Skip to main content


DATA BREACH-Security is no surety

How much does your privacy mean to you?
How important is your data to you? 
And how important are You to You!?

Hello Guys,
If you have also recently heard about the data breaches that occurred in PayPal and Uber and you wanted to know what Data Breach means, then  you are at the right place .

A data breach is an occurrence wherein data is stolen or taken from a framework without the learning or approval of the framework's proprietor. A little organization or an extensive association may endure a data breach. Stolen data may include delicate, restrictive, or classified data, for example, Mastercard numbers, client data, exchange insider facts or matters of national security. Nothing is safe today in the virtual world.
Harm made by such episodes regularly introduces itself as misfortune to the objective organization's notoriety because of an apparent 'selling out of trust'. The harm may likewise include money related misfortunes for the organization and additionally that of th…
Recent posts

PHISHING - How Fake Emails and Links can Steal your Information.

Hello Guys..!!  If you are looking for proper guide to Phishing you are at right place..!! Today we will discuss about how Hackers can Steal your Information by your single think Twice before you click on an unknown link. But before we start i would like to tell you that this article is strictly for Educational Purpose only; we are not responsible for any kind of inconvinience caused by readers....!!
Phishing is the endeavor to get delicate data, for example, usernames, passwords, and Mastercard points of interest (and, by implication, cash), regularly for malevolent reasons, by camouflaging as a dependable substance in an electronic communication.The word is a neologism made as a homophone of angling because of the similitude of utilizing a trap trying to get a casualty. As per the 2013 Microsoft Computing Safety Index, discharged in February 2014, the yearly overall effect of phishing could be as high as US$5 billion.  Phishing is commonly completed by email carica…

Cyber Crime as a Service - How Bad Guys Make Money

Hello Guys..!!  Today we will discuss about how bad guys manage to make money through cyber crime. Before we start I would like to tell you that this article is only for your awareness ; we are not responsible for any inconveniance caused by readers..!!
Cyber crime has been popularized. Contaminating PCs with ransomware or utilizing a progressed tireless danger to appropriate protected innovation at no time in the future requires profound specialized learning. Simply utilize Google to figure out how to get to the Dark Web, and you can discover programmers who, at a cost, are glad to compose malware, make profoundly successful lance phishing efforts and create sham sites for gathering login accreditations. Significant organizations (think Fortune 500 associations) comprehend that cyber crime as an administration has changed how they handle protection. Be that as it may, for associations as yet developing their protective measures, this is what the change of cyber crime into an industry…

How Hackers Hack Security Camera and Webcams Using Google Dork

HELLO guys ..!!
Today i'll show how hackers get access to IP cameras and webcams without permission.
Before we start i would like to tell that this is only for educational purpose.

Few days back I've published two article on security cameras and webcams, In case you missed it go and read it first, it tells you how can you prevent yourself from camera hacking.

 1 - Is Someone Watching You From The Camera On Your Phone/Laptop?
2 - Five tips to securing your webcam
So, lets start ..!! Here are some some dorks.. Just copy it without ( * ) to google search.
* inurl:”CgiStart?page=”
* inurl:/view.shtml
* intitle:”Live View / – AXIS
* inurl:view/view.shtml
* inurl:ViewerFrame?Mode=
* inurl:ViewerFrame?Mode=Refresh
* inurl:axis-cgi/jpg
* inurl:axis-cgi/mjpg (motion-JPEG) (disconnected)
* inurl:view/indexFrame.shtml
* inurl:view/index.shtml
* inurl:view/view.shtml
* liveapplet
* intitle:”live view” intitle:axis
* intitle:liveapplet
* allintitle:”Network Camera NetworkCamera” (disconnected)
* intitle:a…

Symmetric and Asymmetric key Encryption

When being introduced to cryptography, an admittedly daunting subject, it’s best to start at the most common subjects first at a very high level and then go deeper once that view is understood; The nitty-gritty of the mathematics behind the crypto can wait. One of the best ways to learn anything new is by using mental models, which is to learn a thought process of how something works, and often how a process would work in the real world. I am often asked to explain the difference between symmetric and asymmetric encryption after people continually confuse the two. So, the purpose of this writing is to provide a very high-level, easy-to-understand mental model of symmetric encryption, asymmetric encryption, and digital signatures, which together make up some of the very basic basics of cryptography.
                Starting off, we’ll create a scenario. Consider that two people, Alice and Bob, are very close friends (or perhaps more – who knows?) They also work in the same office and ta…

Mallu Cyber Soldiers hack 200 Pakistani websites

The Mallu Cyber Soldiers  hacked 200 Pakistani websites, including those of the government, on Sunday,  in retaliation for the hacking of Kerala Social Security Mission website earlier this month. They also listed the websites they hacked and said on their Facebook page that the attack would continue if the hackers further creep into India’s online ‘territory’.

The Mallu Cyber Soldiers, a group of hackers, who had joined hands in 2014, had earlier also hacked many Pakistani government websites. They also offer free service to the government websites andcheck  if their security features are prone to hacking. Though their service is free, the hackers keep their anonymity and one of their members said that they were  not authorised to reveal their  area of work. The hacked Pakistani websites include  private ones also.

Like us on Facebook :-  Grey Hat Hackers
Source :-

DEEP WEB – Part 3

TOR – Bridges

When world getting addicted to the new technologies ,The rulers of the world started spying on the world and started limiting resources to the world which the whole world wanted to view

In my last article , i said you “How To Access Dot Onion Sites” using tor
I want to clear one thing here , privacy and Anonymity are two different concepts ,Tor guarantees you in providing Anonymity  and Privacy its all depends on you .
Tor is not responsible for your stupidity in revealing your original identity while using Tor, I remember one researcher said 81% of the tor users are vulnerable , he might be true . Because i admit 81% of the users use tor for day to day internet life using same usernames and passwords and most of them never heard of NoScript and Never knew how to update the browser
In my upcoming articles I will guide through the anonymity and privacy while using Darknets
so for now , will concentrate on TOR BRIDGES
Thank god , Am from a country where using Tor is not…