Cyber Security

Victimize the target: DDoS Attack

What is DDoS attack? DDoS  It stands for Distributed Denial of Service. Distributed Denial of Service attacks a single target ...
Read More

Net Neutrality: A Lucid explanation

First of all. Unhindered internet (or Network Neutrality) is an all inclusive acknowledged guideline of keeping the Internet opportunity flawless ...
Read More
rotation Of earth +knowledgesuttra

Arpanet:Tracing world wide web back to its origins.

Hi,welcome to KnowledgeSuttra. The Advanced Research Projects Agency Network (ARPANET) was an early packet-switching network and the primary system to actualize the convention suite TCP/IP ...
Read More

QRL Jacking/ QR code hacking + Whats App hacking 

Hi,welcome to KnowledgeSuttra. Well as earlier we have seen that QR codes small info. Here is the next blog on ...
Read More

Graphical codes Hacking : QR code.

Welcome to the first ever introducing blog where the codes and its hacking will be completely explained. Before wasting time ...
Read More
Ripple (XRP) : on the way to changed its ledger software+knowledgesuttra

These How you can Break the HTTPS secured connection

Hi,welcome to KnowledgeSuttra. Let’s have quick guide on How to break HTTPS secured connection. HTTPS provide security as well authority ...
Read More

Quick Guide on “nmap : Cheat Sheet”

There is need of some basics commands for information gathering. But a single tool can have multiple commands as many ...
Read More
Know anyone’s location by sending link through message(WhatsApp, Facebook, etc).+knowledgesuttra

Know anyone’s location by sending link through message(WhatsApp, Facebook, etc).

Where’s my boy/girlfriend ? Where he/she spend maximum time ? Do you think he/she lied to you ? Well know ...
Read More
Internet Response Codes+knowledgesuttra

Internet Response Codes with meaning.

Started the web pentesting the thing which we missed out is response codes. Today you will get the whole and ...
Read More
The Hacking Grammar : Unknown Fact+knowledgesuttra

Identifying Gathered Data : Whois Records

In the previous blog we learned about some tools which allow us to gather some information about websites. As last ...
Read More
Data Breach From GOOGLE+ , Google shutting down , konwledgesuttra

Data Breach: Google+ way to shutting down soon

Hello There,Welcome to KnowledgeSuttra . First Facebook data breach & now Google , yes exactly a month ago we heard ...
Read More

Information Gathering Online Tools

Hello everyone welcome to knowledgesuttra. Today we are going to discuss about the online tool which help for information gathering ...
Read More

RAT of Hackers : Remote Access Terminal(Trojan)

Hello everyone welcome to knowledgesuttra. Today's topic is RAT of Hackers. We will see how to use RAT and how ...
Read More
Wi-Fi Hacking and Protecting : Fluxion+knowledgesuttra

Wi-Fi Hacking and Protecting : Fluxion

There are many guides available for Wi-Fi hacking where tools such as WPS WPA tester, Reaver,etc are used. In which ...
Read More
Ripple (XRP) : on the way to changed its ledger software+knowledgesuttra

Fight : HTTP vs HTTPS

Hi, welcome to KnowledgeSuttra . Here's the another short fight between two standard browsing protocols. Having prior knowledge for Internet Browsing ...
Read More
DOWNLOAD EVERYTHING REGARDING YOUR PERSONAL FACEBOOK DATA

Facebook phishing: Complete Guide

Hello everyone welcome to knowledgesuttra. today we are discussing about Facebook phishing. Steps required for making a facebook phishing page ...
Read More

STORM v2.5.1 has been released

Hello everyone welcome to knowledgesuttra. Today we are discussing about The STORM, what is STORM and what is new in ...
Read More
SEO guide for beginner +knowledgesuttra+dorks

Google’s Syntax(Dorks) : A better way to browse

Google is working with its own Syntax's to search during the browsing session. Google has many data as much as ...
Read More
pornsite stills data identity-theft

Download what exactly you wanted : Underground Browser

Hi,welcome to KnowledgeSuttra .Maximum time the user wants to download Softwares/ Files(resumes, documents, Excel sheets, etc)/Games, Videos, etc. But surfing ...
Read More
Android Configuration in Virtual Machine

Android Configuration in Virtual Machine

Hi,welcome to KnowledgeSuttra. Many times developing a Trojans, Malwares, Viruses as well as backdoors becomes so easy. The hard task ...
Read More

CREATING UNDETECTABLE PAYLOAD’S-II

The last blog you might have seen about the same topic Creating Undetectable payloads . But in that session the ...
Read More

Creating Undetectable Payloads

Now-a-days, more and more secured system is Linux, but the facility of User Interface deceives all users to use its ...
Read More
Steganography : Catch your victim behind the Filesystem+knowledgesuttra

Creating Malware’s for Windows Based Computer Without Footprints

Welcome to the hacking Zone. Today we will discuss and create the Virus for Windows based operating system. Also Read:- ...
Read More
Steganography : Catch your victim behind the Filesystem+knowledgesuttra

COVERING TRACKS : CLEARING THE FOOTPRINTS

In order to get access into database via Stenography , always there’s a missing thing which is commonly known as ...
Read More

Doxagram : Selling of instagram accounts

After the Facebook data breach the hackers target the bigger community i.e Instagram. Now it is confirmed that the hacker is ...
Read More

Keep shortened URL’s away and reach the Destiny URL

Hi,welcome to KnowledgeSuttra .Now-a-days the mysterious thing that actually happens for earning is links shortening. Links that are shortened first ...
Read More
Steganography : Catch your victim behind the Filesystem+knowledgesuttra

Steganography : Catch your victim behind the Filesystem

Hi,welcome to KnowledgeSuttra . It happens many times when we try to download the pirated software like Adobe Photoshop, Adobe ...
Read More
How to gain complete access on Router/ DHCP server ?+knowledgesuttra

How to gain complete access on Router/ DHCP server ?

Well ! Sometimes it happens like a single router/DHCP server is available at the location and many user get connected ...
Read More
free VPN+knowledgeSuttra

FREE : Proxy, VPN & Accomplishing Safety

Hi,welcome to KnowledgeSuttra.In order to deal with hacking the very first thing that you hide is your Virtual Identity. So ...
Read More
grab these deal+offer+knowledgesuttra

Special technique to Grab every sale and offer

Hi,welcome to KnowledgeSuttra . As many time it happens with me, may be with you also. like you seen an ...
Read More
find Vulnerability in NETWORK+knowledgesuttra

NESSUS : Tool to discover, scan and find Vulnerability in NETWORK

In the previous session we’ve discussed about gaining the information of our victim. This guide is about scanning the network ...
Read More

Fingerprinting : The finest touch to your victim.

Hello,welcome to KnowledgeSuttra . As we saw in the past that there are total five phases in penetration testing/hacking/ pentesting ...
Read More
phishing+knowledgesuttra+rushabh gedam

Phishing : Stay Safe or Sacrifice Yourself.

Hi,welcome to Knowledgesuttra.  Phishing, one of the most popular type of attack in cyber world. previously we  had uploaded blog ...
Read More
how to make virus+knowledgesuttra

Build your first Virus + Trojan + Malware

Hello ,welcome to KnowledgeSuttra .As everyone knows computer listen only one language which we don’t. It is coding. And what ...
Read More
phases of hacking

Steps/Phases in System, Server, Organization Hacking

Hi,welcome to KnowledgeSuttra . To gain access in anyone's/organizations system, there must be a proper way to do so. Meanwhile ...
Read More
types of cyber attack+knowledgesuttra

Attack in Cyber World :Soul of cyber Security_3

HI,There are various attacks and different types of used by Cybersecurity experts in hacking systems. In which a system configuration ...
Read More
The Hacking Grammar : Unknown Fact+knowledgesuttra

The Hacking Grammar : Unknown Fact

HI,welcome to KnowledgeSuttra .Every branch and every department when deals with problem's and obtaining its solution the proper language. And this ...
Read More
Privacy again going to compromised but "Door to privacy is here"+knowledgesuttra

Privacy again going to compromised but “Door to privacy is here”

Hello guys ! As we already discussed about the Google's safe search engine encrypted.google.com, Currently it is not working ! Why ...
Read More
kali linux IP confuguration+knowledgesuttra

Setting of Static IP address in Kali Virtual Machine

Hi,welcome to KnowledgeSuttra. As you all knows Kali linux importans. Kali plays major role in The world of Hacking ...
Read More
CyberSecurity jobs are waiting here : Skills for a CyberSecurity must have

CyberSecurity jobs are waiting here : Skills for a CyberSecurity expert must have

Hi,Welcome to KnowledgeSuttra.  As we are in the way of learning Cyber Security, many thing's still need to know. Yes,its ...
Read More
Everyone of you fooled by incognito mode/private browsing Your Private life's, private Browsing has been exposed

Everyone of you fooled by incognito mode/private browsing Your Private life’s, private Browsing has been exposed

Hi,welcome to KnowledgeSuttra.  Lets talk about private data theft. today's blog specially for Those who visits porn sites(video, images, etc), ...
Read More
metasploit 2 knowledgesuttra

Downloading, Installing & Configuring A Metasploitable2.vms

Hi, Welcome to KnowledgeSuttra. Many of you are trying to use hacking tools already available in the hacking environment including ...
Read More
DOWNLOAD EVERYTHING REGARDING YOUR PERSONAL FACEBOOK DATA

Download Everything Regarding your Personal FACEBOOK Data

Hi,Welcome to KnowledgeSuttra Facebook has gone through Very Bad phase Due to Facebook Users Data Breach. Mark Zuckerberg CEO of ...
Read More
How to see whats app disappear status

What’s App Status Will Disappear after 24 Hours [Total myth]

Hi, welcome to KnowledgeSuttra. What’s app brings always something new features for users , And one of the most popular ...
Read More
blotware knowledgesuttra

No More Private: Life You Are Monitored Via Your Smartphones

Hi,welcome To KnowledgeSuttra. I m going to show you all Mobile's one of the worst feature for us, and best ...
Read More
URL shortening services

Google has turning down URL Shortener and launching new alternative

Hi , Every time google comes with new shocking news , few days ago google closed its view image button , ...
Read More
privacy shortcut by facebook

A privacy shortcut Button Regarding to Stop Facebook Data Breach

Hi, welcome to KnowledgeSuttra, as recently updated a blog regarding to Facebook data breach, Government of India sent an legal notice regarding ...
Read More
hackers os, rushabh gedam

Lets Build A Environment For Hacking

Hi,welcome to KnowledgeSuttra. Starting a hacking needs a hackers tool "Kali linux". Kali linux is also known as hackers OS ...
Read More
facebook data theft+knowledgesuttra

Secretly Your Personal Data has been monitored : Facebook Data Breach

Hi Welcome To KnowledgeSuttra .Recently, the secret which was revealed is that the biggest social networking platform well known as Facebook, was sued ...
Read More
hacking tool kits+rushabh gedam

Top Mostly Used Pro Hacking Tools For Kali Linux

Hi, welcome to KnowledgeSuttra. Previously i listed top hacking app for smartphone Do check out. But if take at as pro ...
Read More
Top 10 hacking apps for : Mobile

Top 10 hacking apps for : Android Cell Phones

Hi,welcome to KnowledgeSuttra. As you decided to dive into hacking the first stage we approach “Try some hacking from Mobile itself” ...
Read More
RottenSys

Branded Smartphones Comes With Pre installed malware:RottenSys

Hi, welcome to knowledgeSuttra. Everyone of you own a cell phone which comes with cool features along with that a ...
Read More

As A Penetration Tester What Thing Need To Do?

Hi, welcome to KnowledgeSuttra. Lets have an small over look on what exactly Penetration Tester do?  As we already discussed ...
Read More
GitHub DDOS Attack +knowledgesuttra+Akshaykumar rokade

Report On GitHub DDOS Attack: Greatest DDOS Attack Ever In The History

Hi welcome to KnowledgeSuttra. Many IT student Probably knows about GITHUB. If you still don’t know about GitHub let me ...
Read More
hacers PC

Needed Configuration For Hackers PC: Soul Of Cyber Security

Hi,Welcome to KnowledgeSuttra.  Every hacking task is done virtually(through Internet) as we discussed earlier but before going virtual there is ...
Read More
VPN

VPN[virtual proxy network ] : Virtual Identity IN Virtual World

Hi, Welcome to KnowledgeSuttra. Without wasting any time Lets take deep dive into our today's Blog Once any user wants ...
Read More
view image

Google taken “view image”option away from it’s service,Why?

HI, welcome To KnowledgeSuttra. Recently google announced About Removing "view image" button, Its is kind of shocking as one bad ...
Read More
cyber world

Where do You “Stand in World Cyber Security” ?

Hi, Let Me wish you The most beautiful Good Morning. Today we are going to talk about something verious serious. In ...
Read More
Custom personal computer At Minimum Cost-rushabhgedam

Custom personal computer At Minimum Cost

Hi, welcome to KnowledgeSuttra.As we all learning Cyber Security and more coming to way but, Before getting dive into Cyber Security and ...
Read More
the key factor in cyber security -knowledgesuttra

The Key Factor Common Sense:Soul of Cyber security[Hacking]

Hi, welcome to KnowledgeSuttra. Today’s blog kind of interesting why, just because  I am going to talk about the main ...
Read More
KnowledgeSuttra

Linux : Soul Of Cyber_security

Hi,welcome to KnowledgeSuttra. Today we are going to talk about An Linux Operating System is the Soul Of Cybersecurity, Why? ...
Read More
IP Address : Soul In Cyber Security World

IP Address: Soul Of Cyber Security World

IP your virtual name, let's know it. IP stands for Internet Protocol. It is allocated to each internet user when ...
Read More

Man-In-The-Middle attack (MITM attack)

Hello,welcome to KnowledgeSuttra. Every Notice a certain message Popup  on  screen  Which ask for unauthorized permission, wants to know why these ...
Read More
ReCaptcha Explain

Getting ReCaptcha on Google, Why?

Hi, welcome To knowledgesuttra. Today i am going to talk about reCaptcha , It's a thing which sucks a lot. This ...
Read More

OnePlus : 40K Customer Credit Cards Used for Fraud Transactions

In the event that you gave your Visa number to OnePlus at some point between mid-November and a week ago, ...
Read More
Metasploit-Knowledgesuttra

What is Metasploit?

Hi, Welcome to KnowledgeSuttra Well basically, The Metasploit project is basically a security tool used to attack a system or a ...
Read More

Hacking As A Profession!

Hi, Welcome to KnowledgeSuttra. When you like hacking & wants to be a professional hacker just change your name to ...
Read More

Everything You Ever Wanted To Know About Cyber Security!!

HI, welcome to KnowledgeSuttra. This Blog is meant to answer some of the questions belongs  to cyber security which regularly ...
Read More

Increasing Downloading Speed myth’s & truth’s !!

Hello there, welcome to KnowledgeSuttra. We already know that internet speed is dependent on the services which we choose for ...
Read More

WireLurker : A Apple Malware

Hello ,welcome to Knowledgesuttra . A bad news for iOS Device users  ,a malware called as a WireLurker  targeted all the ...
Read More
Is Your Favorite messaging app Secure?

Is Your Favorite messaging app Secure?

HI, Welcome to KnowledgeSuttra, guys do you know how your favourite messaging application are secure like the most popular application ...
Read More