Related Posts
Facebook Account Recovery Code Phishing - Email Scam
11 Sep 2023 Dip Ranjan Sharma
The Facebook Account Recovery Code Phishing scam is a phishing attempt that targets Facebook users. The scam involves sending an a fake email claiming that Facebook has received a request to reset the recipient's password.
Categories
Want to be a Successful Hacker?
08 May 2023 Dip Ranjan Sharma
When you hear a word Hacker, The first thing comes to your mind is a person doing illegal activities using their computer. But reality is actually differ form that, Basically a hacker is a technical expert who uses their skill in different ways to solve problems or creating one.
Kali Linux 2023.1 Purple Distro (Kali Purple & Python Changes) New Update
14 March 2023 Dip Ranjan Sharma
The blog discusses the Purple Distro's latest version of Kali Linux 2023.1, highlighting its new user interface, Python enhancements, and other upgrades like as updated documentation, security fixes, and new tools.
Useful Kali Linux Commands - Every user should know
21 Feb 2023 Dip Ranjan Sharma
In this article, We have list Top 10 Kali linux Commands that will help you to be a perfect coder. Theses commands should every kali linux user should know.
Facebook Account Hacking - Top 3 methods
02 Sep 2022 Dip Ranjan Sharma
Phishing is the most common method to terminate someone's Facebook account. The most popular type of phishing is creating a fake login page, and send the link of page by e-mail or SMS or social media. The login page will look exactly like the Facebook login page.
Footprinting in Ethical Hacking
25 Jun 2022 Dip Ranjan Sharma
Footprinting is defined as a method of gathering information about a target computer system and the entities they belong to. With the help of the gathered information about target computer system, a hacker can execute a successful cyber attack.
How to access the dark web using tor browser process
16 Jun 2022 Dip Ranjan Sharma
The Dark Web, or Dark Net, is a small part of the deep web that is kept hidden on purpose. Websites and data on the dark web do typically require a special tool to access. The Dark Web and Tor are often used by journalists and whistleblowers to exchange sensitive information, including Edward Snowden himself.
Top 10 Kali Linux Tools For Hacker Or Most Used Tools
16 Jun 2022 Dip Ranjan Sharma
Nmap is an open-source network scanner that is used to recon/scan networks. It is used to discover hosts, ports, and services along with their versions over a network. It sends packets to the host and then analyzes the responses in order to produce the desired results. It could even be used for host discovery, operating system detection, or scanning for open ports. It is one of the most popular reconnaissance tools.