FREE ETHICAL HACKING WORKSHOP, POKHARA
And “Hackers For Charity” is rolling. This is day 1 image.
“Cyber Security For All. Forever Free” #hackersHouse Thanks for volunteers. #CyberAware #nhc #hcnepal
Call us for training : 9846618997
397 total views, 2 views today
काठमाडौं मा “Hackers For Charity – NHC” अन्तर्गत पोखरा देखि ktm सम्म आयेर Oct 17, 2016 देखि सुरु भयेको “Ethical Hacking & Cyber Security” तीन दिने वोर्क्सोप आज समापन गर्न सफल भयेको छु । सर्बप्रथम, धन्येबाद चाइ RAC KTM Mid-Town लाई दिन चाहन्छु । धन्येबाद स्वोरूप, धेरै न सके पनि, केइ रकम चाइ Rtr. Alisha Rajbahak (Vice President of RAC KTM MID-TOWN for RY 2016-17) लाई हस्तान्तरण गरेको छु र सो रकम उहाँ आबद्ध रहेको RAC KTM Mid-Town Club मा जाने छ ।
तेसै गरि, RAC KTM MID-TOWN कै भाइ Rtr. Santosh Purbey, Rtr Kapil Ghimire, Rtr.Prabin Sharma र मलाइ Troubleshoot/Volunteer मा अत्याधिक सहयोग गर्ने भाइ Krishna Chalise , Pradeep Kc र Bishnu Chapagain भाइ लाई पनि धेरै धेरै धन्यवाद दिन चाहन्छु ।
-Regards : Bijay Acharya (www.bijayacharya.com)
#nhc #CyberAware #ktmWorkshop #EthicalHacking
328 total views, 2 views today
Welcome back Gurkhas ! …in SQL injection lab PT.3
By : Bijay Acharya | Add him in Facebook here >https://www.facebook.com/nhcbijay.ach | Follow him in twitter : @acharya_bijay | Subscribe his tutorial channel for ethical hacking videos (in nepali language) here > >Student Video Tutorial
Section 9: Obtain PHP Cookie
1. SQL Injection Menu
1. Select “SQL Injection” from the left navigation
2. Select Tamper Data
o Instructions: Read More …
312 total views, no views today
Google Dorks: An Easy Way of Hacking
The Google Search Engine finds answer to our questions, which is helpful in our daily lives. You can search for your school assignments, reports, presentations and more.
Before I start the tutorial on using use Google Dorks in Penetration Testing and Ethical Hacking, I’m going to share a definition of Google Dork queries that I saw on techtarget.com:
A Google Dork query, sometimes just referred to as a dork, is a search string that uses advanced search operators to find information that is not readily available on a website.
Read More …
1,127 total views, 1 views today
2073 Dashain Offer को रूपमा, Free 3 days Ethical Hacking
Workshop/Training Organize गर्दै छु ।
Selection of students highly depends on their current situation and education.
Training will be conducted in Pokhara.
For seat bookings, call 9846618997
Required documents will be informed after you make a call for seat booking.
“When I was a beginner, I was in grade 6. I tried to join Hacking Training, but it was not available in Nepal. So I started to learn via web. When I was in grade 9, then course was available in KTM. But Fee was 20,000 (7 days workshop). My dream to learn hacking was gone, all gone. After that, for about 8 yrs I trained my brain with google, youtube and different websites. I made it. Finally I joined CEHv9. of EC Council….This journey taught me a lot of things, gave experience of wave feelings. And now from this year, starting from Dashain Offer, I will provide free ethical hacking workshop to those students who are interested, have passion on computer, and those who cannot afford for it….once in a year.”
582 total views, 1 views today
In this post, we are adding few open source SQL injection tools. These tools are powerful and can perform automatic SQL injection attacks against the target applications. I will also add the download link to download the tool and try. I tried my best to list the best and most popular SQL injection tools.
BSQL hacker is a nice SQL injection tool that helps you perform a SQL injection attack against web applications. This tool is for those who want an automatic SQL injection tool. It is especially made for Blind SQL injection. This tool is fast and performs a multi-threaded attack for better and faster results.
It supports 4 different kinds of SQL injection attacks:
- Blind SQL Injection
- Time Based Blind SQL Injection
- Deep Blind (based on advanced time delays)
- SQL Injection Error Based SQL Injection
Read Full Article Here
653 total views, no views today
sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections.
Read More …
361 total views, no views today
Millions of websites are powered by WordPress software and there’s a reason for that. WordPress is the most developer-friendly content management system out there, so you can essentially do anything you want with it. Unfortunately, that has some downsides as well.
For example, if you don’t change your default configuration, hackers and some pesky users with too much curiousity immediately know where to log in to get into your admin area. In WordPress, you can just type in domain.com/wp-admin and it will take you right to the login screen. At that point, it’s all about trying to crack your password. The most common method hackers use is brute force, which allows them to test millions of login combinations in a short amount of time.
Giving Hackers a Difficult Time
There’s a few different preventive measures you can take in order to minimize the risk of getting your website hacked.
© igor – Fotolia.com
Back Up Your Website Often
Obviously, it depends on how often your website gets updated, but I would suggest at least a weekly backup.
READ FULL ARTICLE HERE
299 total views, no views today
As a webmaster, is there anything more terrifying than the thought of seeing all of your web-developed work being altered or wiped out entirely by a nefarious hacker? You’ve worked hard on your website – so take the time to protect it by implementing basic hacking protections!
In addition to regularly backing up your files (which you should already be doing, for various reasons), taking the following three easy steps will help to keep your website safe: Read More …
229 total views, no views today
Shared By : BIJAY ACHARYA Follow BJ here : acharya_bijay
Facebook is used by nearly a sixth of the world’s population. This large number of Facebook users are vulnerable to information security attacks. According to a statement published by Facebook, the social networking website received 600,000 fraudulent login attempts per day in 2011. This means that every 140 milliseconds, someone attempts to hack a Facebook account. The blink of the eye usually takes 300-400 milliseconds.
Hacking Facebook accounts does not require sophisticated skills. By way of illustration, a simple Google search reveals numerous instructions on how to gain unauthorized access to a Facebook account. Moreover, there are books giving insight on the topic. For example, the book “How Hackers Hack Facebook & Any Pc?” provides “tricks & methods used by hacker’s all around the world to hack any Facebook account & any Pc”. Read More …
415 total views, no views today