Saturday, October 13, 2018

Miss concepts of TOR and How to use TOR

The Onion Router or the well known TOR is the most popular platform for being anonymous by freed from clearnet. For years it had well recognition for anonymity, but lately there was some bad news regarding the security of the TOR network, revealing TOR users and some of security breaches. Some of these has been exposed, but some of them are in a blackhole inside this network. As a result there is a trend to use a VPN with TOR browser. There are lots of guides to configure TOR with a VPN. Some of these solutions has raised because of the miss concepts. Therefore before getting into correct or wrong of these news and solutions, it must have to take a look into what happens inside TOR.

Friday, July 20, 2018

VPN setup for kali

VPN is a essential part in using kali. Here is a simple setup of vpn for kali.


Tuesday, February 20, 2018

Link shortner for bypass phishing detection bitly

Recently there was a huge video link scam based on facebook users for hack their fb accounts. It is a phishing attack which is prompting for user name and password for fb login.

Message actually comes as a video which claims that victim was there. As its comes from user's friend and he/she was in the video most of victims open the link with the panic situation. Then it will goes to fb login page which user needs to put there user name and password. Finally the hacker will take the control of victim's fb account. Then hacker will send the same message to victim's friends also.

Important thing in here it has used bitly for short and mask phishing site's url.as it is shorten fb phishing site detection could be bypassed by the hacker. Therefore bitly.com is a good site for short your phishing site's link and bypass the phishing site detection

Friday, February 16, 2018

Wiper malware steps



  1. Steal credentials from browser and system.
  2. Spread to other systems using psexec and WMI tools.
  3. First delete all shadow copies of files and windows backup catalogs.
  4. Turn off recovery mode.
  5. Delete system logs.


This will cover tracks and making difficult to recover

Sunday, November 5, 2017

Facebook search people by number

Facebook has a good database of phone numbers of people who has been signed up. Any person who is going to create an FB account should have a phone number. Facebook allows to search people through this number. Normally if you typed phone number on the find friend bar on facebook it normally search for the person with that number. But it wont works sometimes. Following is a trick for getting around this.

http://m.facebook.com/search/?query=123456789

Here is the magic link for check a person from his number. In this link instead of 123456789 put the phone number with area code.

Thursday, October 5, 2017

9 books for ethical hackers


The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography [Kindle Edition]

Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker [Kindle Edition]

Rtfm: Red Team Field Manual

CISSP All-in-One Exam Guide, 6th Edition

Wednesday, August 2, 2017

Softether VPN

VPN or Virtual Private Networks are leading technology in networking for purposes from connecting to office PC in home to connecting two or more WANs for secure communication. Companies and organizations use VPNs for secure their communication while some computer users use VPNs for easy to connect to a remote networks. Hackers use VPNs for get annonymous. So VPNs are used for different purposes in different ways.