Quantcast
Channel: Hacking – Caintech.co.uk
Browsing all 22 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Dr Smurf ‘GUILTY’

A hacker who went by the online moniker of “Dr Smurf” on the underground DarkMarket cybercrime forum has pleaded guilty to charges of identity theft. Tadas Petrauskas, a 23-year-old Lithuanian hacker...

View Article



Image may be NSFW.
Clik here to view.

Bulgarian Hackers Group Arrested

Bulgarian authorities say that after months of investigation they have busted the “most powerful hacker group” in the country, the Cyber Warrior Invasion. The operation was conducted by Bulgaria’s...

View Article

Image may be NSFW.
Clik here to view.

Top 15 Open Source/Free Security/Hacking Tools

1. Nmap Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. Nmap uses raw IP packets in novel ways to determine what hosts are available on...

View Article

Image may be NSFW.
Clik here to view.

Backup\Steal Passwords Using a USB

This post is of-course for educational purposes only. Although the title of this post implies that this is designed for a USB, any device like an MP3 player or a mobile phone can be used as they can...

View Article

Image may be NSFW.
Clik here to view.

Anonymous Hack Team Website Demand Apology for Assault

Hackers identifying as “KnightSec,” an arm of Anonymous, attacked the website of an Ohio high school football team to demand a public apology for the gang rape of a 16-year-old girl reportedly...

View Article


Image may be NSFW.
Clik here to view.

Top 10 Ethical Hacking Tools

As regular readers will already know I am an avid hacker/cracker and enjoy sharing knowledge. So below is a my ‘Top 10 Ethical Hacking Tools’ for Linux and Windows. Now remember only use these tools on...

View Article

Image may be NSFW.
Clik here to view.

A 13 Year Old Tried to Hack a Steam Account, and got Hacked.

This is absolutely hilarious. This guy tried to phish for some dudes password via MSN. It ended up with him getting pwned. The lesson is, don’t phish, i love his end comment. You need to check this...

View Article

Image may be NSFW.
Clik here to view.

British MI6 Replaces al-Qaeda Bomb Recipe with Cupcakes

British MI6 intelligence officers hacked into the Islamic extremist website and magazine, Inspire, and replaced bomb-making instructions with a recipe on how to make cupcakes, media reports said on...

View Article


Image may be NSFW.
Clik here to view.

My Top Hacking Tools Of All Time

Here is a list of my favorite old & new school information security & hacking tools:  Burpsuite Burp Suite is an integrated platform for performing security testing of web applications. Its...

View Article


Image may be NSFW.
Clik here to view.

BlackBerry Enterprise Server Vulnerable to TIFF Image Based Exploit

If you are a BlackBerry Enterprise Network user, here is something you need to be careful about. BlackBerry Enterprise Server (BES) users have been warned that an image-based exploit could allow...

View Article

Image may be NSFW.
Clik here to view.

Romanian Jailed For ATM Skimming Scheme

A Romanian man serving a five-year jail sentence in Romania for his involvement in an ATM skimming scheme, has developed a device designed to protect ATMs from such attacks. 33-year-old Valentin Boanta...

View Article

Image may be NSFW.
Clik here to view.

When is a Phone Charger Not A Charger ?

You might want to be a little more careful the next time you pick up a cheap knock-off accessory for your device to save a few bucks because new hardware hacks could be the next big thing among cyber...

View Article

Image may be NSFW.
Clik here to view.

Create a Script to Steal Data

Please use responsibly, Caintech.co.uk take no responsibility for the use of the following information it should only be used for educational purposes How to steal files with USB For this you’ll need a...

View Article


Image may be NSFW.
Clik here to view.

Top 15 Free Hacking Tools

1. Nmap Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. Nmap uses raw IP packets in novel ways to determine what hosts are available on...

View Article

Image may be NSFW.
Clik here to view.

Secret Hacking Codes for Android Mobile Phones

1. Complete Information About your Phone *#*#4636#*#* This code can be used to get some interesting information about your phone and battery. It shows following 4 menus on screen: • Phone information...

View Article


Image may be NSFW.
Clik here to view.

All Smartwatches are Hackable

Do you own a Smartwatch? If yes, then how safe it is? There are almost 100 percent chances that you own a vulnerable Smartwatch. Computer manufacturer Hewlett-Packard is warning users of smartwatches...

View Article

Image may be NSFW.
Clik here to view.

Download Top Hacker Shells

In computer security, a shellcode is a small piece of code used as the payload in the exploitation of a software vulnerability. Hackers usually take advantage of an upload panel designed for uploading...

View Article


Image may be NSFW.
Clik here to view.

The Top Free Hacking e-Books

Free hacking ebooks where you can download from the links below. Black Belt Hacking & Complete Hacking Book Hackers High School 13 Complete Hacking E-books Penentration Testing With Backtrack 5 A...

View Article

Image may be NSFW.
Clik here to view.

Free Computer Forensic Tools

Here is some help for you guys and gals that are looking for some forensic tools, they can also be good fun to mess around with. 1. Disk tools and data capture ————————————————————————————————————–...

View Article

Image may be NSFW.
Clik here to view.

Get Hacked By Opening a JPEG File

Researchers have disclosed a critical zero-day vulnerability in the JPEG 2000 image file format parser implemented in OpenJPEG library, which could allow an attacker to remotely execute arbitrary code...

View Article
Browsing all 22 articles
Browse latest View live




Latest Images