Hello viewers!
This is my first post in this blog as I have been honoured by the
admin of this blog as the author to add materials for the interested
viewers.
Anyways… Before I start anything I would make sure that all the viewers are comfortable and enjoying the posts
Okay now lets begin with the topic I have mentioned above.
What is the first thing that comes to your mind when you see a topic like
Website Hijacking ?? Do you feel like today after reading this you gonna hijack somebody’s website and bring the hell out of him?
lolz.. Well you can do that unless you are good at heart just to use
this material for educational and awareness purpose and the most
important thing is to safeguard your own website or your related website
that may be your family business or someone close enough needs to be
secured.
Alright as some of you may think why am I teaching you this and why
is the topic name hijack if I recommend you to secure and not steal.
Then let me tell you that the best way to secure yourself is to hack it
yourself. You can provide yourself the best security only when you are
good enough a thief
Well so here I begin with a motto to teach you guys how to secure yourselves.
Shall I ??
Okay! Here I go…
Edited by June, Chris Hadley, Max1508, Skycaptain95 and 58 others
If you have basic HTML and JavaScript knowledge, you may be able to
access password protected websites. This article will give you an easy
method to hack simple, less-secured websites of your choice simply
through HTML. Use it responsibly.
Note: This basic method works only for websites with
extremely low security barriers. Websites with robust security details
will not be susceptible to this kind of simple attack.
Ad
Steps
-
1
Open the site you want to hack.
Provide wrong username/password combination in its log in form. (e.g. :
Username : me and Password: ' or 1=1 --)An error will occur saying
wrong username-password. Now be prepared your experiment starts from
here.
Ad

Hey… Here today I came up with an article on Firewalls. I will speak
about how it works and how are they useful for cyber security purpose.
Well if you are a regular internet user then you might have heard of the
word ‘firewall’ long time before. Well, I will explain it to you with a
simple example, when an employee in his office tries to access a
website such as social network they get a message “Firewall used” on
their screen! This is what the function of a firewall. A firewall
protects the entire corporate network so that hackers cannot enter into
your private (corporate) network.

Hey
guys, today in this article I am going to talk about hacking a computer
using metasploit. I think, I have already mentioned about metasploit in
one of my article. Here I will give a general description on how it
works and to use it efficiently to hack into a PC and steal credentials
But remember, this is only for educational purpose and hence damaging any victim’s computer is at your own risk.
Note: The hacker can be traceable and hence additional techniques are required to make yourself safe!
So here goes the requirements and the procedure to hack into a PC.
Requirements:
Introduction to attack:
Nmap is a port scanner used to scan a computer to locate the open
ports. The ports are the path for the information that we need to steal.
For a normal computer usually 30-40 ports are kept open.To find the
number of ports open on your computer open command prompt
(Start>Command prompt) and type
netstat -ano
and
hit enter, you will get a list of open ports in your computer. You
need to have a basic knowledge on ports and port numbers to perform this
attack.
Using a tool such as Metasploit we can spoof into the PC and steal
the information from the corresponding port using commands. Learn to use
Metasploit at
http://www.metasploit.com/learn-more/how-do-i-use-it/.