Hey! Couple Quick Noob questions.i'd Like to Know That in Order to Find Bugs or Vulnerablities in Sites Like Facebook,Google Do I Need to Get Permission First or I Can Just Start Finding Vulnerablities and Report Them When I Found Them? And Do I Need to Stay Anonymous While Finding Vulnerablities Because I Am Going to Report Them if found.do I Need to Hide My Identity?..Thanks
I need help. I don't know who to trust and have kept pretty much quiet about situation for 6 months thinking I was crazy. I am not! Well.... not that kind of crazy. I have a stalker (that's able to consistently gain access to my home) and a hacker. I don't know if they are one of the same or not. I am unclear of their motives and I am sick and tired of it all. I am desperate and powerless. Please help. i don't know the appropriate way to reach out and struggle with change so I am behind the t...
Forum Thread: How to Make Your Files and Website Accessible to Public Without Uploading It to Any Servers?
-Mont3Cristo Have you ever wished if you where able to make your files and website accessible to public without uploading it to any servers? Well it is now possible so easily.
A new type of Vulnerability has been discovered by a Chinese infosec security researcher Xudong Zheng that makes it easy for hackers to do phishing.This vulnerability makes it almost impossible to identify phishing. By default, many web browsers use 'Punycode' encoding to represent Unicode characters in the URL to defend against Homograph phishing attacks. Punycode is a special encoding used by the web browser to convert Unicode characters to the limited character set of ASCII (A-Z, 0–9), sup...
-Mont3 Cristo Disclaimer: THIS BLOG IS FOR INFORMING THE RISK CAUSED BY PHISHING AND PLEASE DO NOT USE THIS FOR ILLEGAL PURPOSES.I AM NOT RESPONSIBLE FOR WHAT EVER AFTER EFFECTS YOU FACE IF YOU USE IT IN WRONG WAY!
hello guys in this tutorial i will show you how to hack windows with word file using metasploit download explot from here:
I recently finished Website hacking. Now i wanted to know the basic to advance method of computer hacking. Please list all the methods from basic to advance and some reference link . Thanks in advance
This is what i am doing root@kali:~# iwconfig
Well first of all I made a virus that is windows/meterpreter/reverse_tcp from Veil-Evasion and the exploit is working correctly in my computer but when i try it from my brother's computer it doesn't work at all but when i try it on my computer its fine as wine what should I do ? whats the problem i made my setups correctly the LPORT & LHOST but its not working in his computer I am wondering what is the cause behind this
Hello Everyone Hope you are in Good Health