Ethical Hacking

USB Kill to Destroy any Computer within Seconds

Hong Kong-based technology manufacturer is selling a USB thumb drive called USB Kill 2.0 that can fry any unauthorized computer it’s plugged into by introducing a power surge via the USB port. It costs $49.95. How does USB Kill 2.0 work? As the company explains, when plugged in, the USB Kill 2.0 stick rapidly charges […]

USB Kill to Destroy any Computer within Seconds Read More »

Hacker reveals How He Could have Hacked Multiple Facebook Accounts

How to Hack a Facebook Account? hat’s possibly the most frequently asked question on the Internet today. Though the solution is hard to find, a white hat hacker has just proven how easy it is to hack multiple Facebook accounts with some basic computer skills. Your Facebook account can be hacked, no matter how strong

Hacker reveals How He Could have Hacked Multiple Facebook Accounts Read More »

5 Facts to learn from Mr. Robot (TV Series)

kryptos-bytes: If you don’t know about Mr. Robot, then you are living in a world full of Illusions. Mr. Robot is an American drama–thriller television series created by Sam Esmail. It stars Rami Malek as Elliot Alderson, a cybersecurity engineer and hacker who suffers from social anxiety disorder and clinical depression. Alderson is recruited by an insurrectionary anarchist

5 Facts to learn from Mr. Robot (TV Series) Read More »

The Different Types Of WLAN Authentication — Basics Of Networking

When a wireless network is deployed, authentication is the first thing that needs to be done before connecting it to devices. So, It is important to know the different aspects of the authentication methods. However, authentication should not be mistaken with the authorization.  Authentication is a process by which the identity of a user is verified

The Different Types Of WLAN Authentication — Basics Of Networking Read More »

New Blackarch Linux Version Released Now Provides 1400 Pentesting Tools

BlackArch Linux version 2016.04.28 released for ethical hackers and security researchers with 1400 pentesting tools If you are an ethical hacker or a security researcher, this news will undoubtedly interest you. The BlackArch Linux devs have released-the new ISO image of the Arch Linux-based operating system designed for designed specially for hackers and security professionals. After being

New Blackarch Linux Version Released Now Provides 1400 Pentesting Tools Read More »

How to Hack Android Phone with Kali Linux Msfvenom

Hacking Android Phone with Kali Linux Msfvenom acking Android With Kali Linux Msfvenom can be very easy using klai linux android meterpreter reverse_tcp which will develop an application with and .APK extension  that contains embedded Meterpreter functionality as well as new functions unique to the Android version of Meterpreter. We will set up a listener

How to Hack Android Phone with Kali Linux Msfvenom Read More »