How to hack wifi (WPA2-PSK) password using Kali Linux 2.0

How to hack wifi (WPA2-PSK) password using Kali Linux 2.0 Hack Wap2-psk using the reaver method. Warning..!! WIFI hacking is illegal. “This video is only for educational purposes. I am not responsible for any consequences.” So let’s Start Cracking. Step 1: Open Terminal and Find out the name of your wireless adapter. , type ifconfig on a terminal. See Read more about How to hack wifi (WPA2-PSK) password using Kali Linux 2.0[…]

Tor Browser

The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked. The Tor Browser lets Read more about Tor Browser[…]

The Mallu Cyber Soldiers

On Sunday evening, over a hundred Pakistani websites including official government portals such as pakistan.gov.pk, president.gov.pk, and cabinet.gov.pk. were hacked. Later, a group called “Mallu Cyber Soldiers” took the credit for the feat, saying that it was payback for crashing the official portal of the Kerala Government. Just like the world-famous Anonymous hacktivists, “Mallu Cyber Soldiers” is Read more about The Mallu Cyber Soldiers[…]

Scan website for vulnerabilities in Kali Linux using Grabber

Grabber Package Description Grabber is a web application scanner. Basically, it detects some kind of vulnerabilities in your website. Grabber is simple, not fast but portable and really adaptable. This software is designed to scan small websites such as personals, forums, etc. absolutely not a big application: it would take too long time and flood Read more about Scan website for vulnerabilities in Kali Linux using Grabber[…]

Facebook Messenger vulnerability

 Facebook Messenger is an application of the Social Media Giant Facebook. More than 950 Million people are using this application for chatting, video calling and voice calling. But a shocking backdoor vulnerability has been found by a Cyber Security firm Check Point’s Security Researcher. The name of that security researcher is Roman Zaikan. What is the vulnerability? Roman Zaikan said It Read more about Facebook Messenger vulnerability[…]