Category Archives: News On Hacks

Mirai Botnet Source Code : Leaked Mirai Source Code for Research/IoC Development Purposes – Download Mirai Botnet Source Code


Leaked Mirai Source Code for Research/IoC Development Purposes 

Get it here ; https://github.com/jgamblin/Mirai-Source-Code 

AD : Digital Forensics & Ethical Hacking Tutorial Videos in youtube. Youtube.com/studentvideotutorial (watch and review) 

Disclaimer

This repository is for academic purposes, the use of this software is your responsibility. 

Free Ethical Hacking Workshop – Kathmandu oct 2016 “Hackers For Charity”, Hackers House


काठमाडौं मा “Hackers For Charity – NHC” अन्तर्गत पोखरा देखि ktm सम्म आयेर Oct 17, 2016 देखि सुरु भयेको “Ethical Hacking & Cyber Security” तीन दिने वोर्क्सोप आज समापन गर्न सफल भयेको छु । सर्बप्रथम, धन्येबाद चाइ RAC KTM Mid-Town लाई दिन चाहन्छु । धन्येबाद स्वोरूप, धेरै न सके पनि, केइ रकम चाइ Rtr. Alisha Rajbahak (Vice President of RAC KTM MID-TOWN for RY 2016-17) लाई हस्तान्तरण गरेको छु र सो रकम उहाँ आबद्ध रहेको RAC KTM Mid-Town Club मा जाने छ ।

तेसै गरि, RAC KTM MID-TOWN कै भाइ Rtr. Santosh Purbey, Rtr Kapil Ghimire, Rtr.Prabin Sharma र मलाइ Troubleshoot/Volunteer मा अत्याधिक सहयोग गर्ने भाइ Krishna Chalise , Pradeep Kc र Bishnu Chapagain भाइ लाई पनि धेरै धेरै धन्यवाद दिन चाहन्छु ।

-Regards : Bijay Acharya (www.bijayacharya.com)

#nhc #CyberAware #ktmWorkshop #EthicalHacking 

ktm-workshop-by-nhc-bijay-acharya-1 ktm-workshop-by-nhc-bijay-acharya

Free Ethical Hacking Workshop – Day 2 : Pokhara, Nepal – 2016 OCT


​Actually “SQL Injection” was being explained to participants. Next to it, some interesting tips was being shown in projector. You can read it right ? 

#nhc    #CyberAware    #hcnepal     #hackingWorkshop    #ethicalhacking   Day 2. 

Hackers can track your keystrokes through your Wi-Fi signal – HC Nepal


Ethical Hacking Tutorials in NEPALI LANGUAGE here > > www.youtube.com/studentvideotutorial. 

T​here’s almost nothing more private on your computer than the keystrokes you type in.

Think of typing your passwords, all your emails and instant messages, your Social Security number and credit card numbers, and even more private information meant only for the eyes of a select few. Now imagine all of those sensitive details landing in hands of strangers.

American and Chinese academics built a keystroke recognition system called WiKey consisting, at its simplest, of a standard router (sender) and laptop (receiver). WiKey can recognize typed keys in the middle of the system based on how the Wi-Fi signal lands on the receiver. 

More on : http://news.hcnepal.com/2016/09/02/hackers-can-track-your-keystrokes-through-your-wi-fi-signal-hc-nepal/

“Hack The Pentagon” & earn some cash.


A pilot program aims to help the US Defense Department beef up its networks by finding any vulnerabilities that could be exploited.

image

For full news : CNET.com

Awesome !!! Apple vs FBI (Apple Won) – 2016


image

Less than 24 hours after Google unveiled Password Alert, Security researcher devises a bypass


Less than 24 hours after Google unveiled Password Alert, Security researcher devises a bypass

A simple script exploit can take down Google’s latest anti-phishing extension, Password Alert

Google had launched its latest anti-phishing extension called Password Alert onWednesday  to protect Chrome users from phishing attacks on Google products.  However within 24 hours of releasing the new extension, a security researcher has devised a simple script exploit to bypass it.

Paul Moore, a information security consultant at UK based Urity Group has written a simple code exploit for Password Alert extension.SRC

Kali Linux Command Line Tutorials 1 – Introduction


BEINI for WEP & WPA WPA2 Wirless key Hack (Ethical Hacking – Step by Step Guide on Most Easy Way)


Part 1 – Hacking Basics (7 STEPS IN HACKING)