Posts

Doing the old stuff in new ways. Most of the commands we use to make batch files are actually the same commands first implemented in MS-DOS (An ancient microsoft OS). These DOS(Disk Operating System) commands can also be used in the command prompt window. Whatever your batch file does, you can do it through the command line interface (CLI). Start “Run”, or hit [Windows key + R]. Type “cmd”, and you’re presented with the CLI. You can type “help” to get a list of commonly used commands and their functions. I recommend you try out each and every single command you can find. Hacking is getting more and more user friendly everyday, CLIs are being replaced by GUIs (Graphical User Interfaces) – meaning in most places you won’t have to actually type in the commands, you can just select an option and press a button. But as of now, this is a work in progress. With more advanced hacking techniques, specially the ones that involve using BackTrack tools, you will find that majority of the hacks ...
Gotta start somewhere . This is it. In the cyber security world, the person who is able to discover a weakness in the system and manages to exploit it to accomplish his goal(Good or Bad) is referred as a Hacker , and the process is referred to as Hacking. Nowadays, People think that hacking is only hijacking Facebook accounts or defacing websites. Yes, it is also part of hacking field but it doesn’t mean that it is all there is. This is not even the tip of the iceberg. So what is exactly hacking and what should you do to become a hacker?! That is exactly what this website is for. The only thing you need to become a hacker is interest and dedication. You should always be ready to learn something new and learn to create something newer. Hacking is the practice of modifying the features of a system or finding a loophole, in order to accomplish a goal outside of the creator’s original purpose. Due to the mass attention given to the so called “Blackhats” or “Crackers” from the media, ...
Your choices make you who you are. Script Kiddie: Script Kiddies, in a word are noobs.They are the people who use tools, scripts, methods and programs created by real hackers. They are the ones who don’t know how a system works but are still able to exploit it with previously available tools, not by walking in the footsteps of actual Hackers but simply copying what they did and using it for malicious purposes. A script kiddie is that one annoying kid in class, who pisses off everyone else. Don’t be that guy. White Hat Hacker: White Hat hackers or Penetration testers are the good guys who hack for security purposes. Although what they do is pretty much the same as bad guys, but a world of difference arises when it comes to ethics. The main aim of a Whitehat hacker is to improve the security of a system by finding security flaws and fixing it before the bad guys find and exploit it. They are usually officially employed by organizations and companies to protect their virtual ass...