Cyber Security

Doxagram : Selling of instagram accounts

After the Facebook data breach the hackers target the bigger community i.e Instagram. Now it is confirmed that the hacker is ...
Read More

Keep shortened URL’s away and reach the Destiny URL

Hi,welcome to KnowledgeSuttra .Now-a-days the mysterious thing that actually happens for earning is links shortening. Links that are shortened first ...
Read More
Steganography : Catch your victim behind the Filesystem+knowledgesuttra

Steganography : Catch your victim behind the Filesystem

Hi,welcome to KnowledgeSuttra . It happens many times when we try to download the pirated software like Adobe Photoshop, Adobe ...
Read More
How to gain complete access on Router/ DHCP server ?+knowledgesuttra

How to gain complete access on Router/ DHCP server ?

Well ! Sometimes it happens like a single router/DHCP server is available at the location and many user get connected ...
Read More
free VPN+knowledgeSuttra

FREE : Proxy, VPN & Accomplishing Safety

Hi,welcome to KnowledgeSuttra.In order to deal with hacking the very first thing that you hide is your Virtual Identity. So ...
Read More
grab these deal+offer+knowledgesuttra

Special technique to Grab every sale and offer

Hi,welcome to KnowledgeSuttra . As many time it happens with me, may be with you also. like you seen an ...
Read More
find Vulnerability in NETWORK+knowledgesuttra

NESSUS : Tool to discover, scan and find Vulnerability in NETWORK

In the previous session we’ve discussed about gaining the information of our victim. This guide is about scanning the network ...
Read More

Fingerprinting : The finest touch to your victim.

Hello,welcome to KnowledgeSuttra . As we saw in the past that there are total five phases in penetration testing/hacking/ pentesting ...
Read More
phishing+knowledgesuttra+rushabh gedam

Phishing : Stay Safe or Sacrifice Yourself.

Hi,welcome to Knowledgesuttra.  Phishing, one of the most popular type of attack in cyber world. previously we  had uploaded blog ...
Read More
how to make virus+knowledgesuttra

Build your first Virus + Trojan + Malware

Hello ,welcome to KnowledgeSuttra .As everyone knows computer listen only one language which we don’t. It is coding. And what ...
Read More
phases of hacking

Steps/Phases in System, Server, Organization Hacking

Hi,welcome to KnowledgeSuttra . To gain access in anyone's/organizations system, there must be a proper way to do so. Meanwhile ...
Read More
types of cyber attack+knowledgesuttra

Attack in Cyber World :Soul of cyber Security_3

HI,There are various attacks and different types of used by Cybersecurity experts in hacking systems. In which a system configuration ...
Read More
The Hacking Grammar : Unknown Fact+knowledgesuttra

The Hacking Grammar : Unknown Fact

HI,welcome to KnowledgeSuttra .Every branch and every department when deals with problem's and obtaining its solution the proper language. And this ...
Read More
Privacy again going to compromised but "Door to privacy is here"+knowledgesuttra

Privacy again going to compromised but “Door to privacy is here”

Hello guys ! As we already discussed about the Google's safe search engine, Currently it is not working ! Why ...
Read More
kali linux IP confuguration+knowledgesuttra

Setting of Static IP address in Kali Virtual Machine

Hi,welcome to KnowledgeSuttra. As you all knows Kali linux importans. Kali plays major role in The world of Hacking ...
Read More
CyberSecurity jobs are waiting here : Skills for a CyberSecurity must have

CyberSecurity jobs are waiting here : Skills for a CyberSecurity expert must have

Hi,Welcome to KnowledgeSuttra.  As we are in the way of learning Cyber Security, many thing's still need to know. Yes,its ...
Read More
Everyone of you fooled by incognito mode/private browsing Your Private life's, private Browsing has been exposed

Everyone of you fooled by incognito mode/private browsing Your Private life’s, private Browsing has been exposed

Hi,welcome to KnowledgeSuttra.  Lets talk about private data theft. today's blog specially for Those who visits porn sites(video, images, etc), ...
Read More
metasploit 2 knowledgesuttra

Downloading, Installing & Configuring A Metasploitable2.vms

Hi, Welcome to KnowledgeSuttra. Many of you are trying to use hacking tools already available in the hacking environment including ...
Read More

Download Everything Regarding your Personal FACEBOOK Data

Hi,Welcome to KnowledgeSuttra Facebook has gone through Very Bad phase Due to Facebook Users Data Breach. Mark Zuckerberg CEO of ...
Read More
How to see whats app disappear status

What’s App Status Will Disappear after 24 Hours [Total myth]

Hi, welcome to KnowledgeSuttra. What’s app brings always something new features for users , And one of the most popular ...
Read More
blotware knowledgesuttra

No More Private: Life You Are Monitored Via Your Smartphones

Hi,welcome To KnowledgeSuttra. I m going to show you all Mobile's one of the worst feature for us, and best ...
Read More
URL shortening services

Google has turning down URL Shortener and launching new alternative

Hi , Every time google comes with new shocking news , few days ago google closed its view image button , ...
Read More
privacy shortcut by facebook

A privacy shortcut Button Regarding to Stop Facebook Data Breach

Hi, welcome to KnowledgeSuttra, as recently updated a blog regarding to Facebook data breach, Government of India sent an legal notice regarding ...
Read More
hackers os, rushabh gedam

Lets Build A Environment For Hacking

Hi,welcome to KnowledgeSuttra. Starting a hacking needs a hackers tool "Kali linux". Kali linux is also known as hackers OS ...
Read More
facebook data theft+knowledgesuttra

Secretly Your Personal Data has been monitored : Facebook Data Breach

Hi Welcome To KnowledgeSuttra .Recently, the secret which was revealed is that the biggest social networking platform well known as Facebook, was sued ...
Read More
hacking tool kits+rushabh gedam

Top Mostly Used Pro Hacking Tools For Kali Linux

Hi, welcome to KnowledgeSuttra. Previously i listed top hacking app for smartphone Do check out. But if take at as pro ...
Read More
Top 10 hacking apps for : Mobile

Top 10 hacking apps for : Android Cell Phones

Hi,welcome to KnowledgeSuttra. As you decided to dive into hacking the first stage we approach “Try some hacking from Mobile itself” ...
Read More

Branded Smartphones Comes With Pre installed malware:RottenSys

Hi, welcome to knowledgeSuttra. Everyone of you own a cell phone which comes with cool features along with that a ...
Read More

As A Penetration Tester What Thing Need To Do?

Hi, welcome to KnowledgeSuttra. Lets have an small over look on what exactly Penetration Tester do?  As we already discussed ...
Read More
GitHub DDOS Attack +knowledgesuttra+Akshaykumar rokade

Report On GitHub DDOS Attack: Greatest DDOS Attack Ever In The History

Hi welcome to KnowledgeSuttra. Many IT student Probably knows about GITHUB. If you still don’t know about GitHub let me ...
Read More
hacers PC

Needed Configuration For Hackers PC: Soul Of Cyber Security

Hi,Welcome to KnowledgeSuttra.  Every hacking task is done virtually(through Internet) as we discussed earlier but before going virtual there is ...
Read More

VPN[virtual proxy network ] : Virtual Identity IN Virtual World

Hi, Welcome to KnowledgeSuttra. Without wasting any time Lets take deep dive into our today's Blog Once any user wants ...
Read More
view image

Google taken “view image”option away from it’s service,Why?

HI, welcome To KnowledgeSuttra. Recently google announced About Removing "view image" button, Its is kind of shocking as one bad ...
Read More
cyber world

Where do You “Stand in World Cyber Security” ?

Hi, Let Me wish you The most beautiful Good Morning. Today we are going to talk about something verious serious. In ...
Read More
Custom personal computer At Minimum Cost-rushabhgedam

Custom personal computer At Minimum Cost

Hi, welcome to KnowledgeSuttra.As we all learning Cyber Security and more coming to way but, Before getting dive into Cyber Security and ...
Read More
the key factor in cyber security -knowledgesuttra

The Key Factor Common Sense:Soul of Cyber security[Hacking]

Hi, welcome to KnowledgeSuttra. Today’s blog kind of interesting why, just because  I am going to talk about the main ...
Read More

Linux : Soul Of Cyber_security

Hi,welcome to KnowledgeSuttra. Today we are going to talk about An Linux Operating System is the Soul Of Cybersecurity, Why? ...
Read More
IP Address : Soul In Cyber Security World

IP Address: Soul Of Cyber Security World

IP your virtual name, let's know it. IP stands for Internet Protocol. It is allocated to each internet user when ...
Read More

Man-In-The-Middle attack (MITM attack)

Hello,welcome to KnowledgeSuttra. Every Notice a certain message Popup  on  screen  Which ask for unauthorized permission, wants to know why these ...
Read More
ReCaptcha Explain

Getting ReCaptcha on Google, Why?

Hi, welcome To knowledgesuttra. Today i am going to talk about reCaptcha , It's a thing which sucks a lot. This ...
Read More

OnePlus : 40K Customer Credit Cards Used for Fraud Transactions

In the event that you gave your Visa number to OnePlus at some point between mid-November and a week ago, ...
Read More

What is Metasploit?

Hi, Welcome to KnowledgeSuttra Well basically, The Metasploit project is basically a security tool used to attack a system or a ...
Read More

Hacking As A Profession!

Hi, Welcome to KnowledgeSuttra. When you like hacking & wants to be a professional hacker just change your name to ...
Read More

Everything You Ever Wanted To Know About Cyber Security!!

HI, welcome to KnowledgeSuttra. This Blog is meant to answer some of the questions belongs  to cyber security which regularly ...
Read More

Increasing Downloading Speed myth’s & truth’s !!

Hello there, welcome to KnowledgeSuttra. We already know that internet speed is dependent on the services which we choose for ...
Read More

WireLurker : A Apple Malware

Hello ,welcome to Knowledgesuttra . A bad news for iOS Device users  ,a malware called as a WireLurker  targeted all the ...
Read More
Is Your Favorite messaging app Secure?

Is Your Favorite messaging app Secure?

HI, Welcome to KnowledgeSuttra, guys do you know how your favourite messaging application are secure like the most popular application ...
Read More