Quantcast
Channel: How-To-Hack.net
Browsing all 10 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Web scraping – part 1

Web scraping When a hacker has identified a vulnerability in a system or platform he can choose to either report it (white hat hacker) or scan more systems with the same security hole. One way to do...

View Article



Image may be NSFW.
Clik here to view.

Web scraping – part 2

Web scraping In the previous article we identified the footprints to use and now it’s time to start coding. First we need to fetch content from a website. In PHP we can do this using CURL or...

View Article

Net phishing

In this post I’m going to discuss about net phishing (also referred to as “web spoofing”). I still hear about people that have lost real money because of net phishing – and that´s just sad. Net...

View Article

Image may be NSFW.
Clik here to view.

Cloaking WordPress with “hide my WP”?

There’s a bunch of companies that provides services for cloaking the user’s website. In the previous articles Web scraping – part 1 and Web scraping – part 2 we learned how easy it was to scan multiple...

View Article

Image may be NSFW.
Clik here to view.

Best practices for cloud services

Syncing our contacts, messages and photos to the cloud is a huge risk for our privacy unless we protect our account, communication and storage of our sensitive files. In this article we will look into...

View Article


Buffer Overflow Attacks

In an era where everything is digitized, there is always some scope for a loophole or vulnerability. This loophole forms the crux where hackers squeeze in their mischievous codes and hence flourish...

View Article

How to achieve a briliant phishing attack

Sean Cassidy shows how to achieve a briliant phishing attack on Lastpass by combining multiple security holes. This attack is powerfull because the author made a clear roadmap which checks if LastPass...

View Article

Image may be NSFW.
Clik here to view.

How Gurkirat Singh managed hacking Facebook

Hacking Facebook – Flaw in the recovery process Hacking facebook through their reset password Gurkirat Singh is a security researcher/coder/hacker. In short this is how he managed to hack Facebook...

View Article


Image may be NSFW.
Clik here to view.

Hacking Tool – S3 decloaker

Amazon S3 Decloaker We are proud to present “S3 decloaker” As the first website in the world, we got our hands on a secretly leaked hacking tool – that’s still working. Our source says that Amazon...

View Article


Investing in Hacking

It’s said that many investors have moved their fortunes from gold to bitcoin and other crypto currencies. Investing in crypto currencies comes with a big risc and we would like to look for alternative...

View Article
Browsing all 10 articles
Browse latest View live




Latest Images