How to Make a Malicious USB and How to trick the victim to use it.

THIS VIDEO IS FOR EDUCATIONAL PURPOSES ONLY. IF ORDINARY CITIZENS UNDERSTAND HOW ONE MAY CIRCUMVENT THEIR SECURITY THEN THEY HAVE THE CHANCE TO PROTECT AGAINST SUCH SECURITY BREACHES. I TAKE NO RESPONSIBILITY FOR RECKLESS USE OF THE KNOWLEDGE IN THIS VIDEO. video : HOW TO MAKE AN EVIL USB STICK

An Awesome explaination of BLOCKCHAIN (VIDEO PRESENTATION)

BLOCKCHAIN as a technology has been there with us since 2008 ,but we have tweeting and talking about it lately… I have tried to explain the very Basics of BLOCKCHAIN in a video presentation . Do share if you like it. WHAT IS BLOCKCHAIN? VIDEO PRESENTATION Cyber Wizard.

Using Kali Linux Lesson -1

Using Kali Linux Lesson -1 So you are using Kali Linux as the attack platform . Kali, the successor to the popular BackTrack Linux, is a Debian-based distribution that comes with a plethora of penetration testing tools preinstalled and preconfigured. Anyone who’s ever tried to set up a pentesting box from scratch the day beforeContinue reading “Using Kali Linux Lesson -1”

Risk Assessment by Sawan Bhan

The most commonly mixed up security terms are Threat, vulnerability, and Risk. An asset is what we’re trying to protect. A threat is what we’re trying to protect against. A vulnerability is a weakness or gap in our protection efforts. Risk is the intersection of assets, threats, and vulnerabilities. A + T + V =Continue reading “Risk Assessment by Sawan Bhan”

How to become an Ethical Hacker (Beginners Guide)

Learning how to become an ethical hacker can be daunting at first. Every page tells you to know everything about everything or else you’ll be a script kiddie. But that’s not true! Follow this guide from top to bottom and you’ll find yourself in the infosec field sooner than you thought. This is a longContinue reading “How to become an Ethical Hacker (Beginners Guide)”

Design a site like this with WordPress.com
Get started