Youtube Video Presentation: 2FA BYPASS (3methods)
Author Archives: cyberwizard1
How to DETECT malicious urls before getting HACKED (VIDEO DEMO)
This video demo would cover these 4 web-applications which can be used to inspect any url and detect the malicious urls. VIDEO DEMO 1.Browserling 2.checkshorturl 3.Screenshotmachine 4.Redirect Check Cyber Wizard
How to Make a Malicious USB and How to trick the victim to use it.
THIS VIDEO IS FOR EDUCATIONAL PURPOSES ONLY. IF ORDINARY CITIZENS UNDERSTAND HOW ONE MAY CIRCUMVENT THEIR SECURITY THEN THEY HAVE THE CHANCE TO PROTECT AGAINST SUCH SECURITY BREACHES. I TAKE NO RESPONSIBILITY FOR RECKLESS USE OF THE KNOWLEDGE IN THIS VIDEO. video : HOW TO MAKE AN EVIL USB STICK
An Awesome explaination of BLOCKCHAIN (VIDEO PRESENTATION)
BLOCKCHAIN as a technology has been there with us since 2008 ,but we have tweeting and talking about it lately… I have tried to explain the very Basics of BLOCKCHAIN in a video presentation . Do share if you like it. WHAT IS BLOCKCHAIN? VIDEO PRESENTATION Cyber Wizard.
Using Kali Linux Lesson -1
Using Kali Linux Lesson -1 So you are using Kali Linux as the attack platform . Kali, the successor to the popular BackTrack Linux, is a Debian-based distribution that comes with a plethora of penetration testing tools preinstalled and preconfigured. Anyone who’s ever tried to set up a pentesting box from scratch the day beforeContinue reading “Using Kali Linux Lesson -1”
Risk Assessment by Sawan Bhan
The most commonly mixed up security terms are Threat, vulnerability, and Risk. An asset is what we’re trying to protect. A threat is what we’re trying to protect against. A vulnerability is a weakness or gap in our protection efforts. Risk is the intersection of assets, threats, and vulnerabilities. A + T + V =Continue reading “Risk Assessment by Sawan Bhan”
How to become an Ethical Hacker (Beginners Guide)
Learning how to become an ethical hacker can be daunting at first. Every page tells you to know everything about everything or else you’ll be a script kiddie. But that’s not true! Follow this guide from top to bottom and you’ll find yourself in the infosec field sooner than you thought. This is a longContinue reading “How to become an Ethical Hacker (Beginners Guide)”