Skip to main content

Posts

ETHICAL HACKING TOOLS

Best 10 Ethical Hacking Tools: Software hacking tools are: 1.Metasploit 2.N map 3.Netsparker 4.Acunetix 5.Ettercap 6 Hashcat 7.Aircrack Ng 8.John the ripper 9.Nessus 10.Angry Ip scanner 1.METASPLOIT:          ๐Ÿ’ Metasploit available in free and community versions. It originally developed in 2003 as a movable network tool by HD Moore.        ๐Ÿ’ Metasploit is a penetration testing framework it makes hacking simple.       ๐Ÿ’ Metasploit is an open source project it offers the public resources to develop codes and research security vulnerabilities.       ๐Ÿ’ Metasploit also offers an evasion and anti forensic tools.       ๐Ÿ’  Metasploit framework is a software environment to develop, test and execute exploits.      ๐Ÿ’  Metasploit can be applied by ethical hackers and cyber criminals for probing systematic susceptabilities on servers and network. (It is easily customised with va...
Recent posts

ALBERT GONZALEZ

Albert gonzalez: Albert Gonzalez was born on 1981.he is an American hacker and computer criminal. He is arrest for credit card  theft. In 2005 to 2007 more than 170 million ATM card numbers and cards theft by Albert gonzalez. He used sql injection to deploy backdoors on server of corporate company to launch packets sniffing.  (specifically ARP spoofing attacks) to steal computer datas. ARP spoofing is a type of attack  in a malicious actor send a falsified (Address Resolution Protocol) messages over a local area network.Albert gonzalez was stayed at lavish hotels but his formal homes were modest. Other names of the gonzalez was the Cambajohny, kingchilli, segvec, stanozaloz. Gonzalez did the three federal indictment. The first was in may 2008 in new York for the Dave and busters case. The second was in may 2008 in Massachusetts for Tjx maxx case. The third was 2009 in new Jersey in the heartland payment case. On March 25,2010 he sentenced to 20 years in federal prision....

KEVIN MITNICK

GREATEST HACKER IN THE WORLD: KEVIN MITNICK:      Kevin mitnick is an American hacker. Born on 6 August 1963( age 58 years) van nuys, los angels, California, United States. He is a security consultant, author and convicted hacker. He is the number 1 hacker in the world. The U. S department of justice called him the "Most wanted computer criminal in history". EDUCATION:      He grew up in Los angels and studied in the James monroe high school is located in Fredericksburg, virgina. During the time he became an amateur radio operator. He later studied at Los Angeles pierce College and USC. He worked as a receptionist for Stephen s. Wise temple. He called by the other names The condor, the dark side hacker.  Hacking Activities:       At age 12 mitnick use the social engineering and dumpster diving to bypass the punch card system used in los Angeles bus system. Dumpster diving is a retrieve information that could be used to carry out an attac...

Jonathan Joseph James

JONATHAN JOSEPH JAMES: Jonathan Joseph James was born on December 12,1983 in pincrest village located in Miami-Dade country Florida, United States of america. The village has a total area of 7.6 square miles 7.5 square miles of land and 0.13% of water. His father Robert James was a programmer and his mother is house wife. At the age of 6 he interested to know about all things of computer. He spent many time in computers So his parents are worried about his studies.  At the age of 15 he cracked the computer networks of educational institutes in Miami-Dade country. At this he got a nickname "comrade". It represents the meaning of a companion or friend. After that he hacked the AT&T bellsouth is the telecommunication company in USA,ead quarted in Atlanta,Georgia. He discovered by the Bell south he hacked that servers he confessed that "It was one incident this hack didn't cause any damage to bellsouth he just hack for testing its own knowledge.In a Mysterious PBS(pu...

TOP 10 Famous Hackers In The World

TOP MOST 10 FAMOUS HACKERS IN THE WORLD: 1.JONATHAN JOSEPH JAMES :                                                               Jonathan Joseph James was an american hacker. His native in southflorida . He was a Grey hat hacker. In a mysterious PBS meeting, he proclaims,"I was simply glancingaround,playing around. What was a good time for me was a test see what could draw off".He was at the age 15 at the time he broke into NASA PCs and steal the programming worth around $1.7 million and also he caught more than the 3000 hidden messages from government employees and going to form the DTRA(Defense Threat Reduction Agency)a division of the United States Department Of Defense. On May 18,2008 at 25  years old he committed suicide by the gunshot. 2.KEVIN MITNICK:            ...

THE HISTORY OF HACKING

HISTORY OF HACKING: HACKING BEGINS In:  THE TERM HACKER WORD MEANS:            The word hacking discribing the "the cutting in a rough and violent way,often without aiming exactly".                   An article in the edition  of pyschology today magazine ran the article about hackers with the headline "THE HACKER PAPERS".The two movies releases at a time TRON and WARGAMES.The techno-thriller movie is wargames(1983).this movie is written by LAWRENCE LASKER and WALTER F.PARKES and the movie is directed by the JOHN BADHAM.This movie is related to hacking the young teeneger(played by a MATTHEW BRODERICK) from seattle breakes into a U.S military super computer programmed to predict the posssible outcomes of nuclear war.based on this movie the DAVID BISCHOFF write a book called wargames The first hacking found in the MIT'S(Massachusetts institutes of technology)in united states teenagers to modify the functi...

ETHICAL HACKING

ETHICAL HACKING: ๐—›๐—ถ๐—ถ ✋๐˜„๐—ฒ๐—น๐—ฐ๐—ผ๐—บ๐—ฒ ๐˜๐—ผ ๐—บ๐˜† ๐—ฏ๐—น๐—ผ๐—ด ๐—ด๐˜‚๐˜†๐˜€☺. ๐—ง๐—ต๐—ถ๐˜€ ๐—ฏ๐—น๐—ผ๐—ด ๐˜†๐—ผ๐˜‚ ๐—ต๐—ฎ๐˜ƒ๐—ฒ ๐˜๐—ผ ๐—น๐—ฒ๐—ฎ๐—ฟ๐—ป ๐—ฎ๐—ฏ๐—ผ๐˜‚๐˜ ๐˜๐—ต๐—ฒ ๐—ฒ๐˜๐—ต๐—ถ๐—ฐ๐—ฎ๐—น ๐—ต๐—ฎ๐—ฐ๐—ธ๐—ถ๐—ป๐—ด ๐ŸŽญ๐—ถ๐—ป ๐˜€๐—ถ๐—บ๐—ฝ๐—น๐—ฒ ๐—˜๐—ป๐—ด๐—น๐—ถ๐˜€๐—ต. ๐—ฆ๐—ผ ๐—ฑ๐—ผ๐—ป'๐˜ ๐—บ๐—ถ๐˜€๐˜€ ๐˜๐—ต๐—ถ๐˜€ ๐—ฏ๐—น๐—ผ๐—ด ๐˜๐—ผ ๐—น๐—ฒ๐—ฎ๐—ฟ๐—ป ๐—ณ๐—ฟ๐—ถ๐—ฒ๐—ป๐—ฑ๐˜€๐Ÿ˜˜  ๐—ช๐—ต๐—ฎ๐˜ ๐—ถ๐˜€ ๐—ต๐—ฎ๐—ฐ๐—ธ๐—ถ๐—ป๐—ด?                                                   ๐—ง๐—ต๐—ฒ ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—ต๐—ฎ๐—ฐ๐—ธ๐—ฒ๐—ฟ๐˜€ ๐—ฎ๐—ฟ๐—ฒ ๐—ณ๐—ถ๐—ป๐—ฑ ๐˜๐—ต๐—ฒ ๐˜„๐—ฒ๐—ฎ๐—ธ๐—ป๐—ฒ๐˜€๐˜€ ๐—ฎ๐—ฏ๐—ผ๐˜‚๐˜ ๐˜๐—ต๐—ฒ ๐—ฐ๐—ผ๐—บ๐—ฝ๐˜‚๐˜๐—ฒ๐—ฟ ๐—ผ๐—ฟ ๐—ฎ๐—ป๐˜† ๐—ป๐—ฒ๐˜๐˜„๐—ผ๐—ฟ๐—ธ ๐˜๐—ผ ๐—ฎ๐—ฐ๐—ฐ๐—ฒ๐˜€๐˜€ ๐˜๐—ต๐—ฒ ๐—ฐ๐—ผ๐—ป๐˜๐—ฟ๐—ผ๐—น ๐—ฎ๐—ป๐—ฑ ๐˜๐—ต๐—ฒ๐˜† ๐—ฐ๐—ฎ๐—ป ๐—ฑ๐—ฒ๐˜€๐˜๐—ฟ๐—ผ๐˜†,๐˜€๐˜๐—ฒ๐—ฎ๐—น ๐—ฑ๐—ฎ๐˜๐—ฎ ๐—ถ๐˜€ ๐—ฐ๐—ฎ๐—น๐—น๐—ฒ๐—ฑ ๐—ต๐—ฎ๐—ฐ๐—ธ๐—ถ๐—ป๐—ด.  ๐—ง๐˜†๐—ฝ๐—ฒ๐˜€ ๐—ผ๐—ณ ๐—ต๐—ฎ๐—ฐ๐—ธ๐—ถ๐—ป๐—ด?  ✴๐—ช๐—ฒ๐—ฏ๐˜€๐—ถ๐˜๐—ฒ ๐—ต๐—ฎ๐—ฐ๐—ธ๐—ถ๐—ป๐—ด ✴๐—ก๐—ฒ๐˜๐˜„๐—ผ๐—ฟ๐—ธ ๐—ต๐—ฎ๐—ฐ๐—ธ๐—ถ๐—ป๐—ด ✴๐—˜๐—บ๐—ฎ๐—ถ๐—น ๐—ต๐—ฎ๐—ฐ๐—ธ๐—ถ๐—ป๐—ด ✴๐—˜๐˜๐—ต๐—ถ๐—ฐ๐—ฎ๐—น ๐—ต๐—ฎ๐—ฐ๐—ธ๐—ถ๐—ป๐—ด ✴๐—ฃ๐—ฎ๐˜€๐˜€๐˜„๐—ผ๐—ฟ๐—ฑ ๐—ต๐—ฎ๐—ฐ๐—ธ๐—ถ๐—ป๐—ด ✴๐—–๐—ผ๐—บ๐—ฝ๐˜‚๐˜๐—ฒ๐—ฟ ๐—ต๐—ฎ๐—ฐ๐—ธ๐—ถ๐—ป๐—ด Web...