Lorem ipsum dolor sit amet, consectetuer adipiscing.

Pellentesque habitant morbi tristique senectus et netus et malesuada fames ac turpis egestas.

Cyber Facts

Hello everyone , I have resested my Website due to some technical issues  and try to make it working soon .  So here’s my new post which  guide you to strengthen the weakest point of any security solution on this planet . No matter how much effective—or expensive—the security tools for  protecting your network are, […]


Cyber Facts

Hello everyone , I have resested my Website due to some technical issues  and try to make it working soon .  So here’s my new post which  guide you to strengthen the weakest point of any security solution on this planet . No matter how much effective—or expensive—the security tools for  protecting your network are, there’s no way to predict the damage caused by any careless user. The war against every cyber criminals is fought each time a user decides to click an unfamiliar link or open an attachment thats a only single mistake could be the reason for massive data loss .


If you take security seriously, you’re already using Umbrella to protect your network from malware, botnets, and other advanced threats. And if you’re smart, you know that there’s no substitute for educating yourself and others .

Follow below Interesting facts which can make you secure against any threats and cyber crime activity :

  • Always remember and Realize that you are an attractive target to hackers. Don’t ever say “It won’t happen to me.” . As anything can happened at any moment of time .
  • Prefer for good password management . Use a strong combination  of characters, and don’t use the same password for multiple sites. Don’t share your password with others at any moment of time , don’t write it down, and definitely don’t write it on a post-it note attached to your monitor.
  • Never leave your devices unattended. If you need to leave your computer, phone, or tablet for any length of time—no matter how short—lock it up so no one can use it while you’re gone. If you keep sensitive information on a flash drive or external hard drive, make sure to lock it up as well.
  • Always be careful while clicking on attachments or links in email . If it’s unexpected or suspicious for any reason, don’t click on it. Double check the URL of the website the link takes you to: bad actors will often take advantage of spelling mistakes to direct you to a harmful domain.
  • Sensitive browsing, such as banking or shopping, should only be done on a device that belongs to you using Internet Explorer only and  on a network that you trust. Whether it’s a friend’s phone, a public computer, or a cafe’s free WiFi—your data could be copied or stolen.
  • Back up your data regularly, and make sure your anti-virus software is always up to date.
  • Be conscientious of what you plug in to your computer. Malware can be spread through infected flash drives, external hard drives, and even smartphones.
  • Watch what you’re sharing on social networks. Criminals can befriend you and easily gain access to  shocking amount of information—where you go to school, where you work, when you’re on vacation—that could help them gain access to more valuable data.
  • Offline, be wary of social engineering, where someone attempts to gain information from you through manipulation. If someone calls or emails you asking for sensitive information, it’s okay to say no. You can always call the company directly to verify credentials before giving out any information.
  • Be sure to monitor your accounts for any suspicious activity. If you see something unfamiliar, it could be a sign that you’ve been compromised.

Thats not at all be the end boundaries of Security its just a few key features to make everyone aware about it .


Network Eavesdropping

Network Eavesdropping (network sniffing) is a network layer attack which is able to capture packets from the network transmitted by others’ computers and reading the data content in search of sensitive information like passwords, session tokens, or any kind of confidential information.
This attack could be done using many tools called network sniffers. These tools collect packets from the network and , depending on the quality of the tool, analyze the collected data like protocol decoders or stream reassembling.

Thats not all about this technology , It just a summary . I’ll provide the complete description soon . Hope you like this post .


Hello Everyone Here I am back with new stuffs which you know but I’ll express it in different way .

Armitage is a graphical cyber attack management tool for Metasploit that visualizes your targets, recommends exploits, and exposes the advanced capabilities of the framework. Armitage aims to make Metasploit usable for security practitioners who understand hacking but don’t use Metasploit every day. If you want to learn Metasploit and grow into the advanced features, Armitage can help you.

It is a free and open source network security tool notable for its contributions to red team collaboration allowing shared sessions, data, and communication through a single Metasploit instance.

Armitage is a scriptable tool built on top of the Metasploit Framework for launching scans and exploits, get exploit recommendations, and use the advanced features of the Metasploit Framework’s meterpreter

Armitage organizes Metasploit’s capabilities around the hacking process. There are features for discovery, access, post-exploitation, and maneuver.

For discovery, Armitage exposes several of Metasploit’s host management features. You can import hosts and launch scans to populate a database of targets. Armitage also visualizes the database of targets–you’ll always know which hosts you’re working with and where you have sessions.

Armitage assists with remote exploitation–providing features to automatically recommend exploits and even run active checks so you know which exploits will work. If these options fail, you can use the Hail Mary approach and unleash db_autopwn against your target database.

For those of you who are hacking post-2003, Armitage exposes the client-side features of Metasploit. You can launch browser exploits, generate malicious files, and create Meterpreter executables.

Once you’re in, Armitage provides several post-exploitation tools built on the capabilities of the Meterpreter agent. With the click of a menu you will escalate your privileges, dump password hashes to a local credentials database, browse the file system like your local, and launch command shells.

Finally, Armitage aids the process of setting up pivots, a capability that lets you use compromised hosts as a platform for attacking other hosts and further investigating the target network. Armitage also exposes Metasploit’s SOCKS proxy module which allows external tools to take advantage of these pivots. With these tools, you can further explore and maneuver through the network.

Thats all about the small description of Armitage .


ChatClick here to chat!+