8 Important things to do after installing Kali Linux on your computer

Hello Viewers, Kali Linux is one of the best operating system to use as a hacker or any security profession. However, it doesn’t come perfectly configured right out of the box. Today in this blog, we will discuss about the, 8 important things to do after installing kali Linux on your computer, Virtual Box and Raspberry […]

Metasploit Framework For Advance Exploitation

Metasploit Framework The Metasploit Framework is a Kali Linux tool that helps in the exploitation of any machine by using vulnerabilities to hack it. If you have read my previous tutorials, you will remember that when we had scanned the target of our Windows XP, we had received a Vulnerability  MS08-067. We will hack the […]

Top 10 Facebook profile hacking techniques!

1. Phishing Phishing is still the most popular attack vector used for hacking Facebook accounts. There are variety methods to carry out phishing attack. In a simple phishing attacks a hacker creates a fake log in page which exactly looks like the real Facebook page and then asks the victim to log in. Once the […]

Most Important Cyber Attacks Techniques that often used by Hackers

The cyber attacks occurs on a daily basis, and these can range from attacks on tech giants to individuals falling fouls to the many scams which are present online. Thankfully, there are ways in which people and groups at both end of the scale can reduce their level of susceptiblity to attacks, with virtual private […]

Hacker uses ProtonMail VPN. Hacker DDoSes ProtonMail. Hacker gets arrested.

Braggadocio teen part of up and coming Apophis Squad hacking sauad fails to protect his identity. Gets promptly arrested by UK police. Pleads guilty. A major openSec mistake led to the arrest of a hacker part of a hacking crew that the summer. The hacker is 19 year old teenager named George Duke-Cohan, From Herfordshire, […]