So you want to become a Hacker! I will make you an expert hacker and I will do it for free. I can give you a 100% assurance that if you are willing to become a hacker, I can make you the best one. I will teach you everything I know. No one can be perfect, but experts always exist. Most people have aspirations to become a hacker but don't know where to start, or don't know the difference between what is good and what is bad. The media typically portrays hacking as negative, but it can be used for good, and I will you teach how. Note: YOU are the catalyst, I am just your guide. Disclaimer: It's up to every … [Read More...]
Featured Articles
Editorial Picks
Latest Blog Updates
Hacking BSNL Broadband Routers Tutorial by Hackingloops
Yesterday, we learned about hacking websites using SQLMAP and advanced persistent threats. Today, we are going to learn how to break into BSNL ADSL routers. Hacking BSNL broadband routers is quite interesting, so Hackingloops has developed a tutorial on Hacking BSNL broadband routers. Hacking BSNL Routers Note: This hack works on most new ADSL, ADSL2 , ADSL2 M routers. In this article we are going to hack into router to learn more about it. You might not know that this small and innocent looking modem is actually a "Linux CPU." Let's begin. First, do a nmap scan of this modem. Here is … [Read More...]
Advanced Persistant Threat Analysis with Network Traffic Analysis
A high degree of stealthiness over a prolonged duration of operation in order to complete a successful cyber attack can be defined as an Advanced Persistent Threat. The attack objectives therefore typically extend beyond immediate financial gain, and compromised systems continue to be of service even after key systems have been breached and initial goals reached. Today’s successful targeted attacks use a combination of social engineering, malware, and backdoor activities. Nart Villeneuve and James Bennett (Senior Threat Researcher) from Trend Mirco provide an ultimate guide for Detecting (APT) Advanced … [Read More...]
Hacking Websites using SQLMAP | HackingLoops Tutorials
Hackingloops is back with another tutorial on Hacking Websites. Today we will learn how to hack websites using SQLMAP. Using SQLMAP to hack websites is quite easy, if you know how to use it. Sqlmap is one of the most popular and powerful sql injection automation tools in existence. Get it from http://sqlmap.org/. In this tutorial we are going to learn how to use sqlmap to exploit a vulnerable web application and see what can be done with such a tool. For the list of options and parameters that can be used with the sqlmap command, check the following url https://github.com/sqlmapproject/sqlmap/wiki/Usage To … [Read More...]
Hacking Websites Using Directory Traversal Attacks
Hacking websites using Directory Traversal Attacks: Developers nowadays focus on OWASP's (open web application security project) top ten vulnerabilities. Since hackers use these vulnerabilities to hack websites, developers' focus has made a hacker's job more difficult. Hackingloops has developed this tutorial Directory Traversal Attacks (focusing on some of the top ten vulnerabilities). A directory is basically a folder where web designer's store their website files (with respect to server). By "directory traversal attack," I simply mean that the hacker is able to navigate between the directories and … [Read More...]