web analytics
  • Let Us Learn,  Tools, Tricks and More

    WAYS TO SPEED UP WINDOWS 10

    Apart from being the 10th version of “MICROSOFT WINDOWS”, being user friendly and having better GUI as compared to its previous versions ,WINDOWS 10 is considered to be the slowest version of Microsoft Windows. There are many reasons behind this . It may not be compatible with your laptop ( hardware requirements such as RAM , processor , hard disk may not be met properly) . be simultaneously running many tasks in the background that you may not know . be automatically updating its services or applications in the background . have corrupted windows file in it . Due to these factors, professionals do not recommend to use Windows 10…

  • Let Us Learn,  Tools, Tricks and More

    MSFVENOM: CREATE YOUR OWN PAYLOAD

    Let’s generate our own payload ! In a previous article , we discussed about the pentesting tool msfconsole and how we can use it to exploit the vulnerability and gain access on our target’s machine . In this article, we will talk about about the tool msfvenom (preinstalled in Kali Linux) which comprises of another two tools namely msfpayload and msfencoder. In our article about meterpreter, we talked about how payload is important to make a attack functionable and get most out of the attacked machine. The msfvenom does the same thing! It generates a payload according to the platform selected by you and let you access the target’s device…

  • Let Us Learn,  Tools, Tricks and More

    HOMOGRAPH ATTACK-THE MOST DANGEROUS PHISHING ATTACK

    In the past few years ,there has been a significant increase in the cyber crime across the world. New attacks make the innocent users fall in a trap of fraud. Some attacks like social engineering, have also let even non-tech savvy to attack targets. One of the application of social engineering attack is Phishing. Some years ago, attackers found a new technique of doing Phishing, known as Homograph Attack. This attack can also be known as the Advanced Phishing. But why are we calling this attack as the advanced version of phishing attack? Because this attack is that much difficult to detect that normal person who just surfs internet can not…

  • Let Us Learn,  Tools, Tricks and More

    VERIFY THE DOCUMENTS DIGITALLY

    PRIVACY! Is it important for you? Can you compromise with it? Of course , A big NO! We all know that how much privacy matters to all of us. We can’t compromise our privacy at any cost. To maintain this privacy, we sometimes spend thousands of dollars just because we don’t want anyone to interfere in our job. In this article, we will be discussing about privacy issue. Let us take an example ! You send important data in the form of PDF across the internet but have you wondered that how much secure your PDF would be when it would roam around the internet? If by chance ,hackers tapped…

  • Let Us Learn,  Tools, Tricks and More

    MSFCONSOLE WITH NMAP: A DEADLY COMBINATION TO HACK SYSTEMS

    We know that if we want to hack the systems we need to follow the following steps: Information Gathering Scanning Exploiting Getting the access Maintaining that access It is believed that if one follows all the steps mentioned above, there are very less chances that an attacker is not able to attack his victim. But, do you know what do you need in order to carry out all the steps mentioned above? In this article, we will take you from the roots to fruits of hacking . We will use Nmap (Port Scanning tool) to gather information and scan ports on our target and Metasploit Framework (a framework that contain…