Latest topics
» 2018 WAEC Runz Subscription is ongoing at 9Jatechs
Sat Mar 17, 2018 12:40 am by Emmi

» How To Undo Sent Messages In WhatsApp [WhatsApp Delete for Everyone
Wed Mar 14, 2018 8:13 pm by Snows

» 2018 WAEC GCE Result is out(Jan/Feb 1st Series Exam)
Wed Mar 14, 2018 12:53 am by pati

» Neco 2018 June/July Timetable Officially Released
Tue Mar 13, 2018 6:49 pm by issac

» WhatsApp Group For Waec and Neco Examination
Mon Mar 12, 2018 3:03 pm by issac

» Simple Steps on How To Check Your JAMB Result
Mon Mar 12, 2018 12:02 am by Emmi

» 10th March 2018 JAMB CBT 1:30pm Answers
Sat Mar 10, 2018 2:32 pm by Emmi

» 10th March, 2018 JAMB CBT Exam Answers are Available | JAMB expo
Sat Mar 10, 2018 3:48 am by Emmi

» How To Send And Receive Messages From Your Youtube Account
Fri Mar 09, 2018 11:11 pm by Emmi

» JAMB CBT 2018/2019 Exam Runs | Exam Expo
Thu Mar 08, 2018 11:51 pm by Emmi

Thu Mar 08, 2018 11:30 pm by Godshand

» How To Subscribe To JAMB CBT 2018/2019 Exam Runs at 9Jatechs
Thu Mar 08, 2018 8:01 pm by Emmi

» See Full List Of Jamb Examination Centres For 2018 Utme In Nigeria
Thu Mar 08, 2018 1:14 am by pati

» Jamb Cbt Centre Operators Beg For Time As Utme 2018 Begins Friday
Thu Mar 08, 2018 1:08 am by pati

» Airtel Family And Friends Package - How To Add Or Remove Numbers From The Family And Friends Service
Wed Mar 07, 2018 8:09 pm by Snows

» Enjoy 100% Double Data Bonus Exclusively On The Mtn NG Network
Wed Mar 07, 2018 8:07 pm by Snows

» Jamb Utme To Begin On Friday 9 March 2018, Reprinting On 6th
Wed Mar 07, 2018 12:22 am by Emmi

» Jamb: How To Check For Your Utme 2018 Centres
Wed Mar 07, 2018 12:18 am by Emmi

» Waec 2018 Timetable For April/May Examination
Tue Mar 06, 2018 11:10 am by pati

» 2018/2019 JAMB CBT and WAEC subscription is ongoing
Tue Mar 06, 2018 11:01 am by mose

Tue Mar 06, 2018 10:48 am by Emmi

» Important Files you Should Backup on Your Computer
Sun Mar 04, 2018 6:06 pm by Snows

» 2018 JAMB Mock Result Is Out! See Procedures To Check it
Sun Mar 04, 2018 5:45 pm by Jose

» Chapter To Chapter and Full Summary of Independence (JAMB Recommended Novel For 2018 UTME)
Fri Mar 02, 2018 11:02 am by dessy dexter benards

» Cheapest Data Plan For iOS, Android and PC in March 2018
Fri Mar 02, 2018 1:21 am by Jose

Top posting users this month

Display results as :


Rechercher Advanced Search

Like Our facebook Page
Log in

I forgot my password

How To Send And Receive Messages From Your Youtube Account

Fri Mar 09, 2018 11:11 pm by Emmi

Did you know that you can send and receive messages on YouTube account.. It's pretty easy to do that.. 

Kindly follow the steps below to get started. 




  • Open YouTube. Go to YouTube in your computer's web browser. This will open your YouTube home page …

[ Full reading ]

Comments: 0

Airtel Family And Friends Package - How To Add Or Remove Numbers From The Family And Friends Service

Wed Mar 07, 2018 8:09 pm by Snows

I know most of us here know about the airtel family and friends package. 


Airtel Family and Friends (FAF) a product service with which discounted call prices are made available and accessible for registered Airtel numbers

So in this post, I will show you how to register your family and friends numbers on The 

[ Full reading ]

Comments: 0

Enjoy 100% Double Data Bonus Exclusively On The Mtn NG Network

Wed Mar 07, 2018 12:38 am by Emmi


Xup everyone, MTN currently has a new method for doubling Thier data bundle, you will recall sometime ago that mtn made a change to their data plans by reducing it and thereby increasing the price tagged along with them, there was also a time where "IMEI" needed to be used just to get the data bonus, well all that is now over as am gonna be …

[ Full reading ]

Comments: 2

Cheapest Data Plan For iOS, Android and PC in March 2018

Fri Mar 02, 2018 1:21 am by Jose

Cheapest Data Plan For iOS, Android and PC in March

So Airtel 4G is seriously rocking with free 4GB on activation in Ibadan. The speed is incredibly awesome. I’m guessing by the time it will launch in other states, the speed may or may not be throttle. Everyone using it at the moment seems to be happy with the speed.

Cheapest Airtel Data Plan:

Airtel New Data Plan:
Recharge N1000 and get …

[ Full reading ]

Comments: 0

How To Double Your 9Mobile Data

Fri Mar 02, 2018 1:04 am by mose

Today i will show you how to double data on 9mobile(Etisalat) network.


I recently switched to 9mobile network though their signal isn't good at where I'm residing but it's just manageable. 

9mobile offers …

[ Full reading ]

Comments: 0

Submit Your Site To The Web's Top 50 Search Engines for Free! Sonic Run: Internet Search Engine Submit Express Local SEO

The Software And Operating System Professional Hackers Use

View previous topic View next topic Go down

Ultimate goal ✭✭✭✭✭✭
Ultimate goal  ✭✭✭✭✭✭
Posts : 241
Points : 1165
Reputation : 12

PostSnows on Sun Nov 27, 2016 8:24 am

There are three types of hacker’s white hat hackers, black hat hackers and grey hat hackers. These hackers do the same thing hacking but in the different fields and for different purpose. White hat hackers work for the companies, FBI’s, CID’s etc. They keep the data safe from the other hackers by doing hard labor. In support of they are paid satisfactory amount for their work.

The black hat hackers are having wicked plans for hacking other computers. They illegally break the communication network for the information it means they steal the information and sell for the money.

Grey hat hackers are the combination of both hackers. These hackers do this for their fun they are neither good nor bad. But then also they linked with black hackers.

The black and grey hat hackers are known as “real hackers”. These peoples use very high technology so that they can never be mapped out. According to the blog and reports it is proved that the real professional hackers use Linux operating system.

Linux operating system accepts any kind of formation changes and also accepts any new software easily. The hackers not only use Linux but also use cheap burner laptop purchased on crag lists. These types of laptops have special type USB and SD cards which make the laptops disappear, damage if it has been traced.
Some of the Linux operating system used for hacking is given as follows:

1) Kali Linux: it is being financed by Offensive Security Ltd. Linux supply for digital forensics and penetration testing. Kali Linux operating system often used by the hackers. This is a project reserved for compatibility and porting to exact Android devices, called Kali Linux NetHunter. Mati Aharoni and Devon Kearns industrialised by rewriting of BackTrack. BeagleBone Black, HP Chromebook, CubieBoard 2, CuBox, CuBox-i, Raspberry Pi, EfikaMX, Odroid U2, Odroid XU, Odroid XU3, Samsung Chromebook, Utilite Pro, Galaxy Note 10.1 and SS808 these are the platforms presented by Kali Linux..
2) Back Box: this operating system backbox consist of complete set of tool require for hacking.

3) Parrot Security OS: Parrot Security OS is established by Debian’s stable branch (jessie). It is a GNU/LINUX distribution. It gives best diffusion and security testing experience. It is planned for Pentesting, Computer Forensic, Reverse engineering, Hacking, Cloud pentesting, privacy/anonymity and cryptography.

4) Live Hacking OS: this is also a pack of tools for hacking. It consists of the (GUI) GNOME inbuilt. It requires few hardware and very easy to operate.

5) DEFT Linux: The full form of DEFT is Digital Evidence and Forensic Toolkit. DEFT Linux is based on the Ubuntu operating system. This software is used by the hackers, IT auditors, investigators, military, and police.

6) Samurai Web Testing Framework: The Samurai Web Testing Framework operates a web pen-testing environment. The CD consists of tools which concentrate on testing and damaging websites. It consists of all four stages of a web pen-test.

7) Network Security Toolkit (NST): The Network Security Toolkit (NST) is based on Linux, Live DVD/USB Flash Drive. It provides open source computer security and networking tools. It is used for regular security, networking diagnostic and monitoring responsibilities.

Cool NodeZero: Node Zero is based on Linux kernel. It is obtained from Ubuntu. Distro (dual-arch Live DVD ISO image) is downloaded only in computers which supports 32-bit (x86) and 64-bit (x86_64).

9) Pentoo:– Pentoo is for penetration experiment and security consideration. It is a Live USB and Live CD. It is supported by Gentoo Linux. The Pentoo kernel consists of GPGPU cracking software, grsecurity and PAX hardening and extra patches.

10) GnackTrack: It is a task of combining penetration testing tools and the Linux Gnome desktop. Penetration testing, the features includes Metasploit, armitage, wa3f and others awesome tools.

11) Blackbuntu: BlackBuntu is supported by Ubuntu, GNU/Linux. It is designed for security distribution of penetration testing and cyber forensic investigations. The testing is based on GNOME Desktop Environment. It is used in Ubuntu 10.10 on BackTrack situation.

12) Knoppix STD: it is a group of hundred and thousands of open source security tools. It operates from a bootable CD, without disturbing the operating system of the server. It is not perfect for Linux but superior for novice and professional security personnel. If you know the basics of the Linux most of your works can be done by command line.

13) Weakerth4n: It is developed by Debian Squeeze. It uses Flux box for the desktop surrounding. It consists of many Wireless tools hence it is ideal for WI-Fi hacking. The tools of Weakerth4n consists of Wifi attacks, SQL Hacking, Cisco Operation, Password Cracking, Web Hacking, Bluetooth, VoIP Hacking, Social Engineering,
Information Assembling, Android Hacking, Networking and creating Shells.

14) Cyborg Hawk: according to hackers, this is the most awesome operating system ever made. The tools of Cyborg Hawk are specially made for pro Ethical Hackers and Cyber Security Experts. The tools of Cyborg Hawk are more advanced than kali. It consists of 700 tools for mobile safety and malware testing.
From the above details we come to a conclusion that, because of the power and flexibility of Linux the hackers choose this operating system.

View previous topic View next topic Back to top

Create an account or log in to leave a reply

You need to be a member in order to leave a reply.

Create an account

Join our community by creating a new account. It's easy!

Create a new account

Log in

Already have an account? No problem, log in here.

Log in

Permissions in this forum:
You cannot reply to topics in this forum