No matter how strong your bricks are, I will break them

Hey all!! Today I am going to discuss about hashcat, the world’s fastest password cracking tool. Don’t worry if you do not know anything about cyber security. This article will help you to get an impressive knowledge about hashing and hashcat tool.

Before going to know about the tool let me briefly explain about what is hashing and why it really important to increase cyber security.

Hashing is based on a one-way mathematical function that is relatively easy to compute but significantly harder to reverse.

The most common ways…


Google to Auto-Reset Unused Android App Permissions for Billions of Devices


if I have it in my database I will exploit it

Hey all, Today I will be talking about Metasploit Framework. The Metasploit Framework is a modular, Ruby-based penetration testing platform that lets you write, test, and run exploit code. You may use the Metasploit Framework to test security vulnerabilities, enumerate networks, execute attacks, and elude detection. The Metasploit Framework is, at its core, a collection of widely used tools that provide a full environment for penetration testing and exploit creation.

The Metasploit framework is a sophisticated tool that can be used by both cybercriminals and ethical hackers to investigate…


Hey guys, I got to know from one of my lecturers about a website with many CTF practice challenges called (https://picoctf.org/), so I decided to try A few challenges and practice.

I found this challenge called “Scavenger hunt” and this challenge sounded pretty interesting, and I started to do it.

From the Description itself it gives the vibe of a scavenger hunt :P

Here is the description: There is some interesting information hidden around this site

And also, there is a small hint about the challenge as well: You should have enough hints to find the files, don’t run a…


Though you Try to hide you can never hide from me

Hey all today I am going to discuss about NMAP (Network Mapper). Nmap has achieved mass following from system administrators, security and network engineers, incident response teams, firewall administrators, penetration testers, desktop administrators, and domain administrators. Anyone who has a job function that requires to search for an open port Nmap will fulfill those services. This is an open source tool and this tool was initially introduced to the world in September of 1977 via an article named Fyodor.

Let’s discuss about some Nmap Features. This tool is packed…


US authorities have seized two domains supposedly selling unapproved drugs for the prevention or treatment of Covid-19 while falsely posing as sites run by Walmart. In this corona pandemic season this illegal drugs selling activity is a massive crime which threaten to people and their healthy who suffering from Covid-19.

The two domains — http://pharmacywalmart.com and https://stromectolivermectin.com — both resolved to https://en.pharmacywalmart.com/buystromectol-usa.html and featured unauthorized use of the Walmart logo in an attempt to lend credibility to a scam that cynically played on pandemic-related fears. Each site purported to offer experimental or unapproved treatments for Covid-19 while in reality only…


Twitter Launches Safety Mode To Block Abusive Comments


Is your Request an Original one? Are you sure about that?

Hey all, Today I will be talking about Burp Suite. Burp Suite is one of the most popular penetration testing and Vulnerability scanning tools out there that is used for web applications. This is mostly referred to as “Burp” and a proxy-based tool that is used to evaluate the security of web-based applications with hands-on testing. This was created by PortSwigger.

Various tools work seamlessly together in order to the entire testing process from the initial phase till the final attack phase. …


If you are a website, I will be the crawler

Hey all today I am going to write about OWASP’s Zed Attack Proxy (ZAP) tool which we can use to perform any kind of security testing even though you don’t have any background or knowledge on security testing.

Now without further delay lets dive straight away into the installing part of ZAP.

The initial step that we got to do is to go download ZAP on the system which you would be performing the tasks using ZAP

https://www.zaproxy.org/download/ — download link

SLIIT CS2

First they begin with Us..

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store