Author: username

Introduction to Tabnapping | blog.hackshade.com

Introduction to Tabnapping | blog.hackshade.com

Ethical Hacking
When Phishing became outdated, there evolved many other techniques for hacking into Internet Credentials. Here is the one called as Tabnapping. Tabnapping is the term coined by Mr.Aza Raskin, in 2010 when he was a security researcher & design expert in Mozilla Firefox. Well, he invented a small Javascript code which can redirect the visitors page to another page automatically by detecting their browsing behaviours. Thus, this script does not affect the existing page in any manner regarding to the design or look, It just redirects one page to another after tracking the user behaviour on that respective tab in their web browser. Hence, The code tracks if the user is still using the tab by detecting current browser tabs page scrolling & click activity. So, when the any suspic
The power of NOTEPAD | blog.hackshade.com

The power of NOTEPAD | blog.hackshade.com

PC Tricks
In this digital era, the common Notepad is used to keep record of instant data & information on our computers. We mainly write contacts, memos & other daily life informations which can be forgotten as this software takes very little memory space & is easy to operate with. Still in back time when computers were just evolved, this simple text editor program was used for batch programming & executing the basic commands by just one click. As we know the new system of notepad is also called as notepad++ which is good enough to withstand coding features & better UI/UX, today still we can use Notepad for our basic convenience. Hackshade brings you some interesting stuffs that you can do with small codes in Notepad. Creativity is making something good out of simple things,...
Phishing Attack Unveiled | blog.hackshade.com

Phishing Attack Unveiled | blog.hackshade.com

Ethical Hacking
Why to use a sword to cut a cake when it can be done smoothly with a knife... No doubt, Social Engineering is the best way possible to hack any victim. While performing Social Engineering, the hacker actually manipulates the victims situation to exploit into his trust, the best way possible to do such attack is being a friend or distract his mind suddenly in some incident for a while. Which is enough to get into his system to setup a back-door. Well, Phishing is also a simple type of social engineering attack often used to steal user data, including login credentials and credit card numbers. In this attack, the attacker creates a clone of any desire website & makes it online on his own server. In this way the victim confuses with the genuine & fake website resulting in being ...