Posts

Top 10 Most Notorious Hackers of All Time

  W hat is hacking? Computer hacking is the act of identifying and exploiting system and network vulnerabilities in order to obtain unauthorized access to those systems. Not all hacking is malicious. White hat hackers may work in cyber security or as software engineers and testers seeking out vulnerabilities in order to fix them. Black hat hackers operate with malicious intent. That said, there is a large grey area populated by political activists and hackers who wear both hats. Hacking costs companies and consumers trillions of dollars every year. According to  CPO Magazine , by 2021, hacking attacks will cost a total $6 trillion, up from $2 trillion in losses reported in 2019. Much of the  cyber crime  problem stems from the same features of the internet from which we all benefit. Even the most amateur hacker can easily find all the tools they need online at virtually no cost. The hacker onslaught didn't occur overnight. It took decades of work by now-famous hackers to discover c

How to Use Nmap: Commands and Tutorial Guide

Image
  What is Nmap? At its core, Nmap is a network scanning tool that uses IP packets to identify all the devices connected to a network and to provide information on the services and operating systems they are running. The program is most commonly used via a command-line interface (though GUI front-ends are also available) and is available for many different operating systems such as Linux, Free BSD, and Gentoo. Its popularity has also been bolstered by an active and enthusiastic user support community. Nmap was developed for enterprise-scale networks and can scan through thousands of connected devices. However, in recent years Nmap is being increasingly used by smaller companies. The rise of the IoT, in particular, now means that the networks used by these companies have become more complex  and therefore harder to secure . This means that Nmap is now  used in many website monitoring tools  to audit the traffic between web servers and IoT devices. The recent emergence of  IoT botnets, li

How to Hack websites use sqlmap

Image
  URLs Let’s say you have a url like this http://www.site.com/section.php?id=51 and that it is prone to sql injection because the developer of that site did not properly escape the parameter id. This can be tested simply by trying to open the url http://www.site.com/section.php?id=51′ We just added a single quote in the parameter. If this url throws an error, then it is clear that the database has reacted with an error because it got an unexpected single quote. Hacking with sqlmap Now its time to move on to sqlmap to hack such urls. The sqlmap command is run from the terminal with the python interpreter. python sqlmap.py -u “http://www.site.com/section.php?id=51” The above is the first and most simple command to run with the sqlmap tool. It will check the url and try to discover basic information about the system. The output can look something like this [*] starting at 12:10:33 [12:10:33] [INFO] resuming back-end DBMS ‘mysql’ [12:10:34] [INFO] testing connection to the target url sqlma