Crackers Methods

Step by steps methods to implement hacking

How to keep your smartened-up home safe from hackers

Speakers with built-in microphones are increasingly popular. Devices such as Amazon’s Echo and Google Home let people check the weather or their personal calendar with simple voice commands. Beyond that, many smart TVs and TV streaming devices now have voice-activated functions, often for playback controls and video search. Many newer toys also come with microphones

How to keep your smartened-up home safe from hackers Read More »

MS14-068 Exploit – Hacking a Domain Controller and bypassing Symantec Antivirus with Kali and C++

https://www.youtube.com/watch?v=DfVqmOtplOE Exploiting a vulnerable Domain controller without the MS14-068 patch. You would be surprised how many domain controller are still not patched. Patch with MS14-068 to avoid this exploit. Read more  

MS14-068 Exploit – Hacking a Domain Controller and bypassing Symantec Antivirus with Kali and C++ Read More »