Crackers Methods

Step by steps methods to implement hacking

New Phishing Tactic Targeting Facebook Users Relies on Padding URLs with Hyphens

Security researchers from PhishLabs have come across a new phishing trend that’s targeting mobile device owners exclusively, with “the highest proportion of attacks” aimed at Facebook users. This new tactic relies on the fact that mobile browsers have very narrow URL address bars, which prevents users from viewing the entire contents of a link. Phishers […]

New Phishing Tactic Targeting Facebook Users Relies on Padding URLs with Hyphens Read More »

You Can Hack Some Mazda Cars With a USB Flash Drive

“Mazda cars with next-gen Mazda MZD Connect infotainment systems can be hacked just by plugging in a USB flash drive into their dashboard, thanks to a series of bugs that have been known for at least three years,” reports Bleeping Computer. “The issues have been discovered and explored by the users of the Mazda3Revolution forum

You Can Hack Some Mazda Cars With a USB Flash Drive Read More »

Installation and Use of Nessus in Vulnerability Scanning

It’s been said a million times before: security scanning tools are a necessity for pen-testing, information gathering, and sometimes general computer use. When fulfilled, a security scanner can give you a head start on upgrading your security applications. For pen-testers, a security scanner can be the making or breaking of an important job. Due to

Installation and Use of Nessus in Vulnerability Scanning Read More »