Hacking a Website

Hacking a Website I will explain all the methods used to hack a website or website’s database. This is the first part of the hacking websites tutorial, where I will briefly explain all the methods used for hacking or defacing websites. Today, I will give you the overview, and in Read more…

Loading

All the Terms Of Hacking

Common Terms Of Hacking World 1#DDoS: DDoS  means Distributed Denial of Service. This is a type of DOS attack in which multiple compromised systems are used and these systems are often infected with a Trojan. All these infected systems select a target and cause a Denial of Service (DoS) attack. 2# VPS: It stands for Virtual private server Read more…

Loading

Secure your website

Nowadays, websites are necessary for most of the businesses and especially in e-commerce. Every attacker knows that your site holds customers data. You’ve worked hard on your site (and your brand) – so take some time to secure it. You should do the following steps to ensure your website is Read more…

Loading

Tools Category

Pybelt

Pybelt The Hackers Tool Belt   Pybelt is an open source hackers tool belt complete with: A port scanner SQL injection scanner Dork checker Hash cracker Hash type verification tool Proxy finding tool XSS scanner It is capable of cracking hashes without prior knowledge of the algorithm, scanning ports on Read more…

Loading

Tools Category

SQL Vulnerability Scanner (Whitewidow)

SQL Vulnerability Scanner Whitewidow Whitewidow is an open source automated SQL vulnerability scanner, that is capable of running through a file list, or can scrape Google for potential vulnerable websites. It allows automatic file formatting, random user agents, IP addresses, server information, multiple SQL injection syntax, ability to launch sqlmap Read more…

Loading

Tools Category

Reversemap

Analyse SQL injection attempts in web server logs   reversemap Analyse SQL injection attempts in web server logs The program can either be run in batch mode or interactive mode. In batch mode the program will accept Apache web server logs and will deobfuscate requested URLs from the logs. In Read more…

Loading