In this post, we are going to learn the 5 phases of hacking which is used when hacking into systems. These are the phases which a typical hacker goes through in order to successfully compromise a system. 1. Reconnaissance So the first phase of hacking is reconnaissance. Also known as Information Gathering. It is done … Continue reading The 5 Phases of Hacking
A quick look at how and possibly why young Kenyan techies and nerds are turning into black hat hackers and are targeting financial systems and organizations e.g banks. Hint? This problem stems from the lack of job opportunities and security for the youth especially those in the I.T industry.
What is a DDoS Attack? First, we must define the meaning of a DDoS attack. DDoS attacks are a main concern in internet security, and many people misunderstand what exactly they are. A Distributed Denial of Service (DDoS) attack is a malicious attempt to upset typical internet traffic of a targeted server by overwhelming it … Continue reading Top 15 Cyber Attack Maps for Visualizing Incidents
Hey everyone? How are you? Today i would like to touch on security by listing(with links) The Top Open Source Security Tools i personally recommend. Many of these tools can be used by anyone. So let's hop in! Notice: If you are interested in testing these tools they are all available to download and use … Continue reading Top 15 Essential Open Source Security Software and Tools
Penetration Testing also known as Ethical Hacking is the practice of testing a computer system, network or web application to find security vulnerabilities that an attacker could exploit. It can either be automated with software applications or performed manually. FSociety is an open source penetration testing framework that consists of a variety of hacking tools … Continue reading FSociety: A Penetration Testing Framework
Hey guys, how are you? I am back again with another post. You can also check out my previous post on "Using Android as a Hacking Platform: No Root". It has hit! With more than 23 hits each day since i posted it. So far it has gained 1,278 views. Now it’s possible to open … Continue reading How to Turn an Android Phone into a Hacking Device Without Root
Have you ever installed an antivirus tool on your computer? Read a story about WikiLeaks or the Arab Spring? Opened a bank account? Then hacking is important to you, even if remains largely in the background of your life. It makes sense to get informed about it. Unfortunately, it is a very technical subject, with … Continue reading Hacker/Cybersecurity/I.T Jargon Explained
If you’re interested in a career in penetration testing then testing your skills is a must. Having your own home penetration test lab is a great way to test new pentesting skills and penetration testing software. Practicing is always the best way to improve your skills, however, the problem with hacking is that any real-world … Continue reading How to Build Your Own Pentesting/Hacking Lab
What Are Top 10 Common Hacking Techniques? PhishingDenial of Service [ DoS/DDoS ]Waterhole attacksFake WAPEavesdroppingKeyloggingVirus, TrojanClick JackingCookie theftBait & switch Phishing When a hacker uses phishing, he usually replicates a very popular site with the idea of making the user sign in and use his credentials in there. The hacked information will be used on the … Continue reading Most Common Hacking Techniques
If you’re going to be spending your time hacking, you need a powerful and robust hacking laptop. Hacking involves cracking passwords, penetration testing, DDoS attacks, and intruding networks. These activities require your hardware to handle heavy amounts of data, be able to run virtual machines, have access to programming environments, and be able to do … Continue reading Laptop Specification For Hackers
Cybersecurity and Ethical Hacking Certifications: Many organizations are facing security threats than ever before. Data Breaches are growing in number, and sizes and systematic hacks of company resources are taking place more frequently. These signs indicate that the cybersecurity skills are highly great demand and a good field to launch your IT career path. As … Continue reading Top Certifications for Cybersecurity and Ethical Hacking Enthusiasts
Hey guys, how are you? Today I'll share the apps used for hacking on android. NB: Some of these apps could be bundled with viruses, so research or install them in a separate device, one that you will only use for pentesting legally. For No Root Users check this post: https://ajulusthoughts.wordpress.com/2018/12/11/using-android-as-a-hacking-platform-no-root/?wref=tp ZAnti Penetration Testing Android … Continue reading Android Hacking Apps: Root and No Root
Hey guys, i am back again with another article, and today i want to touch a bit on Kenya's Cybersecurity issue. Most of us have heard the NEWS, Kenya has a major cybersecurity issue. Kenya has the highest internet penetration in Africa with over 31 million people having access to the internet, according to a … Continue reading Kenya’s Cyber Insecurity
Hey guys, how are y'all doing? Another massive data dump has just occurred. And as the title says it's big and serious. I'll post links to help you check out if your passwords or emails are part of the dump. My advice, whether or not you find your data, go change your password to a … Continue reading Massive ‘Collection #1’ Breach Exposes 777 Million Emails, 22 Million Passwords
Hey guys, we are back again with another informative post. Which hat do you think fits you or that friend you know knows hacking? To start is to define a hacker: A hacker is a person with specific skill sets, they use to access computers/laptops/servers/data/information without anyone knowing or gaining authorization/a password. Now there are … Continue reading Types of Hackers: Which Hat Fits You?
Hey guys, How are you doing? Today i would like to touch on a topic for white hats, green hats and penetration testing/ethical hacking enthusiasts out there. Hacking and Pentesting using your smartphone. Now before we start I'd like to point out a few things:- First many fail to see the potential of their smartphones, … Continue reading Using Android as a hacking platform: no root