Irfan ShakeelinCyber Security ResourcesZIP, RAR & PDF Password Cracking using ZydraHaving confidential documents on a system, like a pdf of financial data or a zip including personal images and videos, ensure they’re…3 min read·Jul 25, 2021----
Irfan ShakeelinCyber Security ResourcesHacking and Cracking NTLM Hash to Get Windows Admin PasswordOriginally published on ehacking blog:4 min read·May 9, 2021----
Irfan ShakeelinCyber Security ResourcesCybersecurity VS Ethical Hacking vs PentestUnderstand the core cybersecurity concepts in this video. Learn how cybersecurity is different than information security, and what is…1 min read·Mar 24, 2021----
Irfan ShakeelinCyber Security ResourcesDo Real hackers use Metasploit?Real here means the malicious or blackhat hacker.1 min read·Dec 20, 2020----
Irfan ShakeelinCyber Security ResourcesSurface web, Deep web, Darknet explained …Learn how to stay anonymous online; what is darknet and what is the difference between the VPN, TOR, WHONIX, and Tails here.1 min read·Sep 22, 2020----
Irfan ShakeelinCyber Security ResourcesHacking Windows 10 Password using FakeLogonScreenThis article was posted on ehacking.net5 min read·Jul 20, 2020--1--1
Irfan ShakeelHacking Android phone remotely using MetasploitThe article was originally published on ehacking blog.5 min read·Apr 14, 2020--26--26
Irfan ShakeelDirsearch to find Hidden Web DirectoriesWhen a security analyst performing website penetration testing the initial step should be finding hidden directories of a vulnerable…6 min read·Mar 28, 2020--3--3
Irfan ShakeelScanning to Root: the Sunset DuskSunset: dusk is a vulnerable by design Debian based machine created by whitecrOwz. It is available on https://www.vulnhub.com4 min read·Mar 22, 2020----
Irfan ShakeelHow to use Autopsy for Digital Forensics AnalAutopsy is one of the digital forensics tools use to investigate what happened on a computer. It offers a GUI access to variety of…5 min read·Mar 18, 2020--1--1