Hack Worm
8.19K subscribers
862 photos
43 videos
27 files
1.21K links
πŸ”° Learn Ethical Hacking From Scratch πŸ”°

βœ” Premium Hacking Video Tutorial
βœ” Premium Hacking Software
βœ” Black Hat Techniques & much more
Download Telegram
πŸ”° Knowledge πŸ”°
πŸ’’ FORMJACKING πŸ’’

A type of virtual ATM skimming, the Cyber criminals inject malicious code into retailers’ websites to steal shoppers’ payment card details. An average more than 4800 websites are compromised with formjacking attack in a month.

β€œFormjacking represents a serious threat for both businesses and consumers,” Greg Clark, CEO of Symantec, said in a statement. β€œConsumers have no way to know if they are visiting an infected online retailer without using a comprehensive security solution, leaving their valuable personal and financial information vulnerable to potentially devastating identity theft.”

βž– @HackWorm βž–
πŸ”° Footprinting πŸ”°
Footprinting is the technique used for gathering information about computer systems and the entities they belong to. To get this information, a hacker might use various tools and technologies. This information is very useful to a hacker who is trying to crack a whole system.

πŸ”° NMap πŸ”°
Nmap is used to discover hosts and services on a computer network by sending packets and analyzing the responses. Nmap provides a number of features for probing computer networks, including host discovery and service and operating system detection.
Media is too big
VIEW IN TELEGRAM
πŸ”° Footprinting with NMap πŸ”°
Part 1
Media is too big
VIEW IN TELEGRAM
πŸ”° Footprinting with NMapπŸ”°
Part 2
Media is too big
VIEW IN TELEGRAM
πŸ”° Footprinting with NMap + External ResourcesπŸ”°
Part 3
πŸ”° NMAP πŸ”°
NMAP is an essential tool in any hacker's arsenal. Nmap is more powerful than you know. With a few scripts, we can extend its functionality beyond a simple port scanner and start to identify details about target servers system admins don't want us to know.

===========================
Use NMAP to Actively Exploit Detected Vulnerabilities
Use NMAP to Brute Force Passwords
Use NMAP to Test if Target Is Vulnerable to Dos
Use NMAP to Perform DOS Attack

βž–βž– @HackWorm βž–βž–
πŸ”° Breaking WPA/WPA2 Encryption πŸ”°
Breaking of WPA/WPA2 is based on the same idea – sniffing the initial 4-way handshake and applying brute-force attack in order to break encrypted password.

Example
Media is too big
VIEW IN TELEGRAM
WPA/WPA2
Part 1
Media is too big
VIEW IN TELEGRAM
WPA/WPA2
Part 2
Media is too big
VIEW IN TELEGRAM
WPA/WPA2
Part 3
Media is too big
VIEW IN TELEGRAM
WPA/WPA2
Part 4
Media is too big
VIEW IN TELEGRAM
WPA/WPA2
Part 5
Media is too big
VIEW IN TELEGRAM
WPA/WPA2
Part 6
πŸ”° Doxing πŸ”°
Doxing is an effective cyber-weapon that can be used against an anonymous online target who's miles away.
Media is too big
VIEW IN TELEGRAM
πŸ”° Wifi Jamming & DoS πŸ”°
Part 1
Media is too big
VIEW IN TELEGRAM
πŸ”° Wifi Jamming & DoS πŸ”°
Part 2
πŸ”° How the SSL strip attack works πŸ”°
In order to β€œstrip” the SSL, an attacker intervenes in the redirection of the HTTP to the secure HTTPS protocol and intercepts a request from the user to the server. The attacker will then continue to establish an HTTPS connection between himself and the server, and an unsecured HTTP connection with the user, acting as a β€œbridge” between them.
Media is too big
VIEW IN TELEGRAM
SSL Strip
Part 1
Media is too big
VIEW IN TELEGRAM
SSL Strip
Part 2
Media is too big
VIEW IN TELEGRAM
SSL Strip
Part 3