Category Archives: News On Hacks

Free Ethical Hacking Workshop – Kathmandu oct 2016 “Hackers For Charity”, Hackers House

काठमाडौं मा “Hackers For Charity – NHC” अन्तर्गत पोखरा देखि ktm सम्म आयेर Oct 17, 2016 देखि सुरु भयेको “Ethical Hacking & Cyber Security” तीन दिने वोर्क्सोप आज समापन गर्न सफल भयेको छु । सर्बप्रथम, धन्येबाद चाइ RAC KTM Mid-Town लाई दिन चाहन्छु । धन्येबाद स्वोरूप, धेरै न सके पनि, केइ रकम चाइ Rtr. Alisha Rajbahak (Vice President of RAC KTM MID-TOWN for RY 2016-17) लाई हस्तान्तरण गरेको छु र सो रकम उहाँ आबद्ध रहेको RAC KTM Mid-Town Club मा जाने छ ।

तेसै गरि, RAC KTM MID-TOWN कै भाइ Rtr. Santosh Purbey, Rtr Kapil Ghimire, Rtr.Prabin Sharma र मलाइ Troubleshoot/Volunteer मा अत्याधिक सहयोग गर्ने भाइ Krishna Chalise , Pradeep Kc र Bishnu Chapagain भाइ लाई पनि धेरै धेरै धन्यवाद दिन चाहन्छु ।

-Regards : Bijay Acharya (

#nhc #CyberAware #ktmWorkshop #EthicalHacking 

ktm-workshop-by-nhc-bijay-acharya-1 ktm-workshop-by-nhc-bijay-acharya

Free Ethical Hacking Workshop – Day 2 : Pokhara, Nepal – 2016 OCT

​Actually “SQL Injection” was being explained to participants. Next to it, some interesting tips was being shown in projector. You can read it right ? 

#nhc    #CyberAware    #hcnepal     #hackingWorkshop    #ethicalhacking   Day 2. 

Hackers can track your keystrokes through your Wi-Fi signal – HC Nepal

Ethical Hacking Tutorials in NEPALI LANGUAGE here > > 

T​here’s almost nothing more private on your computer than the keystrokes you type in.

Think of typing your passwords, all your emails and instant messages, your Social Security number and credit card numbers, and even more private information meant only for the eyes of a select few. Now imagine all of those sensitive details landing in hands of strangers.

American and Chinese academics built a keystroke recognition system called WiKey consisting, at its simplest, of a standard router (sender) and laptop (receiver). WiKey can recognize typed keys in the middle of the system based on how the Wi-Fi signal lands on the receiver. 

More on :

“Hack The Pentagon” & earn some cash.

A pilot program aims to help the US Defense Department beef up its networks by finding any vulnerabilities that could be exploited.


For full news :

Awesome !!! Apple vs FBI (Apple Won) – 2016


Less than 24 hours after Google unveiled Password Alert, Security researcher devises a bypass

Less than 24 hours after Google unveiled Password Alert, Security researcher devises a bypass

A simple script exploit can take down Google’s latest anti-phishing extension, Password Alert

Google had launched its latest anti-phishing extension called Password Alert onWednesday  to protect Chrome users from phishing attacks on Google products.  However within 24 hours of releasing the new extension, a security researcher has devised a simple script exploit to bypass it.

Paul Moore, a information security consultant at UK based Urity Group has written a simple code exploit for Password Alert extension.SRC

Kali Linux Command Line Tutorials 1 – Introduction

BEINI for WEP & WPA WPA2 Wirless key Hack (Ethical Hacking – Step by Step Guide on Most Easy Way)

Part 1 – Hacking Basics (7 STEPS IN HACKING)

How We Track Wifi Hacker

How We Track Wifi Hacker

Wi-Fi Compromised / Hacked ?How to Track wi-fi Hackers?

Got a Wi-Fi net connection ? And do you think it is secure enough ? With the onset of cyber crimes taking place,your Wi-fi may be used illegally by hackers or some other people.Either you may get high internet bills in reward or you may be on headlines as your net may be compromised to send malicious emails to anyone,that’s what happened in India sometime ago in Mumbai Bomb blast case. Well,there comes MoocherHunter™ to rescue.

MoocherHunter™ is a mobile tracking software tool for the real-time on-the-fly geo-location of wireless moochers and hackers. If you have ever wondered about the possibility of your wireless network getting used for illegal purposes, you must consider using Moocher Hunter. Continue reading How We Track Wifi Hacker