly introduced by Airtel in 2015, by then, you can get 1hour with just N180 to download unlimited, but Airtel later increased the price and that was how the Airtel timely based data plan was beried alive. Etisalat is now took over from where Airtel stopped. Etisalat Blaze on is the fastest and easiest way for Etisalat customers to connect to the internet. You get connected no matter where you are, simply by choosing the most suitable time plan for you. With BlazeOn Data Plans, you can get 10min for N50, 15min for N70, 30min for N120 or...