What is DNS Cache Poisoning?

DNS cache poisoning, also known as DNS spoofing, is a type of attack that exploits vulnerabilities in the domain name system (DNS) to divert Internet traffic away from legitimate servers and towards fake ones. One of the reasons DNS poisoning is so dangerous is because it can spread from DNS server to DNS server. In […]

How to Make Your Own Windows Registry Hacks

Over the years, we’ve created many Registry hacks to customize and tweak your Windows computer. Today we’re going to give you the keys to making your own registry hack files that you can use on any computer. Before we go further, it’s worth noting that even reading this article and thinking about the registry will […]

How to Create Your Own Virtual Hacking Lab

Many of you here are new to hacking. If so, I strongly recommend that each of you set up a “laboratory” to practice your hacks. Just like any discipline, you need to practice, practice, and practice some more before you take it out to the real world. In many disciplines, if you don’t practice, you […]

How to See What Others Are Browsing Over Your WiFi

See What Others Are Browsing on Your WiFi So you want to know what others are browsing on your network. But why? Well, there are few practical reasons. Like– You are a parent and wants to monitor your children activity on the internet You are sharing WiFi with your neighbors and would like to know if they […]

The Top 10 Web Hacking Techniques Used by the Hackers

The most influential research on vulnerabilities and exploits, as voted on by the security community. FREAK SSL/TLS Vulnerability that would allow attackers to intercept HTTPS connections and force them to use weakened encryption. Researchers: Karthikeyan Bhargavan at INRIA in Paris and the miTLS team Further details on the research: https://freakattack.com Logjam Another TLS vulnerability that […]

How do Hackers Hack ATM Debit/credit cards using RAM scrapers Malware

RAM scraper malware After Target’s CEO admitted that the malware behind the massive data breach was found on POS registers in Target stores, Duck explained that POS malware called a RAM scraper scoops up the unencrypted card data during the split-second when it’s vulnerable: while it’s being processed at the register. “RAM scraping works because […]

Microsoft Windows 10 has a keylogger enabled by default – here’s how to disable it

Many Windows 10 users are unknowingly sending the contents of every keystroke they make to Microsoft due to an enabled-by-default keylogger. This function has been around since the beginning of Windows 10, and is a prime example of why you should never go through the default install process on any Operating System. Windows 10 privacy […]