While researching on data exfiltration techniques and covert channels, I thought of making one of my own, dubbed ChorTCP. Though protocol over protocol tunneling is a well known concept but I really wanted to actually try to hypothesize one aspect and then implement it, just for fun. The abstract below…
Psychological Warfare
Human Beings are stupid by default ! Human Stupidity never fails to amaze any one. We do very very stupid things, unknowingly of-course. This article is about how hackers or any one can tap into the human mind and take advantage of it in every way possible, usually called exploitation….
Facebook ! A Datamining Tool !
Hello every one ! Here I am , again criticizing Facebook ! What can I say ? There is so much going on with Facebook that one can write and write and keep on writing ! Though its a great publicity stunt , in other words I am helping more…
Cyber Deception
Cyber Deception has alot of meanings but in this context this means that hackers start deceiving the government by creating Underground websites or Hackers news websites. These websites show that they are just finding updated news and posting it but reality is actually somewhat different.You must have heard about the…