Hack Worm
8.19K subscribers
862 photos
43 videos
27 files
1.21K links
πŸ”° Learn Ethical Hacking From Scratch πŸ”°

βœ” Premium Hacking Video Tutorial
βœ” Premium Hacking Software
βœ” Black Hat Techniques & much more
Download Telegram
Learn Hacking Using Android From Scratch

πŸ”—Link : https://drive.google.com/open?id=1tRtkESbHhj6nHcJok3HJ2osWfREzoIns
πŸ”° How to do email bombing or bomber by Termux πŸ”°

1. apt install python2
2. ls
3. git clone https://github.com/zanyarjamal/Email-bomber.git
3. cd Email-bomber
4. ls
5. chmod +x E-bomber.py
6. python2 E-bomber.py
7. select gmail/email which you want to hack
8. type victim email
9. select number of message
10. send = enter

βž–βž–βž–βž–βž–βž–βž–βž–βž–βž–βž–βž–

❀️Enjoy and support us❀️

βž–β–«οΈ @HackWormAdmin β–«οΈβž–
Ⓜ️ w3af Ⓜ️

πŸŒ€ If you are looking for a free and open source web application security scanner, then w3af is the best one for you. The tool is widely used by hackers and security researchers. w3aF or web application attack and audit framework are used to get security vulnerability information that can be further used in penetration testing engagements. πŸŒ€

βž– @HackWormAdmin βž–
Ⓜ️ Cain and Abel Ⓜ️

πŸŒ€Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kinds of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force, and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols.πŸŒ€

βž–@HackWormAdminβž–
Ⓜ️JOHN THE RIPPERⓂ️

πŸŒ€John the Ripper is free and Open Source software, distributed primarily in source code form. It is the password cracking software tool. It is one of the most popular password testings and breaking programs as it combines a number of password crackers into one package, autodetects password hash types, and includes a customizable cracker.πŸŒ€

βž–@HackWormAdminβž–
πŸ”° UI REDRESS πŸ”°

This technique is similar to phishing. But in this case, a hacker would create a fake hidden user interface. Once the a user clicks the button with an intention of to proceed to a certain page, he will find himself on an unfamiliar website, usually with an inappropriate content.

βž– @HackWormAdmim βž–
Ethical Hacking with Hardware Gadgets
Learn all about USB attacks, USB Rubber Ducky, HID Attacks, BadUSB, keystroke injections, WiFi jamming.

Explore the threat landscape: USBs, WiFi jammers
Learn common tools and techniques used
Practical skillset in defeating hardware-based threats
Extend your cyber security know-how for hardware-based tools


https://www.udemy.com/ethical-hacking-with-hardware-gadgets/
Hack Worm pinned Deleted message
πŸ’’ DNS Spoofing πŸ’’

DNS cache poisoning, also known as DNS spoofing, is a type of attack that exploits vulnerabilities in the domain name system (DNS) to divert Internet traffic away from legitimate servers and towards fake ones. One of the reasons DNS poisoning is so dangerous is because it can spread from DNS server to DNS server.

βž– @HackWormAdmin βž–
Ⓜ️ DHCP Ⓜ️

πŸŒ€Dynamic Host Configuration Protocol (DHCP) assigns IP addresses dynamically. This means that you do not have the same IP address all of the time. Most of the time, these IP address assignments are on a local area network. Remember, on LANs we use private IP addresses. When each device is connected to the LAN, it must request an IP address. That device sends that request to the DHCP server that then assigns an IP address to that system for a fixed length of time known as a "lease."πŸŒ€

βž–@HackWormAdminβž–
312-50 Certified Ethical Hacker Certified Practice Exam
Attend this 312-50 Certified Ethical Hacker Certified Practice Exam Then U will get a Good Score 80% on Main Exam

Coupon LInk
http://bit.ly/2P1AycL

πŸ“Education That Matters
πŸ”° VMware Workstation 15 Pro Activation πŸ”°

πŸ”˜Lifetime License For Multiple PCs

πŸ’’Activation Code:- YA1J2-DDG5K-08DHZ-6XQXT-Q3UW8

Note: For Those who use kali linux in vmware
πŸŒ€ CLASSIFICATION OF HACKERS πŸŒ€

Based on the attitude and skill level they possess, hackers are classified into the following types:

πŸ”° White Hat Hacker: A white hat hacker (also known as ethical hacker) is someone who uses his skills only for defensive purposes such as penetration testing. These type of hackers are often hired by many organizations in order to ensure the security of their information systems.

πŸ”° Black Hat Hacker: A black hat hacker (also known as cracker) is someone who
always uses his skills for offensive purposes. The intention of black hat hackers is to gain money or take personal revenge by causing damage to information systems.

πŸ”° Grey Hat Hacker: A grey hat hacker is someone who falls in between the white hat and black hat category. This type of hacker may use his skills both for defensive and offensive purposes.

πŸ”° Script Kiddie: A script kiddie is a wannabe hacker. These are the ones who lack the knowledge of how a computer system really works but use ready-made programs, tools and scripts to break into computers.

βž– @HackWormAdmin βž–
Ⓜ️ CYCRIPT Ⓜ️

πŸŒ€Cycript remains one of the best hacking tools to be used on iPhones. It enables developers to associate with applications running on iOS. The programming is done through Objective-C++ and JavaScript language structure. It highlights tab finishing and language structure features, giving it a practical and desktop-like feel.πŸŒ€

βž–@HackWormAdminβž–
πŸ”° The difference between KL and RAT πŸ”°

πŸŒ€RAT= Remote Administrative Tool.It gives a hacker full control over a victims computer.Webcam,Microphone,And what not.RAT's violate a whole heck of Cyber laws that is why FBI puts heat on them and they get caught,Mainly because blackmailing or using their personnel information against them

πŸŒ€KL= Keylogging/Keylogger.It sends keystrokes and Stealer logs containing username,password and website link typed and/or visited by a victim to the hacker that made it.

βž– @HackWormAdmin βž–
XssPy.zip
4.9 KB
πŸ”° XssPy Tool πŸ”°

Ⓜ️XssPy is a web application XSS scanner. Xsspy was recently used by an engineer at microsoft to find a bug in Pentagon’s Bug Bounty Program.

βž– @HackWormAdmin βž–
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack,dll . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV software.

https://github.com/Screetsec/TheFatRat

Command:

1. git clone https://github.com/Screetsec/TheFatRat.git

2. cd TheFatRat

3. chmod +x setup.sh && ./setup.sh
πŸ”° Pen TestingπŸ”°
Penetration Testing is a method that many companies follow in order to minimize their security breaches. This is a controlled way of hiring a professional hackers who will try to hack your system and show you the loopholes that you should fix.

Before doing a penetration test, it is mandatory to have an agreement that will explicitly mention the following parameters βˆ’

what will be the time of penetration test,

where will be the IP source of the attack, and

what will be the penetration fields of the system.

Penetration testing is conducted by professional ethical hackers who mainly use commercial, open-source tools, automate tools and manual checks. There are no restrictions; the most important objective here is to uncover as many security flaws as possible.

Types of Penetration Testing

We have five types of penetration testing βˆ’
Black Box βˆ’ Here, the ethical hacker doesn’t have any information regarding the infrastructure or the network of the organization that he is trying to penetrate. In black-box penetration testing, the hacker tries to find the information by his own means.

Grey Box βˆ’ It is a type of penetration testing where the ethical hacker has a partial knowledge of the infrastructure, like its domain name server.

White Box βˆ’ In white-box penetration testing, the ethical hacker is provided with all the necessary information about the infrastructure and the network of the organization that he needs to penetrate.

External Penetration Testing βˆ’ This type of penetration testing mainly focuses on network infrastructure or servers and their software operating under the infrastructure. In this case, the ethical hacker tries the attack using public networks through the Internet. The hacker attempts to hack the company infrastructure by attacking their webpages, webservers, public DNS servers, etc.

Internal Penetration Testing βˆ’ In this type of penetration testing, the ethical hacker is inside the network of the company and conducts his tests from there.

Penetration testing can also cause problems such as system malfunctioning, system crashing, or data loss. Therefore, a company should take calculated risks before going ahead.