Posts

Phreaker

Phreaking is a slang term for hacking into secure telecommunication networks. The term phreaking originally referred to exploring and exploiting the phone networks by mimicking dialing tones to trigger the automatic switches using whistles or custom blue boxes designed for that purpose. Generally speaking, curiosity about how phone networks operated motivated phreaks, rather than a desire to defraud telecommunications companies.  Phreaking has become synonymous with hacking now that networks have gone cellular and cracking them requires more clearly illegal methods. Phreaks - a combination of phone and freaks - were a defined subculture in the 1970s. Using relatively low-tech hacks like the plastic whistle from Captain Crunch boxes to the do-it-yourself blue boxes, phreaks maintained a social network similar to that of ham radio enthusiasts. The rising complexity of network security meant that more explicit lines needed to be crossed in order to continue phreaking. Possibly one of ...

Hacktivism

What is hacktivism? Hacktivism is the act of misusing a computer system or network for a socially or politically motivated reason. Individuals who perform hacktivism are known as hacktivists. Hacktivism is meant to call the public's attention to something the hacktivist believes is an important issue or cause, such as freedom of information, human rights, or a religious point of view. Hacktivists express their support of a social cause or opposition to an organization by displaying messages or images on the website of the organization they believe is doing something wrong or whose message or activities they oppose. Motivates Hacktivists Hacktivists usually have altruistic or ideological motives, such as social justice or free speech. Their goal is to disrupt services and bring attention to a political or social cause. For example, hacktivists might leave a visible message on the homepage of a website that gets a lot of traffic or embodies a point of view that the individual or grou...

Script Kiddie

What is a Script Kiddie? A script kiddie, or skid, is a term that describes a young hacker who has much to learn yet acts as if he or she knows everything. Most of them are teenagers who are in it for fun and treat hacking as a game. Mostly they hack for bragging rights. They also don’t make a real effort to improve their hacking skills. Most don’t even know how to write a hacking program or ‘script’ and are content to pirate those made by others. This lack of skills often leads to their arrest because they leave a trail that’s easy for investigators to track down. In Internet slang, “script kiddie” is a derogatory term used to describe a person who uses scripts or codes developed by real hackers to attack a network or website. Script kiddies have little to no coding skills, and rely on available tools or exploit kits to carry out an attack. Script kiddies also go by the term’s variations, such as “kiddie” or “skid. Script Kiddies Hackers Script kiddies differ from real hackers because...

Cracker vs Hacker

Computer cracker A computer cracker is an outdated term to describe someone who broke into computer systems, bypassed passwords or licenses in computer programs, or intentionally breached computer security. Computer crackers were motivated by malicious intent, for-profit, or just because the challenge was there. Cracker vs Hacker The antiquated phrase  computer   cracker  is not used anymore. It was originally proposed as an antonym, or the opposite, of the term  hacker . Hackers initially applied to only those who used their computing skills  without  malicious intent -- they broke into systems to identify or solve technical issues. Skillful technologists with altruistic motives were called  hackers ; those with bad intent were called  computer crackers . This distinction never gained much traction, however. In 1993, the Internet Users' Glossary defined a hacker as "a person who delights in having an intimate understanding of the intern...

PNP Coin (Digital Currenncy)

For All those who are interested in Crypto Currencies Or are Dealing or doing business in Crypto - Please kindly Sign up for this great new PNP Coin from Hong Kong, which is in its earlier stages and is very cheap to buy right now.  PNP Coin is World’s First Regulated Cryptocurrency – A sound long-term investment that seeks an opportunity in the regulated crypto industry. Use this link to Sign up  https://app.pnpcoin.com/invite?ref=UD57348 Helios Groups  a well-known wealth management company with over 10 years of experience in the field, has launched its own cryptocurrency, called the PNP coin  Pnp is the world's first regulated cryptocurrency, which has its roots in Hong kong. It is a kind of cryptocurrency backed up with exciting features and developments. Unlike other cryptos, PNP is completely regulated and thereby avoids all illegal transactional activities since all transactions are transparent and completely secure. PNP coin transactions are relatively faster...

LiveAction

    LiveAction It is one of the best hacking tools for ethical hacking. It performance issues and reduces security risk with the deep visibility provided by Omnipeek. It is one of the best hacking apps that can diagnose network issues faster and better with LiveAction packet intelligence. LiveAction is a sophisticated network performance management and QoS control tool that enables you to optimize the end-user experience and business application delivery by effectively managing your application-aware network performance.  LiveAction visually controls your enterprise networks by simplifying the complexity of monitoring, analyzing, and configuring technology areas such as QoS, LAN Switching, NetFlow, FnF, NBAR2, and Medianet, AVC, PfR, Routing, and IP SLA. The latest LiveAction 3.0 release provides improved scalability and guided workflows to quickly resolve business-critical performance issues in your WAN, SaaS, and cloud application, MPLS or DMVPN links, converged wired a...

Metasploit

History of Metasploit The Metasploit Project was undertaken in 2003 by H.D. Moore for use as a Perl-based portable network tool, with assistance from core developer Matt Miller. It was fully converted to Ruby by 2007, and the license was acquired by Rapid7 in 2009, where it remains as part of the Boston-based company’s repertoire of IDS signature development and targeted remote exploit, fuzzing, anti-forensic, and evasion tools. Portions of these other tools reside within the Metasploit framework, which is built into the Kali Linux OS. Rapid7 has also developed two proprietary OpenCore tools, Metasploit Pro, Metasploit Express. This framework has become the go-to exploit development and mitigation tool. Prior to Metasploit, pen testers had to perform all probes manually by using a variety of tools that may or may not have supported the platform they were testing, writing their own code by hand, and introducing it onto networks manually. Remote testing was virtually unheard of, and that...