Thursday, November 5, 2015

Skype Resolver : Get Skype IP’s behind VPN Tutorial

Hackingloops ~

Skype Resolver : Get Skype IP’s behind VPN Skype is being used lot in the corporate environments as well as for personal use .  Many think behind the VPN the IP and identity can be hidden . Well I came across this awesome tool that resolves your IP using your Skype name . The tool …

The post Skype Resolver : Get Skype IP’s behind VPN Tutorial appeared first on Learn Ethical Hacking and Penetration Testing Online.



from WordPress http://ift.tt/1PpsgWL
via IFTTT

Wednesday, November 4, 2015

Doxing Explained : Tutorial

Hackingloops ~

Doxing Explained : Tutorial Information gathering is one of the Initial steps of any penetration testing project . Information gathering deals with gathering all the information you can gather about your target . This information might be gathered by doing online searches , phone calls , emails or other social engineering . Doxing is a …

The post Doxing Explained : Tutorial appeared first on Learn Ethical Hacking and Penetration Testing Online.



from WordPress http://ift.tt/1Q5EPIw
via IFTTT

Hacking Wifi via Android Phones Easy : Secure your Networks !

Hackingloops ~

Hacking Wifi via Android Phones Easy : Secure your Networks ! Secure your Networks ! War Driving is when a hacker travels to any vicinity to hack a wifi network . Earliar this was limited due to the baggage of carrying the laptops …. Now with Android Smartphones becoming more computational and powerful , War Driving …

The post Hacking Wifi via Android Phones Easy : Secure your Networks ! appeared first on Learn Ethical Hacking and Penetration Testing Online.



from WordPress http://ift.tt/1RTig78
via IFTTT

Word / Excel Exploits using Metasploit During Penetration Testing

Hackingloops ~

Word / Excel Exploits using Metasploit During Penetration Testing Metasploit is the favorite exploitation framework among the penetration testers . Metasploit can be used in a variety of penetration testing scenarios . One of the easiest way of spreading the exploit code through an exe file . But the major drawback in this technique is …

The post Word / Excel Exploits using Metasploit During Penetration Testing appeared first on Learn Ethical Hacking and Penetration Testing Online.



from WordPress http://ift.tt/1So8URW
via IFTTT

Tuesday, November 3, 2015

Finding SQLi Vulnerable Websites in a Web Server

Hackingloops ~

Finding SQLi Vulnerable Websites in a Web Server SQL Injection (SQLi) vulnerability is not new and is one of the most dangerous vulnerabilities present in web applications . SQL injection is a very dangerous vulnerability and can lead to stealing of the data or even complete defacement of the website . If anyone is targeting …

The post Finding SQLi Vulnerable Websites in a Web Server appeared first on Learn Ethical Hacking and Penetration Testing Online.



from WordPress http://ift.tt/1M9p5OG
via IFTTT

Execute JPeG Files As EXE : Only For Penetration Testing

Hackingloops ~

Execute JPeG Files As EXE : Only For Penetration Testing   While Penetration Testing , we come across scenarios where we need to social engineer in order to get the malware executed and test the strength of the organisation’s employee’s cyber security Awareness .  Well here is a way to do so . What if …

The post Execute JPeG Files As EXE : Only For Penetration Testing appeared first on Learn Ethical Hacking and Penetration Testing Online.



from WordPress http://ift.tt/1Q89fZG
via IFTTT

Profiling a Website for Penetration Testing

Hackingloops ~

Profiling a Website for Penetration Testing  Website Profiling is the first critical step in the penetration testing and helps to build initial foundation for the testing .  Many penetration testers choose to do this via computer; they use exploits and methods to gain information about the website (this is a key process in penetration testing . I’ve …

The post Profiling a Website for Penetration Testing appeared first on Learn Ethical Hacking and Penetration Testing Online.



from WordPress http://ift.tt/1OkP7Eh
via IFTTT