Lot of users has requested us to list down all different types of malware used by hackers to hack victims. So today i will list down all malware types and will give a brief introduction about each malware type. This is very useful Hacker's Guide because every hacker or penetration tester must know all different types of malware that is being used by hackers. As a penetration tester we have to perform static and dynamic malware analysis for forensics and in order to perform this correctly we must be aware with each and every malware. For example, when malware imports networking functions together with … [Read More...]
Featured Articles
Editorial Picks
Latest Blog Updates
Free Whatsapp spying service : Hacking News
Free Whatsapp spying service : Hacking News In this tutorial you will learn a new hack you could do using the ultimate WhatsApp Spying Website: http://whatcha.xyz/ WhatCha.xyz is an online service, that tracks anyone's number on WhatsApp and give you a detailed log on when your victim goes online or offline. And since almost everyone you know that has WhatsApp, uses it last before sleeping, and first after waking up... Then now you can know when someone goes to sleep or when someone woke up simply by tacking their WhatsApp number using WhatCha Step by step tutorial on Whatsapp Spying: After you register on the … [Read More...]
Penetration Testing : Hacking Gmail account using GX Cookie
Penetration Testing : Hacking Gmail account using GX Cookie GMAIL is currently being used in corporate environments widely due to high popularity . During penetration tests we might come across scenarios where the employees are using GMail as the primary mode of email communication. (GMail also provides a paid service of email for corporates . ) Introduction to the Cookie Replay Attack : Hacking web application was always curious for the script kiddies. And hacking free web email account is every geek first attempt. The method which I will describe in this post is not new; the same method can be applied to yahoo … [Read More...]
Steganography : Hide EXE within the Jpeg Image File
Stenography : Hide EXE within the Jpeg Image File What is Steganography ? Steganography is the art and science of hiding information by embedding messages within other, seemingly harmless images or other types of media Steganography has become increasingly popular in the past years , majorily in hacking communities where it is extensively being used for hiding the executables within the image file . In the following tutorial I will show you how easy it is to hide an executable within an Image file . Here is a Noob Friendly tutorial on Steganography that explains how to hide exe within the Jpeg . 1. Save the … [Read More...]
Penetration testing of Men in middle attacks using ARP spoofing
Today we will learn how to perform Penetration testing of MITM attacks using ARP Spoofing. At first we must understand what is ARP spoofing and how hackers can use it to exploit and execute severe Men in Middle attacks. ARP spoofing is a type of attack in which a malicious actor sends falsified ARP (Address Resolution Protocol) messages over a local area network. This results in the linking of an attacker's MAC address with the IP address of a legitimate computer or server on the network. Let's see how to Pen test Man-In-The-Middle Attack by ARP spoofing of machine. So letz get … [Read More...]