Follow

The Justice Knight. Supporting the poor & powerless. Bringing justice to the world.

Owner: darksteoroid

Listed in: Technology

Language: English

Tags: Hacking, Pentesting, Networking, Linux, Tips and tricks

Report it


Site Statistics

Unique Visitors Today:
0
Page Views Today:
0
Unique Visitors this Week:
0
Page Views this Week:
0
Unique Visitors this Month:
0
Page Views this Month:
0
Total Unique Visitors:
49
Total Page Views:
59
Total Hits Out:
49
Traffic Chart

Latest Blog Posts for Fictional Hackers Group

  • Types Of Programming Language
    on Dec 28, 2014 in TYPES OF PROGRAMMING LANGUAGES
    How to become Professional Ethical Hacker, However still it wasn't complete guide, Many people's asked me which programming languages should i learn, So here I'm with new article - which programming language one should know and learn to become a succ...
  • OWASP Web App Testing Guide v4.0An Inspirational interview of a very passionate pentester and security researcher. Today I've shared latest release of an Ebook by OWASP - Web Application Pentesting Guide v4.0, I'm reading it from last 3 days and trust me its one of the best ebook t...
  • Important Programming Languages for Ethical Hackers
    on Dec 23, 2014 in PROGRAMMING LANGUAGES FOR EH
    How to become Professional Ethical Hacker, However still it wasn't complete guide, Many people's asked me which programming languages should i learn, So here I'm with new article - which programming language one should know and learn to become a succ...
  • How to become Professional Ethical Hacker
    on Dec 16, 2014 in Hacker
    Hi guys, In this article I'm gonna tell you some effective tips on How to become professional Ethical Hacker. Well I'm neither a professional nor an expert, the below article is totally based on my experiences, knowledge and some tips by professional...
  • MYSQL Database Manual SQL Injection Tutorial
    on Dec 3, 2014 in SQL INJECTION
    MYSQL Database Manual SQL Injection TutorialHello guys, hope you all are doing great. Today i will explain manual SQL Injection on MYSQL database. Requirement for this is only a sqli vulnerable site and some patience. For this tutorial, we’ll be...
  • How To Hack Websites With SQL Injection
    on Dec 3, 2014 in SQL INJECTION
    How To Hack Websites With SQL InjectionSQL Injection attacks are code injections that exploit the database layer of the application.Step 1: When testing a website for SQL Injection vulnerabilities, you need to find a page that looks like this:www.sit...
  • Cracking PDF User Passwords Or Editing Encrypted PDF ( Tutorial )
    on Dec 3, 2014 in MULTIMEDIA HACKS
    Cracking PDF User Passwords Or Editing Encrypted PDF ( Tutorial )PDF has become one of the most popular and widely used file format. Today mostly all the ebooks are available in PDF format. But many times the PDF files are password protected by th...
  • Bypassing Firewalls and Avoiding Detection
    on Nov 23, 2014 in NETWORK
    Bypassing Firewalls and Avoiding DetectionBypassing Firewalls and Avoiding DetectionThe type and scope of the penetration test will determine the need for being stealthy during a penetration test. The reasons to avoid detection while testin...
  • What is BackTrack 5
    on Nov 23, 2014 in BACKTRACK 5
    What is BackTrack 5Backtrack is a very popular linux distribution for penetration testing. It has hundreds of tools for pentesting and hacking. BackTrack provides users with easy access to a comprehensive and large collection of security-related...
  • How To Install Kali Linux or Backtrack on Windows
    on Oct 15, 2014 in KALI LINUX
    How To Install Kali Linux or Backtrack on WindowsToday, I’m going to guide you step by step to install Kali Linux in windows using VMWare. Kali Linux is the best OS for penetration testing. Kali Linux is a Debian-derived Linux distribution designed...
Loading Comments...

Comments

{ds_PageTotalItemCount} commentcomments
{pvComments::date}
{pvComments::comment}

Post a Comment

Close