Today we will learn how to conduct Penetration testing of VoIP (Voice over IP) against a Private Branch Exchange as it's must to perform pen tests for all type of attacks. For VoIP security assessment, most important pen test is Caller ID Spoofing and how hackers spoof caller ID to make fake calls on behalf of someone else without disclosing his/her information. Before starting pen test we have to understand what is Caller ID Spoofing? Caller ID spoofing is a type of attack where a malicious attacker will impersonate a legitimate SIP user to call other legitimate users on the voice network. So let's learn how … [Read More...]
Featured Articles
Editorial Picks
Latest Blog Updates
Types of Malware – Hacker’s Guide
Lot of users has requested us to list down all different types of malware used by hackers to hack victims. So today i will list down all malware types and will give a brief introduction about each malware type. This is very useful Hacker's Guide because every hacker or penetration tester must know all different types of malware that is being used by hackers. As a penetration tester we have to perform static and dynamic malware analysis for forensics and in order to perform this correctly we must be aware with each and every malware. For example, when malware imports networking functions together with … [Read More...]
Free Whatsapp spying service : Hacking News
Free Whatsapp spying service : Hacking News In this tutorial you will learn a new hack you could do using the ultimate WhatsApp Spying Website: http://whatcha.xyz/ WhatCha.xyz is an online service, that tracks anyone's number on WhatsApp and give you a detailed log on when your victim goes online or offline. And since almost everyone you know that has WhatsApp, uses it last before sleeping, and first after waking up... Then now you can know when someone goes to sleep or when someone woke up simply by tacking their WhatsApp number using WhatCha Step by step tutorial on Whatsapp Spying: After you register on the … [Read More...]
Penetration Testing : Hacking Gmail account using GX Cookie
Penetration Testing : Hacking Gmail account using GX Cookie GMAIL is currently being used in corporate environments widely due to high popularity . During penetration tests we might come across scenarios where the employees are using GMail as the primary mode of email communication. (GMail also provides a paid service of email for corporates . ) Introduction to the Cookie Replay Attack : Hacking web application was always curious for the script kiddies. And hacking free web email account is every geek first attempt. The method which I will describe in this post is not new; the same method can be applied to yahoo … [Read More...]
Steganography : Hide EXE within the Jpeg Image File
Stenography : Hide EXE within the Jpeg Image File What is Steganography ? Steganography is the art and science of hiding information by embedding messages within other, seemingly harmless images or other types of media Steganography has become increasingly popular in the past years , majorily in hacking communities where it is extensively being used for hiding the executables within the image file . In the following tutorial I will show you how easy it is to hide an executable within an Image file . Here is a Noob Friendly tutorial on Steganography that explains how to hide exe within the Jpeg . 1. Save the … [Read More...]