How to Detect and Avoid Phishing

On our previous post, we already talked about phishing. Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message to obtain sensitive information such as usernames, passwords, and credit card details (and money), often for malicious reasons, by disguising as a trustworthy company. Phishing is an example of social engineering techniques used to trick users, and exploits weaknesses in current web security. This time, we will tell you how to avoid it by detecting it first.

Continue reading

Footprinting a Webserver

Before we do footprinting, we have to understand what footprint is. Footprinting (also known as reconnaissance) refers to the process of collecting as much as information as possible about the target system to find ways to penetrate into the system. Information such as ip address, Whois records, DNS information, an operating system used, employee email id, Phone numbers etc is collected. These information is very useful to a hacker who is trying to crack a whole system.

Continue reading

Web Application Fingerprinting

One of the first tasks when conducting a web application penetration test is to try to identify the version of the web server and the web application. It allows us to discover all the well-known vulnerabilities that are affecting the web server and the application.This process is called web application fingerprinting and in this article we will see how to perform it.

Continue reading

Installing Kali Linux as a Virtual Machine

To do a penetration testing we are going to install some penetration testing tools. We will use an operating system called Kali Linux. It’s just a flavor of Linux based on Debian, and it comes in with all the programs and the applications that we need to use pre-installed and pre-configured. This means that we can just install this operating system and then start learning our hacking.

Continue reading

Brief Explanation of Ethical Hacking

What is hacking? Hacking is being able to do anything that you’re not allowed or supposed to do. For example, viewing any page that you don’t have permission to view an information, using another computer that you’re not allowed to use, or even hack into a computer to gain access and control it.

Continue reading

DISCLAIMER

Featured

Any actions and or activities related to the material contained within this website is solely your responsibility. The misuse of the information in this website can result in criminal charges brought against the persons in question. KASUR will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this website to break the law.

This site contains materials that can be potentially damaging or dangerous. If you do not fully understand something on this site, please leave this site now! Refer to the laws in your province/country before accessing, using, or in any other way utilizing these materials. These materials are for educational and research purposes only. Do not attempt to violate the law with anything contained here. Neither administration of this server, the authors of this material, or anyone else affiliated in any way, is going to accept responsibility for your actions.

Your usage of this website constitutes your agreement to the following terms:

  • All the information provided on this site are for educational purposes only. The site is no way responsible for any misuse of the information.
  • “KASUR” is a team that provide site related to Computer Security and not a site that promotes hacking / cracking / software piracy.
  • This site is totally meant for providing information on “Computer Security”, “Computer Programming” and other related topics and is no way related towards the terms “CRACKING” or “HACKING” (Unethical).
  • All the information on this site are meant for developing Hacker defense attitude among the users and help preventing the hack attacks. KASUR insists that these information shall not be used for causing any kind of damage directly or indirectly. However you may try these codes on your own computer at your own risk.
  • The word “Hack” or “Hacking” that is used on this site shall be regarded as “Ethical Hack” or “Ethical Hacking” respectively.

We believe only in White Hat Hacking. On the other hand we condemn Black Hat Hacking.

We reserve the right to modify the Disclaimer at any time without notice.

 

Best regards,

KASUR TEAM
2001586205     Andriana Pratama Putra
2001622614     Veber Sormin