Browsing category

Tutorials

How to do penetration testing of IoT devices easily

The Internet of Things (IoT) is probably one of the most widely used technological concepts in recent times, as it has implementations in all kinds of environments, from complex industrial processes to domestic use. According to pentesting specialists, IoT architecture can be divided into 3 layers: hardware, communication or network and interfaces or services. In […]

How to do digital forensics of a hacked network with TCPDUMP

Digital forensics is one of the most important elements of ethical hacking, as it allows researchers to learn as much as possible about a network affected by cybercriminals. This requires tools capable of performing various specific tasks, including the analysis of network packets. On this occasion, experts from the International Institute of Cyber Security (IICS) […]

How to hack into WAF (Web application firewall) using XSS attacks?

Cross-site scripting (XSS) attacks are a variant of code injection that involves the use of specially crafted scripts on legitimate websites for malicious purposes in order to breach the security of web applications potentially affected by some known security flaw. Given the popularity of this attack technique, many researchers have specialized in analyzing this attack […]

How to do automatic vulnerability analysis and assessment of your applications & network free of cost?

The automatic analysis of potential security flaws has become one of the essential tasks for developers, researchers and experts in vulnerability assessment, as it allows taking a proactive approach, thus preventing security threats from generating irreversible damage to a system. This time, vulnerability assessment specialists from the International Institute of Cyber Security (IICS) will show […]

How to easily copy Facebook, Instagram, Twitter Gmail cookies and browser stored passwords to a USB pendrive, all with just 15 commands

Gathering cookies is a popular hacking activity and can prove really useful for obtaining information from a target, so it is necessary to know the techniques that threat actors use to obtain this data. On this occasion, cybersecurity experts from the International Institute of Cyber Security (IICS) will show you how to copy cookies from […]

10 Best gadgets and tools for real hackers and cyber security professionals

The fight against cybercrime is one of the main responsibilities of the ethical hacking and cyber security community. This effort depends on multiple variants, from the elaboration of a functional strategy for the prevention of cyberattacks to the monitoring of the main cybercriminal trends; in other words, those responsible for cyber security must know how […]

Tutorial to create phishing sites of 100 famous websites in minutes

Phishing remains one of the most common and dangerous criminal practices for users in general, and every day new and dangerous tools emerge to deploy this attack variant. On this occasion, the experts of the cybersecurity awareness course of the International Institute of Cyber Security (IICS) will show you the operation of Shark, a powerful […]

Do background check of girlfriend or crush in 75 different social media networks in 10 minutes with just 5 commands

Collecting information is an important phase for investigation. Now days whenever user visits any blogger websites. Many websites ask for email addresses for giving notification regarding their content. Such websites stores email id of users. We will show you tool used for collecting usernames on different social networking platforms. Userrecon tool used for finding email […]

How to Redirect Web Traffic Using Tor easily

Tor is the most famous web browser which provides anonymity/ privacy over the internet. Many companies/ whistle blowers uses TOR for working anonymously. Some Hacking groups also uses TOR services for spreading malware’s, viruses. According to ethical hacking researcher of international institute of cyber security Earlier we have shown that how you share files on […]

Find Firewall & CDN used a website during Pentest with VXSCAN

Information gathering phase shows how an pentester should prepare for his next phases. Because in this phase pentester have to collect information about their target as much possible. Their are many automation tools which are used in gathering information. Today we will show an python script used in gathering information. Vxscan is an extensive scanning […]

Different Ways for Wifi Cracking

Wireless Networks Wireless network which enables end-point devices to communicate with internet by connecting to an AP device. Wiresless device are also referred as WLAN devices. Accessing Wireless Networks You will need wireless enabled devices such as smartphones, laptops, tablets to connect wireless networks. Today you will see most devices comes with wireless networks. For […]

Top 15 hacking tools for doing penetration testing from mobile phones

Pentesting has become one of the main practices of the cybersecurity community and even represents an important source of income for independent researchers and security firms. The most advanced security audits are typically performed on Kali Linux computers with specific hardware requirements, although some scanning processes can be performed using a conventional smartphone or tablet. […]