Month: July 2015

  • Network Mapping

    Network Mapping is the technique through which you map the architecture of a network. It works simply that means after getting information from Whois database and Domain Name system, Its time when you know the ranges of IP addresses and confirming the “Live” targets. We find live targets with the help of ICMP port probes…

  • DNS Reconnaissance

    DNS Reconnaissance is one of the basic steps and most important part of hacking. DNS stands for Domain Name Server, it keeps tracks of the record of IP addresses, services and resources connected to the Internet. Now as we know that computer works on binary numbers…So they would not actually understand the meaning of “www.google.com”,…

  • Information Gathering(Reconnaissance/Footprinting)

    This is the very first step for any kind of hacking(White,Grey,Black).Information Gathering as the name suggests, is gathering as much information about the target as possible.Hackers or Security Experts need to create a information database before attacking a target, it helps them to find out the technology a particular company or a simple website uses…

  • Keep Yourself Anonymous

    Keep Yourself Anonymous

    The First time I entered the world of hacking, My very first question to myself was how can I stay anonymous. Anonymous is a big word, It describes your limitations.But why a Hacker needs to stay anonymous?Well, the answer lies on the boundaries that we cross out of curiosity, revenge or emotions. Keeping yourself Anonymous…