Basically there are five steps in order to hack anything in this world:
· Information Gathering
· Scanning
· Gaining Access
· Maintaining Access
· Covering Tracks
In this post I’ll write about Information...
Saturday, July 12, 2014
Thursday, July 10, 2014
3:36 AM
Rupesh Kafle
Hack, SIP, Tricks
No comments

What is SIP?
SIP is an application layer control protocol used for signaling in VoIP. It is the most widely used and supported protocol in VoIP today. Due to it being an open protocol. It is supported on a wide array of commercially available devices like the Linksys PAP2, Cisco Phones, and many, if not all, IP PBXs. The protocol is used to create two party, multiparty,...
Sunday, July 6, 2014
11:01 PM
Rupesh Kafle
Hack
No comments

Computer hacking is the practice of altering computer
hardware and software to carry out a goal outside of the creator’s original
intention. People who slot in computer hacking actions and activities are
offend entitled as hackers.
The
term hacking can be termed as the art of breaching...
8:22 PM
Rupesh Kafle
Hack
No comments
If you need a flat head screwdriver to remove a screw, would you use a cross head?Of course you wouldn’t – it wouldn’t work for one reason. Similarly, if you needed to dig a hole would you use a spoon? While you’d get the job done the time wasted could be better invested elsewhere. It’s only natural to use the tool that’s been perfectly designed for the job yet, for some reason, when it comes to securing the corporate infrastructure, many are frightened...
Subscribe to:
Posts (Atom)