In this post, we are going to learn the 5 phases of hacking which is used when hacking into systems. These are the phases which a typical hacker goes through in order to successfully compromise a system. 1. Reconnaissance So the first phase of hacking is reconnaissance. Also known as Information Gathering. It is done … Continue reading The 5 Phases of Hacking
A quick look at how and possibly why young Kenyan techies and nerds are turning into black hat hackers and are targeting financial systems and organizations e.g banks. Hint? This problem stems from the lack of job opportunities and security for the youth especially those in the I.T industry.
Hey guys, how are you? I am back again with another post. You can also check out my previous post on "Using Android as a Hacking Platform: No Root". It has hit! With more than 23 hits each day since i posted it. So far it has gained 1,278 views. Now it’s possible to open … Continue reading How to Turn an Android Phone into a Hacking Device Without Root
What Are Top 10 Common Hacking Techniques? PhishingDenial of Service [ DoS/DDoS ]Waterhole attacksFake WAPEavesdroppingKeyloggingVirus, TrojanClick JackingCookie theftBait & switch Phishing When a hacker uses phishing, he usually replicates a very popular site with the idea of making the user sign in and use his credentials in there. The hacked information will be used on the … Continue reading Most Common Hacking Techniques
Hey guys, we are back again with another informative post. Which hat do you think fits you or that friend you know knows hacking? To start is to define a hacker: A hacker is a person with specific skill sets, they use to access computers/laptops/servers/data/information without anyone knowing or gaining authorization/a password. Now there are … Continue reading Types of Hackers: Which Hat Fits You?