Posts

Access Dark web

Image
How to serve dark web. this post is for education purpose only. ☢️I am not responsible for any damages or and activities. open your tor browser and search www.duckduckgo.com and in the duckduckgo search bar type hidden Wiki and search 🔍 ,then click on first link. You will see there are many link's are present in different category and in the extension of link is only .onion not the .com, .in, .us, .gov, etc. 

Tor

Image
What is Tor. The Tor Browser is a web broswer that anonymizes your web traffic using the Tor network, making it easy to protect your identity online. If you're investigating a competitor, researching an opposing litigant in a legal dispute, or just think it's creepy for your ISP or the government to know what websites you visit, then the Tor Browser might be the right solution for you.

DoS and DDoS

Image
What is DoS and DDos attack. In computing, a denial-of-service attack is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network. 

Backdoor

Image
What is backdoor . A backdoor is a typically covert method of bypassing normal authentication or encryption in a computer, product, embedded device, or its embodiment. Backdoors are most often used for securing remote access to a computer, or obtaining access to plaintext in cryptographic systems.

MITM

Image
What is MITM ( Man in the middle) attack. A man in the middle (MITM) attack is a general term for when a perpetrator positions himself in a conversation between a user and an application—either to eavesdrop or to impersonate one of the parties, making it appear as if a normal exchange of information is underway.

ransomware

Image
What is ransomware attack. Ransomware is a type of malware from cryptovirology that threatens to publish the victim's personal data or permanently block access to it unless a ransom is paid off. While some simple ransomware may lock the system without damaging any files, more advanced malware uses a technique called cryptoviral extortion.