Category: H@cking
-
Scanning Hidden Directories
Not all websites make it easy and publish everything on sitemap.xml or robots.txt. Sometimes you have to use some nifty tools in order to sniff out hidden directories. Below is a simple guide on how you can do this…..
-
Using Grabify To Track URLs
Grabify is a service that can help you identify who is on the receiving end of your chats or emails. You may have heard of the service as it has been made popular by the TV show Catfish….
-
Cracking PDFs and ZIP files
Password protecting your files using a password is a great way to add additional security controls. The problem is, there are tools out there that can crack them. You may also be in a situation where you can’t remember the password of a file.
-
Generating Custom Wordlists For Targeted Attacks
Rockyou.txt will only get you so far. When doing targeted attacks you might need something more specific to that user or site. This is when you want to generate your own wordlists to increase the chances of success……
-
Using Steganography To Hide Data In Plain Sight
Steganography is a way of hiding data in plain sight. With the use of steganography, you can hide data within other data files. Typically you would hide data inside an image, video or audio file. Here’s is how…
-
Creating A Rogue Access Point
Everyone is advertising free WiFi nowadays as a way to lure customers in. What these customers might not known is if the hotspot they are connecting to is genuine. It could be a Rogue AP setup by a malicious party in order to sniff your traffic. They provide you with free internet access and you provide them with all your network traffic. Here is how they do it.
-
How To Hack With Google Dorks
Google dorking or Google Hacking is a hacking technique that uses the advance search functionality in Googles search engine.
-
Check How Exposed Are You On The Internet
If you’re a large organization, hiring a Cyber security firm to audit your security posture is a no brainer. Everything is exploitable and thinking that you are 100% secure nowadays is naive. You can purchase the best of the best security stack but no matter what, there will always be a weak chain somewhere. This is why these services exist. So that they help identify the gaps and help re-mediate them before someone malicious exploits them.
-
Using Disposable Services
You signed up for a free service and now you are being bombarded with spam emails? Not anymore…