Free Ethical Hacking Workshop – Pokhara oct 2016 “Hackers For Charity”, Hackers House

#CyberAware

FREE ETHICAL HACKING WORKSHOP, POKHARA

And “Hackers For Charity” is rolling. This is day 1 image.

POKHARA,NEPAL
“Cyber Security For All. Forever Free” #hackersHouse  Thanks for volunteers.   #CyberAware   #nhc   #hcnepal

Call us for training : 9846618997

291 total views, no views today

Free Ethical Hacking Workshop – Kathmandu oct 2016 “Hackers For Charity”, Hackers House

काठमाडौं मा “Hackers For Charity – NHC” अन्तर्गत पोखरा देखि ktm सम्म आयेर Oct 17, 2016 देखि सुरु भयेको “Ethical Hacking & Cyber Security” तीन दिने वोर्क्सोप आज समापन गर्न सफल भयेको छु । सर्बप्रथम, धन्येबाद चाइ RAC KTM Mid-Town लाई दिन चाहन्छु । धन्येबाद स्वोरूप, धेरै न सके पनि, केइ रकम चाइ Rtr. Alisha Rajbahak (Vice President of RAC KTM MID-TOWN for RY 2016-17) लाई हस्तान्तरण गरेको छु र सो रकम उहाँ आबद्ध रहेको RAC KTM Mid-Town Club मा जाने छ ।

तेसै गरि, RAC KTM MID-TOWN कै भाइ Rtr. Santosh Purbey, Rtr Kapil Ghimire, Rtr.Prabin Sharma र मलाइ Troubleshoot/Volunteer मा अत्याधिक सहयोग गर्ने भाइ Krishna Chalise , Pradeep Kc र Bishnu Chapagain भाइ लाई पनि धेरै धेरै धन्यवाद दिन चाहन्छु ।

-Regards : Bijay Acharya (www.bijayacharya.com)

#nhc #CyberAware #ktmWorkshop #EthicalHacking 

ktm-workshop-by-nhc-bijay-acharya-1 ktm-workshop-by-nhc-bijay-acharya

205 total views, no views today

SQL injection lab PT.3 – Extracting/Obtaining PHP Cookie – HC Nepal

Welcome back Gurkhas ! …in SQL injection lab PT.3

By : Bijay Acharya  | Add him in Facebook here >https://www.facebook.com/nhcbijay.ach  |  Follow him in twitter : @acharya_bijay   | Subscribe his tutorial channel for ethical hacking videos (in nepali language) here > >Student Video Tutorial

Section 9: Obtain PHP Cookie
1. SQL Injection Menu
o Instructions:
1. Select “SQL Injection” from the left navigation
menu.

5 php

2. Select Tamper Data
o Instructions: Read More …

252 total views, no views today

Google Dorks – An Introduction

Google Dorks: An Easy Way of Hacking

The Google Search Engine finds answer to our questions, which is helpful in our daily lives. You can search for your school assignments, reports, presentations and more.

Before I start the tutorial on using use Google Dorks in Penetration Testing and Ethical Hacking, I’m going to share a definition of Google Dork queries that I saw on techtarget.com:

A Google Dork query, sometimes just referred to as a dork, is a search string that uses advanced search operators to find information that is not readily available on a website.

Read More …

929 total views, no views today

Free 3 Days Ethical Hacking Workshop in Pokhara Nepal (oct 2016) – Hackers For Charity : NHC

 

[ File # csp11119009, License # 2385219 ] Licensed through http://www.canstockphoto.com in accordance with the End User License Agreement (http://www.canstockphoto.com/legal.php) (c) Can Stock Photo Inc. / digitalgenetics

2073 Dashain Offer को रूपमा, Free 3 days Ethical Hacking
Workshop/Training Organize गर्दै छु ।

Selection of students highly depends on their current situation and education.

Training will be conducted in Pokhara.

For seat bookings, call 9846618997

Required documents will be informed after you make a call for seat booking.

“When I was a beginner, I was in grade 6. I tried to join Hacking Training, but it was not available in Nepal. So I started to learn via web. When I was in grade 9, then course was available in KTM. But Fee was 20,000 (7 days workshop). My dream to learn hacking was gone, all gone. After that, for about 8 yrs I trained my brain with google, youtube and different websites. I made it. Finally I joined CEHv9. of EC Council….This journey taught me a lot of things, gave experience of wave feelings. And now from this year, starting from Dashain Offer, I will provide free ethical hacking workshop to those students who are interested, have passion on computer, and those who cannot afford for it….once in a year.”

498 total views, no views today

Best Free and Open Source SQL Injection Tools

In this post, we are adding few open source SQL injection tools. These tools are powerful and can perform automatic SQL injection attacks against the target applications. I will also add the download link to download the tool and try. I tried my best to list the best and most popular SQL injection tools.

BSQL Hacker

BSQL hacker is a nice SQL injection tool that helps you perform a SQL injection attack against web applications. This tool is for those who want an automatic SQL injection tool. It is especially made for Blind SQL injection. This tool is fast and performs a multi-threaded attack for better and faster results.

It supports 4 different kinds of SQL injection attacks:

  • Blind SQL Injection
  • Time Based Blind SQL Injection
  • Deep Blind (based on advanced time delays)
  • SQL Injection Error Based SQL Injection

Read Full Article Here

523 total views, no views today

sqlmap – Automatic SQL injection and database takeover tool

Introduction

sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections.

Features

Read More …

307 total views, no views today

How to Secure Your WordPress Website From Hackers

Millions of websites are powered by WordPress software and there’s a reason for that. WordPress is the most developer-friendly content management system out there, so you can essentially do anything you want with it. Unfortunately, that has some downsides as well.

For example, if you don’t change your default configuration, hackers and some pesky users with too much curiousity immediately know where to log in to get into your admin area. In WordPress, you can just type in domain.com/wp-admin and it will take you right to the login screen. At that point, it’s all about trying to crack your password. The most common method hackers use is brute force, which allows them to test millions of login combinations in a short amount of time.

Giving Hackers a Difficult Time

There’s a few different preventive measures you can take in order to minimize the risk of getting your website hacked.

cracked security code

© igor – Fotolia.com

Back Up Your Website Often

Obviously, it depends on how often your website gets updated, but I would suggest at least a weekly backup.

READ FULL ARTICLE HERE

252 total views, no views today

[3 Steps] : Protect Your Website From Hackers

As a webmaster, is there anything more terrifying than the thought of seeing all of your web-developed work being altered or wiped out entirely by a nefarious hacker?  You’ve worked hard on your website – so take the time to protect it by implementing basic hacking protections!

In addition to regularly backing up your files (which you should already be doing, for various reasons), taking the following three easy steps will help to keep your website safe: Read More …

174 total views, no views today