How to hack windows 10 using kali linux remotely with metasploit – 2018

Microsoft claims that windows 10 has fixed all security vulnerabilities. We cant hack a windows PC with a remote exploit like ” ms08_067_netapi ” anymore. Windows have fixed that vulnerability. so sad. wait a minute, Then how can we hack a windows pc is that even possible now? The answer is yes, windows machines are still […]


How to hack a database with sql injection – sqlmap

We all know websites need a database to store data. That is called s RDBMS – relational database management system. These databases store data in tables and columns so that it can be accessed easily. Server side languages like PHP can interact with SQL database with proper authentication and has read/write permission. Most of the sensitive information are stored in […]


How to backdoor and deface a web server using weevely

In the web almost 82% of servers are running on PHP. Its a simple open source server side scripting language. A website consist of PHP, HTML, CSS, Javascript mostly. Among these PHP directly interact with the server i.e. logical calculations and stuffs other languages are for user interface. PHP can also contact sql server for […]


How to launch dos attack – slowloris

In computing, a denial-of-service (DoS) attack is an attempt to make a machine or network resource unavailable to its intended users, such as to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet. A distributed denial-of-service (DDoS) is where the attack source is more than one–and often thousands of-unique IP […]


How to hack an android phone – metasploit

Android is the most popular mobile platform and its users are increasing day by day, and security threat too. Android phones are vulnerable and can be easily backdoored. Metasploit is the best tool in kali linux which can generate and handle a payload. Metasploit have more than 1000 exploits which is more than enough. Now […]


How to hack WPS protected wifi router

Reaver-wps targets the external registrar functionality mandated by the WiFi Protected Setup specification. Access points will provide authenticated registrars with their current wireless configuration (including the WPA PSK), and also accept a new configuration from the registrar. In order to authenticate as a registrar, the registrar must prove its knowledge of the AP’s 8-digit pin […]


How to hack facebook – 2017 100% working

Hacking facebook is nearly impossible. Then how facebook accounts are hacked? Actually hacking into facebook database is nearly impossible. Its not an easy job (only a few had done it.. lol). But still there are many other ways to hack an account. Here is one method – ‘phishing’. Phising means collecting sensitive data like passwords […]