Hack Worm
8.19K subscribers
862 photos
43 videos
27 files
1.21K links
🔰 Learn Ethical Hacking From Scratch 🔰

Premium Hacking Video Tutorial
Premium Hacking Software
Black Hat Techniques & much more
Download Telegram
🔰 Penetration Testing & Ethical Hacking 🔰

Enroll Now : https://www.cybrary.it/course/ethical-hacking/

*Free For Only Limited Candidate.

**Complete Your Course and Get a certificate from Best Ethical Hacking Course Website : Cybrary.it
🔰 AutoScan-Network 🔰

Information Gathering Tool

AutoScan-Network is an application designed to explore and to manage your network. Entire subnets can be scanned simultaneously without human intervention. It features OS detection, automatic network discovery, VNC Client, Ssh client.

@HackWormAdmin
Media is too big
VIEW IN TELEGRAM
How to Install & Configure Free VPN in Kali
🔰 Types Of Operators In Dorks 🔰

inurl:
Searches for a single word or phrase in the
URL of the search result.

site:
The results come from a specified site.

intitle:
Searches for the single word or phase in the title of the search result.

intext:
This Dork is used to search for pages & websites that contain the specific word that you are searching for.

Filetype:
This searches a specific file type.

cache:
This is used to lookup for cached pages by Google.

You can simply join more than one dork to make results even better.

@HackWormAdmin
🔰 How Hackers Create Malware and Infiltrate Victim Machines 🔰

Enroll Now:
https://www.udemy.com/how-hackers-create-malware-and-infiltrate-victim-machines/?couponCode=FREEBIES
Learn Hacking Using Android From Scratch

🔗Link : https://drive.google.com/open?id=1tRtkESbHhj6nHcJok3HJ2osWfREzoIns
🔰 How to do email bombing or bomber by Termux 🔰

1. apt install python2
2. ls
3. git clone https://github.com/zanyarjamal/Email-bomber.git
3. cd Email-bomber
4. ls
5. chmod +x E-bomber.py
6. python2 E-bomber.py
7. select gmail/email which you want to hack
8. type victim email
9. select number of message
10. send = enter



❤️Enjoy and support us❤️

▫️ @HackWormAdmin ▫️
Ⓜ️ w3af Ⓜ️

🌀 If you are looking for a free and open source web application security scanner, then w3af is the best one for you. The tool is widely used by hackers and security researchers. w3aF or web application attack and audit framework are used to get security vulnerability information that can be further used in penetration testing engagements. 🌀

@HackWormAdmin
Ⓜ️ Cain and Abel Ⓜ️

🌀Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kinds of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force, and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols.🌀

@HackWormAdmin
Ⓜ️JOHN THE RIPPERⓂ️

🌀John the Ripper is free and Open Source software, distributed primarily in source code form. It is the password cracking software tool. It is one of the most popular password testings and breaking programs as it combines a number of password crackers into one package, autodetects password hash types, and includes a customizable cracker.🌀

@HackWormAdmin
🔰 UI REDRESS 🔰

This technique is similar to phishing. But in this case, a hacker would create a fake hidden user interface. Once the a user clicks the button with an intention of to proceed to a certain page, he will find himself on an unfamiliar website, usually with an inappropriate content.

@HackWormAdmim
Ethical Hacking with Hardware Gadgets
Learn all about USB attacks, USB Rubber Ducky, HID Attacks, BadUSB, keystroke injections, WiFi jamming.

Explore the threat landscape: USBs, WiFi jammers
Learn common tools and techniques used
Practical skillset in defeating hardware-based threats
Extend your cyber security know-how for hardware-based tools


https://www.udemy.com/ethical-hacking-with-hardware-gadgets/
Hack Worm pinned Deleted message
💢 DNS Spoofing 💢

DNS cache poisoning, also known as DNS spoofing, is a type of attack that exploits vulnerabilities in the domain name system (DNS) to divert Internet traffic away from legitimate servers and towards fake ones. One of the reasons DNS poisoning is so dangerous is because it can spread from DNS server to DNS server.

@HackWormAdmin
Ⓜ️ DHCP Ⓜ️

🌀Dynamic Host Configuration Protocol (DHCP) assigns IP addresses dynamically. This means that you do not have the same IP address all of the time. Most of the time, these IP address assignments are on a local area network. Remember, on LANs we use private IP addresses. When each device is connected to the LAN, it must request an IP address. That device sends that request to the DHCP server that then assigns an IP address to that system for a fixed length of time known as a "lease."🌀

@HackWormAdmin
312-50 Certified Ethical Hacker Certified Practice Exam
Attend this 312-50 Certified Ethical Hacker Certified Practice Exam Then U will get a Good Score 80% on Main Exam

Coupon LInk
http://bit.ly/2P1AycL

📍Education That Matters
🔰 VMware Workstation 15 Pro Activation 🔰

🔘Lifetime License For Multiple PCs

💢Activation Code:- YA1J2-DDG5K-08DHZ-6XQXT-Q3UW8

Note: For Those who use kali linux in vmware
🌀 CLASSIFICATION OF HACKERS 🌀

Based on the attitude and skill level they possess, hackers are classified into the following types:

🔰 White Hat Hacker: A white hat hacker (also known as ethical hacker) is someone who uses his skills only for defensive purposes such as penetration testing. These type of hackers are often hired by many organizations in order to ensure the security of their information systems.

🔰 Black Hat Hacker: A black hat hacker (also known as cracker) is someone who
always uses his skills for offensive purposes. The intention of black hat hackers is to gain money or take personal revenge by causing damage to information systems.

🔰 Grey Hat Hacker: A grey hat hacker is someone who falls in between the white hat and black hat category. This type of hacker may use his skills both for defensive and offensive purposes.

🔰 Script Kiddie: A script kiddie is a wannabe hacker. These are the ones who lack the knowledge of how a computer system really works but use ready-made programs, tools and scripts to break into computers.

@HackWormAdmin
Ⓜ️ CYCRIPT Ⓜ️

🌀Cycript remains one of the best hacking tools to be used on iPhones. It enables developers to associate with applications running on iOS. The programming is done through Objective-C++ and JavaScript language structure. It highlights tab finishing and language structure features, giving it a practical and desktop-like feel.🌀

@HackWormAdmin