List/Grid Hacking Subscribe RSS feed of category Hacking

Unlock Bootloader – OnePlus 5

Unlock Bootloader – OnePlus 5

A Bootloader is a little bit of code that tells your phone’s OS how to boot up. OEMs do this work to ensure that your phone is fully optimized, certified… Read more »

How to hack an ATM machine

How to hack an ATM machine

An ATM machine is where the moolah is. If you ever thought of getting your hands on the money in ATM, this how you need to chanelise your thoughts. First… Read more »

The In and Out of Jailbreaking

The In and Out of Jailbreaking

First off, as the name implies, your iPhone or iPad gets free from clutches of Apple iOS. By design and will of Apple, the iPad or iPhone can have only… Read more »

What Google Can’t Find, Shodan Can [Search Connected Devices]

What Google Can’t Find, Shodan Can [Search Connected Devices]

When we don’t find it on Google, we declare it doesn’t exist. But as per Founder Shodan, that statement is not essentially true. He believes that when something is not… Read more »

Read, Extract WhatsApp Messages backup on Android, iPhone, Blackberry

Read, Extract WhatsApp Messages backup on Android, iPhone, Blackberry

WhatsApp is undoubtedly no.1 Messaging service on mobile devices having its presence across Android, iOS, Blackberry, Windows phone. Users around the globe exchange billions of messages over WhatsApp. ¬†However, the… Read more »

Remotely Hack any Cisco VoIP Phone

Remotely Hack any Cisco VoIP Phone

Ever year hackers research and reverse engineer mainstream electronics and commercial products in the market. At 29C3, security researchers from Columbia university demoed what they call to have achieved Hacking… Read more »

Hack Open Hotel Room Door Locks

Hack Open Hotel Room Door Locks

Everytime you checkin into a hotel, you are presented with a smartcard which would become key to your Hotel Room door locks for your duration of stay. Have you ever… Read more »

Hack Human Brain to Extract information

Hack Human Brain to Extract information

How many times have you been victimized by Inception? You might not even know but social hackers can extract a wide set of information from you. However, simple Hardware intended… Read more »

How to Hack Open/Unlock Office Door

How to Hack Open/Unlock Office Door

In movies, geeks would pitch-in and attach a PDA to the door that sweeps the magnetic field patterns against the doors or analyze the lock code in matter of seconds…. Read more »

Hack to Control Everything in Your Car

Hack to Control Everything in Your Car

Your current generation (or older) car runs on a mini computer which centrally controls the operations within the car. This is the micro-computer which is responsible for monitoring and controlling… Read more »

How to Crack WPA2 WPS WiFi password

How to Crack WPA2 WPS WiFi password

Wifi Protected Setup or WPS is a 802.11 certified standard for delivering security over your Wireless network. Wi-Fi Protected Setup enables typical users who possess little understanding of traditional Wi-Fi… Read more »

Kick users, devices from Wifi

Kick users, devices from Wifi

Is your roommate eating all of your Wifi bandwidth downloading those crazy torrents? Is your wife streaming too many movies from Netflix? Are your younger ones spending so much time… Read more »

How Police can Tap, Steal Phone data

How Police can Tap, Steal Phone data

You will be amazed by the fact that Police can now Tap & steal your personal data from your smartphone/ feature-phone alike. This data is extremely valuable, contains not just… Read more »

How to Crack OSX Lion Password

How to Crack OSX Lion Password

Apple has always prioritized beauty and ease of use over maintaining aspects of the system that most users are not aware of: Security. Primary vulnerability had been left open in… Read more »

DIY Drone Plane: Hack Wifi, Phone calls

DIY Drone Plane: Hack Wifi, Phone calls

Every year, at BlackHat, DefCon conference, several new hacks, cracks and vulnerabilities are exposed for the popularly used technology, blowing away the users and geeks alike. Two security researchers, Mike… Read more »

© 2017 Geeknizer. All rights reserved. XHTML / CSS Valid.
Designed by taranfx.