Top 5 Must Read Articles Of 101hacker.com


Hi readers, Its been almost three and half years since i started this website , I first began this website as a small personal blog later realized that many where interested in my articles so i launched 101hacker.com . I have seen both the ups and downs in my blogging carrier. When feeling a bit low, the only thing that kept me going was the love and encouragement  of my blog  readers and followers . So at this moment i would like to specially thank all my blog readers and followers for their continuous support. To review what i did at 101hacker.com, i have compiled some of the best articles of 101hacker.com that every one should read

Top 5 Must Read Articles Of 101Hacker.com

1. Phishing Attacks In Public Hotspots 

         Dns Based Phishing attack in public Hotspots  gives a brief practical insight on how to carry out a DNS-based phishing attacks in public Wi-Fi hotspots to trick users into sharing their personal information such as passwords, credit card details etc 

2. Hack Remote Routers Using Telnet

Telnet is a legacy remote terminal TCP/IP application used for remote administration, Telnet is notorious for transmitting communications in plain text and has long since been superseded by SSH that uses encrypted channels so it is rare to see telnet in use on the Internet .But you will be surprised to know that most of the routers have telnet serveries running on them by default even today ,This is a serious vulnerability ,this allows malicious users to connect to the router from anywhere in the world using default credentials, and can wreak havoc.

3. How To Hack Facebook Accounts By Tabnabbing


Tabnabbing is a new type of  phishing attack. It basically refers to a website that is changing its look and feels to a fake website after some time of inactivity. It is about a page we’ve been looking at, but will change behind our backs, when we aren’t looking....

4. How To Hack Remote ADSL routers


ADSL routers also known as DSL modems is a device used to connect the computer to the DSL phone line for using Internet Services (broad band ).Some of these ADSL routers have a serious vulnerability in them, which allows a attacker to have complete access to the router settings..



5. Different Types Of Hashes And How To Identify Them

A tutorial on how to identify different types of hashes by just looking at them, this info will help you when your cracking password hashes 


I hope the above info was helpful , If you any queries or doubts please post your comments 

Subscribe to Hackaholic

Enjoyed this article?
Subscribe to "Hackaholic"and get daily
updates in your inbox for free!

Related Posts Plugin for WordPress, Blogger...

Maurissa Maharaj said on November 28, 2013 at 10:40 AM :

Love your articles..sorry i didn't discover your blog sooner. Can you do an article on brute force hacking of emails plz. Would love to get an in depth explanation of this along with downloadable links. If this was already done, can you direct me to the article plz. Thanks so much and keep up the great work.

REPLY
John ( Admin ) said on November 29, 2013 at 1:32 AM :

@Maurissa Maharaj
I will be doing a tutorial on Brute forcing, very soon so stay tuned !

REPLY

Use the form below to comment. No spam please!!!

© 101hacker | Design by Mukund edited by John
Powered by Blogger