Skip to main content


Showing posts from June, 2017

PHISHING - How Fake Emails and Links can Steal your Information.

Hello Guys..!!  If you are looking for proper guide to Phishing you are at right place..!! Today we will discuss about how Hackers can Steal your Information by your single think Twice before you click on an unknown link. But before we start i would like to tell you that this article is strictly for Educational Purpose only; we are not responsible for any kind of inconvinience caused by readers....!!
Phishing is the endeavor to get delicate data, for example, usernames, passwords, and Mastercard points of interest (and, by implication, cash), regularly for malevolent reasons, by camouflaging as a dependable substance in an electronic communication.The word is a neologism made as a homophone of angling because of the similitude of utilizing a trap trying to get a casualty. As per the 2013 Microsoft Computing Safety Index, discharged in February 2014, the yearly overall effect of phishing could be as high as US$5 billion.  Phishing is commonly completed by email carica…

Cyber Crime as a Service - How Bad Guys Make Money

Hello Guys..!!  Today we will discuss about how bad guys manage to make money through cyber crime. Before we start I would like to tell you that this article is only for your awareness ; we are not responsible for any inconveniance caused by readers..!!
Cyber crime has been popularized. Contaminating PCs with ransomware or utilizing a progressed tireless danger to appropriate protected innovation at no time in the future requires profound specialized learning. Simply utilize Google to figure out how to get to the Dark Web, and you can discover programmers who, at a cost, are glad to compose malware, make profoundly successful lance phishing efforts and create sham sites for gathering login accreditations. Significant organizations (think Fortune 500 associations) comprehend that cyber crime as an administration has changed how they handle protection. Be that as it may, for associations as yet developing their protective measures, this is what the change of cyber crime into an industry…

How Hackers Hack Security Camera and Webcams Using Google Dork

HELLO guys ..!!
Today i'll show how hackers get access to IP cameras and webcams without permission.
Before we start i would like to tell that this is only for educational purpose.

Few days back I've published two article on security cameras and webcams, In case you missed it go and read it first, it tells you how can you prevent yourself from camera hacking.

 1 - Is Someone Watching You From The Camera On Your Phone/Laptop?
2 - Five tips to securing your webcam
So, lets start ..!! Here are some some dorks.. Just copy it without ( * ) to google search.
* inurl:”CgiStart?page=”
* inurl:/view.shtml
* intitle:”Live View / – AXIS
* inurl:view/view.shtml
* inurl:ViewerFrame?Mode=
* inurl:ViewerFrame?Mode=Refresh
* inurl:axis-cgi/jpg
* inurl:axis-cgi/mjpg (motion-JPEG) (disconnected)
* inurl:view/indexFrame.shtml
* inurl:view/index.shtml
* inurl:view/view.shtml
* liveapplet
* intitle:”live view” intitle:axis
* intitle:liveapplet
* allintitle:”Network Camera NetworkCamera” (disconnected)
* intitle:a…