Phases Of Hacking

INTRODUCTION The phases of hacking are an interesting topic. So there are only 5 phases in the hacking, everyone can understand easily. Mostly these 5 phases are followed by most of the hackers. The 5 phases in the hacking are is explained below: 1. Reconnaissance 2. Scanning 3. Gaining Access 4. Maintaining Access 5. Clearing Tracks               The 5 phases

Read More »

What is Surface Web, Deep Web & Dark Web?

INTRODUCTION Now the world is ruled by the internet. Internet is one of the main sources of transferring data from one to another. The Internet changed the world and usage of the internet is also improved a lot when compared to previous generations. But most people don’t know the dark side of the internet, many are thinking that the internet

Read More »

Access an Android Device using Kali Linux

CAUTION: This is an informative article for anyone who wants to learn more about how hackers hack android devices using Kali Linux in the LAN network. Only use this for educational purposes neither try to violate any legal terms & conditions nor we are responsible for any data loss or misuse. INTRODUCTION The goal of this section is to teach

Read More »