4 Steps of Penetration Testing

Module 1 :- Overview Of Penetration Testing What is Penetration Testing? Why Penetration Testing? Steps of Penetration Testing? All Right all right. now we all know “what is Penetration Testing?”, “Why it is needed?”. Now its time for ‘How it is done?’    There are four basic steps of Penetration Testing…….Well the fifth one is Read more about 4 Steps of Penetration Testing[…]

android apps for visually impaired

Top 10 android apps for visually impaired

Android apps for visually impaired We all saw Matt Murdock using an Android phone. it has android apps for visually impaired pre installed. The world is on the rise with this tech, the blind should too. So here today, we are going to discuss the apps that can help the visually stunted. Scanlife Barcode and QR Reader Read more about Top 10 android apps for visually impaired[…]

6 steps to change Kali Linux IP address (Easy)

6 steps to change Kali Linux IP address (Easy)

MODULE 3:- Basics of Kali Linux Install Kali Linux on Hard drive with Full disk Encryption How to create Kali Linux bootable USB live in windows 10 20 basics about how to use Kali Linux 6 steps to change Kali Linux IP address (Easy) How to Add Kali Linux repository – With pictures How to Read more about 6 steps to change Kali Linux IP address (Easy)[…]

Android for beginners-Part 1

This article marks for an inception of something new, something cool, something to brag about and something that makes you feel more tech savvy. Android started to come to the surface in 2008. Since then, billions of gadgets from thousands of companies have embedded it in their roots. And naturally, more developers, whether from a Read more about Android for beginners-Part 1[…]

how to use Kali Linux

20 basics about how to use Kali Linux

MODULE 3:- Basics of Kali Linux Install Kali Linux on Hard drive with Full disk Encryption How to create Kali Linux bootable USB live in windows 10 20 basics about how to use Kali Linux 6 steps to change Kali Linux IP address (Easy) How to Add Kali Linux repository – With pictures How to Read more about 20 basics about how to use Kali Linux[…]

How to use dnsenum for dns enumeration - Kali

How to use dnsenum for dns enumeration – Kali

MODULE 4:- Information Gathering How to use dnsenum for dns enumeration – Kali How to use dig command in Kali Linux whois Kali Linux commands with example Enumerating DNS Records through dnsenum tool in Kali Linux Email Harvesting by theharvester tool in Kali Linux Google Hacking | Open Web Information Gathering dnsmap | DNS Domain Read more about How to use dnsenum for dns enumeration – Kali[…]

How to use dig command in Kali Linux

How to use dig command in Kali Linux

MODULE 4:- Information Gathering How to use dnsenum for dns enumeration – Kali How to use dig command in Kali Linux whois Kali Linux commands with example Enumerating DNS Records through dnsenum tool in Kali Linux Email Harvesting by theharvester tool in Kali Linux Google Hacking | Open Web Information Gathering dnsmap | DNS Domain Read more about How to use dig command in Kali Linux[…]

whois Kali Linux commands

whois Kali Linux commands with example

MODULE 4:- Information Gathering How to use dnsenum for dns enumeration – Kali How to use dig command in Kali Linux whois Kali Linux commands with example Enumerating DNS Records through dnsenum tool in Kali Linux Email Harvesting by theharvester tool in Kali Linux Google Hacking | Open Web Information Gathering dnsmap | DNS Domain Read more about whois Kali Linux commands with example[…]

The first JavaScript powered RansomWare Ransom32

Ransomware: What is it? Let’s go by the wiki definition with this one. The meaning is simple enough, the RansomWare infects the system and holds it for ransom. By infecting here, it means that the malware operators disable one particular(mostly crucial) function in the system and will only enable it back if the victim system’s owner pays Read more about The first JavaScript powered RansomWare Ransom32[…]

World’s first Power outage using Malware

Die Hard 4.0 seems real enough now as we have the world’s first power outage accomplished by a malware. The culprits are…..you guessed it, the blackhats. Now hackers have used a highly elegant and destructive malware to successfully infect at least three regional Ukrainian power authorities. So, their pre-Christmas 23rd December was pretty much a …lights out. The Read more about World’s first Power outage using Malware[…]