Dhacker Tutorials

All Posts..

Mitigation Strategies – Web Application Security

Hello Techies! In this blog, I'm sharing mitigation strategies points which you should be knowing when you are going for a cyber-security Analyst/Consultant interview. I have noted down these point from portswigger. Below is the list of vulnerabilities: 01.Web Cache...

How Hackers steal credentials by phishing attack?

In this blog we will see that how hacker can steal data using phishing attack. Phishing attacks are one of the oldest attacks, but still in trends because of various new methodologies. The only aim of phishing attack is to steal victims sensitive data falling them...

How to Setup Private Search Engine?

In this blog we will setup private search engine. Yes! you heard it right, we will be setting up custom search engine which will be running on the localhost. This search engine will give out all the information on the localhost. Now, to get an idea about how it work,...

Hacking Webcam with just one link – Saycheese

https://www.youtube.com/watch?v=_hO5uFlKsJI Subscribe to our channel In this blog we'll see that how easily hacker can compromise your privacy by hacking webcam. By term "Hacking Webcam", I don't mean only computer webcams, it can be your phone's front camera or...

Hacking Android Over Internet – Any device WAN/LAN

In this blog we will practically Hacking Android Over Internet step by step, no matter its on the WAN (internet) or Local network. This blog is mean to be knowledge purpose only and to get aware about the strategies which Blackhat hackers use to hack android devices....

Install and Setup Ngrok in Kali Linux

In this blog, we will install and setup Ngrok tool, which is an open source tool used by large number of infosec community. https://youtu.be/750XPaLHRAM Subscribe Our Youtube Channel This tool provides a tunnel like feature. It will work as request forwarding all your...

CrySIS aka Dharma Ransomware

Hey Techies! Back again with a new blog. In this blog, I will be talking about CrySIS Ransomware which is also known as Dharma Ransomware. This ransomware is again in light these days and affecting businesses running Windows systems Dharma Ransomware is in the market...

Kali Linux on Windows CMD – Easy Setup Guide

Hello Techies! In this blog, we will install Kali Linux on Windows as a sub-system so that we can use it with Windows using command line interface. Here I'm not talking about installing Kali Linux using Virtual box or VMware. Installing Kali as subsystem will be...

Nmap in Windows Command Line Interface

Hey Techies! In this blog, I will be showing you quick steps, following which you can install Nmap in Windows command line interface and you can use it just link Kali Linux, inside windows CLI (Command Line Interface). I'm using updated Windows 10, so you can consider...

Facebook 3D Photo – Turn your portraits to 3D

Facebook is continously developing their platforms into the field of Virtual Reality (VR) and great example of it is Facebook360 and Facebook 3D Photo. Few months ago, Facebook has released a new feature to its users. This feature is know as "3D Photo". Now there are...

Faceapp Pro – Is it really free?

We have been watching social media from few days, Faceapp is trending at peak and everyone is busy posting their smart looking pic in 50's. Faceapp was launched in 2017. It is a Russian Photo editing app, currently ranking at No.1 on iOS App Store in Photo Editing...

VLC Player Download – The Secure Way!

Recently, a news has been booming online that German national Computer Emergency Response Team i.e. CERT-Bund has identified a buffer-overflow issue in the latest version of the VLC player. The buffer-overflow is the issue related to memory and arise when the buffer...

Nmap top 10 commands you should know

Hey there Techies! In this blog we will be looking at Nmap top 10 commands you should know. It will be helpful if you are working or want to work in the field of network security, network architecture development, information security, information technology, ethical...

All you need to know about the new cryptoasset IOTA

In this cyber world, the need for decentralized and permission less systems is increasing day by day. Though Blockchain promised a compelling vision of decentralized networks their networks in recent times have become increasingly centralized around a few powerful...

How to protect crypto wallets in 2019

In this tech world, Security is a very complex issue. As every day we encounter with a report of a major hacking or ransomware violation. Moreover, millennial’s are investing more in Bitcoin, Ethereum, and a host of other cryptocurrencies making crypto security so...

5G and IoT : A New Global Era

When the fifth generation of wireless communications technology i.e. 5G arrives in 2020, engineers are expecting that it will become the backbone of the Internet of Things. As  5G is capable of data transmission ten times faster than today’s 4G networks, meaning data...

All you need to know about Blockchain

We are in the generation of cryptocurrency. You might have heard news about people getting rich by investing in Bitcoins and Etherum but to understand about it you need to understand the technology behind it – Blockchain. The blockchain is a distributed ledger...

How quantum computing impacts cryptography

A classical computer encodes data in binary digits that can only be a “1” or a “0” which we refer as bits whereas a quantum computer uses “qubits”. A single qubit can encode more than two states. And the Quantum computers that exist today can’t perform more complex...

Mega breaches of 2018 exposing 3.6 billion records

In the year 2018 Data Breaches Have Exposed 3.6 Billion Records making its second-worst year on record after 2017 which exposed seven billion records in total. Hacking is the leading cause for data breaches, accounting up to 57.1 percent in total and fraud was another...

The impact of hackers targeting small businesses

A recent SMB Group report says more than 70% of hackers are going to target small businesses. And due to weak cybersecurity protection and a lack of cash to cover the damages as many as 60 percent of hacked small-to-midsize businesses go out of business after six...

Read this before using a public WiFi

In 2018 where ever you go one thing you can find common i.e. Public Wi-Fi whether it may be a local coffee shop, libraries or a hotels or even airports you visit while traveling. Though these WI-Fi hotspots are everywhere, they're often not secure as you thought. They...

What you need to know about TalkTalk hack?

The UK based 20 years experienced TalkTalk Company which had businesses in broadband, telecoms and mobile network solutions got hacked in 2015.yesterday two friends who took part in TalkTalk website have been jailed. So here’s all you should know about the £77m hack....

How to protect your Facebook account from hackers in 2019?

The most popular social networking website Facebook with more than 2.23 billion active users has become a target for hackers this year. Recently Facebook announced a massive security breach affecting at least 50 million active users. As Facebook data is very unique...

All you need to know about “Masked Aadhaar”

The recent Supreme Court verdict of India on UIDAI’s Aadhaar has ensured stronger data protection safeguards which will accelerate India’s digital journey. In the landmark verdict, it restricted the use of Aadhaar authentication by private entities and allowed its...

The ultimate guide to choose a strong unhackable password

A few years back internet search giant Google released a list of the most common passwords, all of which are considered easily hackable and most insecure passwords which are too easy to guess such as the word "password" itself or name of a child, pet and family...

The Essential Security Tips to protect Your Instagram Account

Instagram is a platform for today’s generation to explore their creative side while taking photos and sharing them with their friends. Most People share their work and they create their own personal brand and it’s the most amazing app to discover great content from...

How to Secure Gmail in 2019

We are in a generation of the Internet which is offering too many features and opportunities to create collaborate and explore. And in that email is the most critical aspect of our digital identities. So it is important to keep our account safe and secure as it...

How to Secure Your Digitized Home?

We are the generation of people living in smart homes in a digitized world. Everything out there is connected to the internet via WiFi. Cool gadgets are making our lives smarter.   Everything is virtually connected but these connections aren’t secure as you...

How secure is using GB Whatsapp in 2018?

WhatsApp is a most powerful messaging app owned by Facebook. It allows users to send text messages, voice calls, video calls, images, documents and user location at free of cost. Although it has lots of features; it has limitations too such as we can only use a single...

How to secure your car from hackers in an autonomous world?

Automakers are progressing in protecting vehicles from cyber attacks, but the car hacking threat is still real and it may get increasingly serious once autonomous vehicles start hitting the roads in significant numbers in the 2020's. In the action movie The Fate of...

Top 12 Security Tips to Secure your iPhone from Hackers

There was a time when we used to think iPhones are most secure but now we know iPhones can be hacked too, even with the ever-increasing layers of security. It’s now possible for cybercriminals to hack an iPhone remotely via iCloud. To avoid hackers having access to...

How to Think Like Hacker for a Secure Business

With every new innovation, hackers are adapting themselves to the new environment. As technology becomes accessible younger generations are enjoying hacking simply for the challenge and thrill of it & of course for an added bonus of money and media attention. For...

How to Secure Android Mobile Phones from Getting Hacked

Despite having enhanced features, Android mobiles still remain susceptible to security threats. A hacker can distribute malicious Trojans capable of compromising device security, stealing personal and financial information most of the times. By following some security...

Tips and tricks to Prevent WordPress from getting Hacked

Over the past few years, hacking incidents have become too common. Your website can be easily hacked if it lacks computer security or if you use poor 3rd party applications or outdated scripts, or by simply responding to phishing emails. In a world of a hacking era,...

How to Boost Your WordPress Website Speed?

Boost your WordPress Website Speed! Hello Everyone! In this blog I will be talking about how to boost your wordpress website loading speed. When we open any website link, there is lots of things happening in back-end to satisfied our request. Now imagine that a...

Top 6 Tools for Information Gathering

Top 6 Tools I use for Information Gathering Hello Everyone!! Today I will be sharing 6 tools which I use for quick information gathering of a target web application. If you are a web application security expert, pentester or ethical hacker, you must be knowing that...

What you know about Cyber Security?

What is Cyber Security? Hello guys! Today I will be talking on cyber security. It is a very common word which almost every one of you have heard. But still there are people who have only heard about it and don’t have any idea what does cyber security represents? I...

You May Also Like…

Courses by Google, IBM and Others

Courses by Google, IBM and Others

Hey Techies! So,finally made your mind to get started with the courses offered by Google and other giants. There are...

Start Coding With Python

Start Coding With Python

Why Learn Python? Python gained a lot of popularity these days. If you are beginner to coding then you will get advice...