How To Hack: Using Netcat

For over 15 years, a tiny but powerful tool has been used by hackers for a wide-range of activities. This tool goes by the name of netcat, and although well known in hacking circles, it’s virtually unknown outside. It’s so … Continue reading

FOCA: Target Information Gathering with Metadata

Metadata is an interesting and often unrealized problem for anyone who uses office applications, like Microsoft Office, OpenOffice, and Adobe Acrobat. Its impact is often misunderstood both from the publicity and security standpoint. On one hand, metadata provides the necessary … Continue reading

Four Ways Hackers Crack a Facebook Password and How to Protect Yourself

Everyone is addicted to Facebook. Admit it, your Mom and your Brother are on it and as soon as you turn 13, you will be signing up too! Lol, j/k… This has led Facebook to break record numbers with over … Continue reading

How to setup DarkComet RAT for Easy Access to a Target Computer

Note: In this format, the RAT program will quite easily be detected by anti-virus software. In order to evade such detection you will have to crypto the DarkComet RAT. It must become undetectable in order to use stealthily. Or, the … Continue reading

How To Use Zenmap in Kali Linux! Scan local network for victims or intruders! Find open ports!

Zenmap is the official Nmap Security Scanner GUI. It is a multi-platform (Linux, Windows, Mac OS X, BSD, etc.) free and open source application which aims to make Nmap easy for beginners to use while providing advanced features for experienced … Continue reading

Attack the Attacker: Get a Hacker’s IP from the Virus on your Computer

Welcome to today’s tutorial. Here, I will be showing you how to get a hacker’s IP once you have identified the Trojan or other malicious software. You might think this would be very difficult or require special technical skill, but … Continue reading