Showing posts with label How To's. Show all posts
Showing posts with label How To's. Show all posts

As a new guy in the hacking world, I bet you'd want to know how to create a virtual hacking lab. If you don't know what this is or you just don't care enough to create one, I suggest you read this post thoroughly because it is highly essential.

How to Create a Virtual Hacking Lab

The hacking lab creates a safe environment to practice your hacks. This way you won't have to worry about the risk of failure when trying a hack in the real world because any slip off can be devastating.

Hacking isn't like most professions. In most, you fail and dust yourself off. But in this, you fail and probably spend some time behind bars. This makes practising very important, and this is where the virtual hacking lab comes in.

Many newbies find it pretty difficult to set up a dedicated lab to practice hacks. This article does justice to this problem.

I'll be breaking the tutorial down in 6 steps to make it easier to comprehend;

  1. Download VMware Workstation or Player
  2. Download Kali VMware Images
  3. Unzip Images
  4. Open VMware Image
  5. Download & Install Targets
  6. Download Old Applications

Let's go!

Step 1: Download VMware Workstation or Player

You should practice hacking within a virtual environment. You set up a hacking system like Kali Linux, and some victims to exploit. Essentially, you'll likely want multiple OS and software to enable you try out a variety of hacks.

How to Create a Virtual Hacking Lab

Virtual machines and a virtual network offer the safest way to set up a hacking lab. 

There are numerous virtualization systems available, including Oracle's VirtualBox, KVM, Microsoft's Virtual PC and Hyper-V, Citrix, and VMware's Workstation, VMware Player and ESXi.

In a case of a lab environment, I recommend VMware's Workstation or Player. The workstation is a purchasable product that costs as high as $200 after the free 30-day trial, while the Player is free-to-use.

The difference between these two is that the Workstation can both create and play, while the Player is used to just play VMs.

Download VMware's Workstation or Player here.

Step 2; Download Kali VMware Images

After you must have installed the virtualization system, your next step is to download the VMware images of Linux(provided by offensive language). These images help you to run from Workstation or player instead of creating a virtual machine. 

These images have already been created by Offensive Security. This basically means that you can then use it in either Workstation or Player once you download the VM of Kali.

Step 3; Unzip Images

You need to unzip the downloaded files using one of the several free available zip utilities like WinZip, WinArchiver, etc. 

Download and install the one that suits your fancy and unzip the files. The screenshot below shows the unzipped Kali files using the free trial of WinZip.

Step 4; Open VMware Image

When you must have unzipped all the files, your next step is to open up the virtual machine. Be sure to know the location you unzipped the VM image.

Next is to open the Player or the VMware Workstation. Go to file and open like in the below image.

How to Create a Virtual Hacking Lab

This opens a window like in the below image.

This shows the VMware VM file that you're gonna load into VMware. Note that I'm using the "amd64" which is simply the 64-bit version. The 32-bit version will work though, but a lil bit slower.

Next, after you do so, VMware starts your VM and displays the below image.

Now, hit the little green button in your screen that says "Power on this virtual machine." It will now display a Kali screen.

How to Create a Virtual Hacking Lab

Use "root" as User and "toor" as Password to get started hacking!

Step 5; Download & Install Targets

Now, download and install your target system. You could use your own host Windows system since this is merely a practice, you might wanna use an older and easier to hack system. 

I recommend installing a Windows Vista, XP, Server 2003, or an older version of Linux. You can use these systems to practice hacking since they have known security vulnerabilities. Later, when you think you're climbing up the ladder, you can now install and use Windows 7 and 8 for your hacks.

If you don't have a copy of these older OS, you can easily purchase them on the internet. At last check, it was sold for as low as $9.66 on Amazon, but that can change anytime.

Alternatively, you can get these OS for free on torrent sites, but BEWARE!'ll likely be downloading more than you bargained for.

These free downloads often come with rootkits that embed in your system when you open the file.

You can get older versions of Linux from the distribution.


Step 6; Download Old Applications

Now that you have your operating system, you're gonna be needing apps and software to run on these older versions. These older versions have plenty known security flaws that you can check your hacking skills.

You can use the website "Old Apps" to download many of these.

How to Create a Virtual Hacking Lab

Hit me up in the comment section if you got stuff to say or add on how to create a virtual hacking lab.

Subscribe to my mailing list

* indicates required

Hi there✋. 

Have you ever wondered how easy or possible it is to hack into your pal's computer? Or maybe you know it's possible but do not know the steps to follow. 

I say to you; bring out your note if you ain't with your computer. Keep reading lad.

I've always been asked by viewers on how to hack a computer. I'll be showing you one of my tricks. This trick is done in 4 steps;

  1. Getting started
  2. Trial and error
  3. Gathering necessary information
  4. Getting in

Before you keep reading though, i'll suggest you take a look at our disclaimer page.
Let's get to work!

How to hack into A Computer connected to the same network(Lan)

This trick is perfect for those working in an office where everyone is connected to the same network. It can also be carried out in a College.

What you need

  • Windows OS
  • Cain and Abel

The obvious first thing to do is find a Computer to hack into. You can begin if you're connected to the WAN or plugged into the LAN.

Open up your Cain and Abel. Get it here if you don't have it installed,

This hacking program has a built-in sniffer feature that looks for all available IP addresses in a local subnet. 

Now pay attention!

Step 1

Getting started!

Click on the sniffer tab after the software opens. Click the Start/Stop sniffer, and click the blue cross.

5 Easy steps to Hack Into a Computer

Another window will pop up after this, select “All host in my subnet” and click ok.

It'll now begin to scan

5 Easy steps to Hack Into a Computer

The Computer names, IP's and mac addresses will display. Write them down and try to remember the IP address you wish to hack into. It's okay if you can't tell whether the IP address belongs to a Computer, modem, router etc.

The next step will tell you what to do.

Step 2

Trial and error

This stage is here in case you don't know if what you have is a Computer, printer, router or whatever else is connected to the WAN.

If you did get the IP address of the target though, I still recommend you read through this

Click on the start menu, type in cmd, and click ok.

This will bring up the command prompt which is where you'll be doing most of the hacking.

Next, you'll be reading certain commands in quotes that you'll need to be input into the command prompt. Do not by any way put these commands in quotes. It won't work. I put quotes only to avoid confusing you.

Type in “ping (IP address of the target).” For example in this tutorial, “ping”

This lets you know if the target is online or not

It will look something like this if the target is online.

5 Easy steps to Hack Into a Computer

It will look like this if the target is offline:

5 Easy steps to Hack Into a Computer

This hack can only be done if the target is online. So switch to a different target if it's not or wait for it to come online.

You'd wanna know how to crack a wifi password and a website

Step 3

Gathering necessary information.

Input this command “nbtstat –a (IP address of target).” A suitable example would be
“nbtstat –a”

This will display if file sharing is enabled. If it is, it will give you the; currently logged on user,  computer name and workgroup.

5 Easy steps to Hack Into a Computer

Step 4

Getting In

It’s time!.

By now you should know that: your target is online, has file sharing, and the computer name.

Locate the shared drives or printers. Type “net view (IP Address of Target)”
Example for this tutorial would be: “net view”

You just found the share name. In this case, "C" is under the share name signalling that C is the only shared thing on the PC or computer.

To the right, "Disk" is displayed under Type. Meaning that it is the actual C DISK of the computer. The C DISK is most times an entire person’s hard drive.

If you observe carefully, for my hack I already used “K,” so now I use “G” instead. You may do the same for multiple hacks.

It will say “The command completed successfully.” if it worked.

You may have to go retrace your steps if it didn't.

Now open “my computer” under the start menu. There your recently created network
drive will be there.

Note that you won't be able to access this drive if you disconnect from the WAN or LAN. Hence the name Network Drive.

Don't worry though, you won't have to repeat the same procedure all over again since the drive will not be deleted after you disconnect. You can still access it whenever you reconnect.

Congratulations! You’re DONE HACKING!

Commands used;

  • PING
  • NBTSTAT -a (IP Address of Target)
  • NET VIEW (IP Address of Target)
  • NET USE K: (IP Address of Target)(SHARENAME)

Program used;

Cain and Abel.

Pretty easy right? this sums up the steps to hack into a Computer.

Subscribe to my mailing list

* indicates required

how to hack a wifi password using kali linux

Frequently asked question online, how to hack a wifi password! Most people will probably answer by referring you to funny phone apps lol. I’m not gonna do that, instead, I’ll share with you a better and more efficient way of pulling off this hack; How to hack a wifi password and get connected using Kali Linux.

Plus this method is a bonus since it exposes you a little to the hack hood.

I didn’t want to give you, my audience what you can easily find elsewhere on the net, so I went to work and manipulated some commands using Kali.

I’m sure you’re quite familiar with and already installed Kali Linux, if not, you’re in luck because I’ve pretty much covered it here.

The purpose of this particular attack is to capture as many traffic as we can get using airodump-ng. Each data packet has an associated 3-byte Initialization Vector called IV’s.

The goal after the hack is initiated is to obtain as many encrypted IV’s as possible, then use aircrack-ng on the captured file to reveal the password.

Don’t know much about hacking? Worry not bro/sis, because we’re gonna do it together.

Get your computer.


The very first thing we’ll need to do is to verify the router configuration. Normally we wouldn’t have this option in a real penetration test, but we got some flexibility since we’re operating in a home lab.

For the purpose of this tutorial, the passphrase Cisco123 is used in the lab access point to secure the wireless network with WPA2-PSK.

Use any wireless router to set up your wireless lab.

Setup an old router, log in and set it up as WEP, so wireless security can use it as a test router.

Connect your phone or any other device to its wireless. This is so to capture the encrypted data between the two.


The iwconfig command will show all wireless cards in any system. We'll use a RealTek wireless card(this is a Linux plug and play wireless card).

The operating system will recognize a wireless interface called Wlan0

how to hack a wifi password using kali linux


The next step we’ll make is to enable the wireless interface. This is done using the ifconfig wlan0 up command.

how to hack a wifi password using kali linux


Now, you need to know the specific wireless network your wireless card sees. So carry out the iwlist wlan0 scanning command.

how to hack a wifi password using kali linux

This command instructs the wireless card to reveal all wireless networks in your area.
You’ll clearly see in the below image that it found my target network; wireless lab.

It found also the MAC address of my access point; 0E:18:1A:36:D6:22. It’s important you note yours’s because you’d want to limit your attack to a specific access point to ensure you’re not breaking into anyone’s password(Illegal bruh).

Also, note the fact that the AP is transmitting on channel 36. This is important because it allows you to know what wireless channel you’ll want your wireless card to capture traffic from.

how to hack a wifi password using kali linux


Change the wireless card to monitoring mode. This allows the wireless card to check all the packets available.

You can do this by creating a monitor interface using airmon-ng. Issue this command to verify that airmon-ng sees your wireless card.

Create the monitor interface by writing the command; airmon-ng start wlan0

how to hack a wifi password using kali linux

Run the ifconfig command to verify that the monitor interface has been created.

how to hack a wifi password using kali linux

Now verify that the mono interface has been created.

how to hack a wifi password using kali linux


Use the airodump-ng to capture the WPA2 handshake. Airodump-ng will show a valid handshake when it captures it. This will be shown in the upper right-hand corner of your computer screen.

You’ll have to manually connect to the wireless to force a handshake. I’ll soon write an article describing how to force a reauthorization, making a device automatically disconnect and reconnect with no need for a manual intervention.

Use the command in this format; airodump-ng mon0 --bssid 20:aa:4b:1f:b0:10 =used to capture packets from your AP

--channel 6 =limits channel hopping

--write BreakingWPA2 =the name of the file you wish to save to

Airodump-ng mon0 --bssid 0E:18:1A:36:D6:22 --channel 36 --write breakingWPA2


To successfully capture the handshake, you’re gonna monitor a legitimate client to authenticate to the network.

To fix the hassle of having to wait for a client to legitimately authenticate. I’m gonna show you to force a client to re-authenticate.

Look out for the WPA Handshake Command, this tells you that you just captured a valid handshake.


Now, we’re gonna use aircrack-ng together with the dictionary file to crack the password.
Our chances of breaking into the password are largely dependent on the password file.

The command is; aircrack-ng “title of the cap file you created and stored” –W “title of your dictionary file”

The BreakingWPA2-01.cap file was created when we ran the airodump-ng command. The valid WPA2 captured airodump handshake is saved in the BreakingWPA2-01.cap file

Backtrack 5 comes with a basic dictionary, darkc0de.lst. This is a popular worldlist that ships with BackTrack5. We used our password Cisco123 in this file to make the test run smoother. Many hackers use large dictionaries which increases their chances of cracking passwords. Lots of dictionaries contain passwords from real users and websites that was cracked and posted on the web.

You can download the darkc0de.Ist here since Kali Linux does not come with it preinstalled.

If the password is found in the dictionary file, rest assured that aircrack-ng will crack it and you'll be able to connect.

how to hack a wifi password using kali linux


Whew, just got that out of the way.

Now, let's hope my hack also works for you. If it doesn't, hit me up. We'll figure it out together.

Now check out how you can hack into a computer

how to hack a wifi password using kali linux
Learning how to hack a wifi password using Kali linux is only complicated when you try to use someone else's hacking technique.

My job is to turn you into a real hacker, that way you can also manipulate your own hacks.

Don't forget to join me on Facebook.

Subscribe to my mailing list

* indicates required

how to install kali linux in 2018

Hi, do you have trouble installing Kali Linux on your desktop/laptop? are you here just to see what all the hype on the Operating system is about?  What if I tell you Kali Linux isn’t just an OS? -)

Yeah I know you might be thinking, “here we go again”, “what does he have to share that I can’t get elsewhere online”.

For that I tell you; get a chair, grab a cup of coffee if you can, and watch me blow your mind.

What you need to know about Kali Linux

Kali Linux is a Debian Linux distribution, intended to carry out digital forensics and penetration testing. It is funded by Offensive Security Ltd. Mati Aharoni, Raphaël Hertzog and Devon Kearns are the core developers, and blah blah blah!

Do you understand 70% of what I just said up there? I wouldn’t. My job is to speak English when explaining stuff like this, otherwise, you’ll most likely not grab anything new from this article.

Let’s try again, now, in English.

Debian is comprised entirely of free software and a Unix-like OS. Which basically means that it operates in a manner similar to a Unix system, while not automatically conforming to versions of the Single UNIX Specification.

Digital forensics is a branch of forensic science(use of technology to establish facts and evidence) surrounding the recovery and investigation of material found in digital devices, often in relation to cybercrime.

A penetration test(also known as a pen test), is an authorized virtual attack on a computer system, performed to review and evaluate the security of the system. The test is carried out to identify vulnerabilities, as well as strengths.

Now let’s go back to what Kali Linux is, shall we?

Kali in a layman’s term is a free-to-download OS(as free as getting a beer at a party), that is used to check the strengths and weaknesses of a computer. It can also be used to recover data in any digital device.

installing kali linux made easy

Kali Linux includes security tools, such as

  • Aircrack-ng
  • Burp suite(Burp or Burp Suite is a graphical tool for testing Web application security)
  • Ettercap(It can be used for computer network protocol analysis and security auditing)
  • John the Ripper(a free password cracking software tool
  • Kismet(this is a network detector)
  • Maltego(a proprietary software used for open-source intelligence and forensics)
  • Metasploit framework(This is a computer security project that provides information on security vulnerabilities and helps in penetration testing and IDS signature development)
  • Nmap(a security scanner that is basically used to discover hosts and services on any computer network)
  • OWASP ZAP(an open-source web application security scanner)
  • Social engineering tools.
  • Wireshark(used for network troubleshooting, analysis, software and communications protocol development)
  • Hydra
  • Reverse Engineering tools
  • Forensics tools like Binwalk, Foremost, Volatility e.t.c

Should I install and use Kali Linux?

Have I aroused your interest? Wanna jump right in the Kali Linux hood? Not so fast buddy.
Kali is great but complicated. Even for experienced users, the operating system can pose some challenges.

While Kali Linux is architected to be greatly customizable, don’t presume you’ll be able to add random unrelated packages and repositories that are “out of band” of the normal Kali software sources and expect it work just fine.

If you are alien with Linux, if you lack at least, an essential level of competence in managing a system, if you are searching for a Linux-distribution only for learning purposes, if you want it just to get to know your way around Linux, or if you want a tool that you can use as a general purpose desktop installation.

Then, my friend, Kali Linux is probably not what you are looking for just yet. You may want to start with UbuntuMint, or Debian instead.

Now, let's dive into the main topic fam; how to install Kali Linux in 15 simple steps.

Setup to install Kali Linux

  • ·         Virtual Machine (VMWare, VirtualBox)
  • ·         μTorrent/BitTorrent

Step 1

Install VirtualBox version 4.3.12. The latest updates tend to have little issues with antivirus, so Ignore for now.

Step 2

Download Kali Linux 32 bit ISO’, with the torrent. The direct version will take too long to download. REMEMBER, torrent.

Step 3

Now, open your VirtualBox and click on New(top left). Name it Kali Linux 1.0.7(or whatever version you downloaded) and it’ll automatically choose the type(Linux) and the version. All you need do now is change it to Debian(32 bits).

Step 4

Tap the Next button and choose the RAM you want to use in this OS. Let’s say 1GB of RAM, though think 500MB should be enough.

Step 5

Tap Next again. Now, choose 'Create a virtual hard drive now' option and click 'Create' choose VMDK option, and hit 'Next' once again, choose 'Dynamically allocated', and 'Next' again.

Step 6

Next thing to do is to choose the size of the compartition you'll be using to make the Virtual Machine. I’ll say choose 30GB for that, but 20GB will do just fine. After that, find your way to the top area, where you’ll choose the location of the compartition. Hit 'Create'.

Step 7

By now you’ve successfully created the partition. Next, is to click on that partition, and hit Settings at the top left. Click on System>Processor and check the box Enable PAEX/NX. Now, go to storage>Controller: IDE you’ll find a little CD that’ll indicate Empty. Click on the little CD with an Add symbol and select choose Disk. Now, browse the ISO File you just downloaded(the Kali Linux ISO File), once you've done that click Ok.

Step 8

Go to Network, you’ll find where it says 'Attached to:', there, you choose 'Host-only Adapter'.

Step 9

Exit the Settings Menu, and start the Virtual Machine by clicking the 'Start' button at the top left. Right now, a window must have appeared where you’ll have to make a choice. Go down to the option 'Install' and hit Enter to continue.

Step 10

At this stage, you’ll be prompted to state your country, language and the keyboard. Select the right information! Now Kali Linux will load.

When that is complete, you’ll be asked for the hostname and domain name. But that doesn’t really matter, go ahead and choose kalilinux for the hostname and kalilinux01 for the domain name.

Now, you’ll be asked for the Root Password. Type in 'toor', which is root written backwards. Re-type it when it asks you again. Use root as username if your's ask for it.

Select your Time Zone, then, it’ll load for a bit. Select the 'Partitioning method' as the 'Guide - use entire disk'.

Keep hitting Enter to choose the defaults. After that, hit 'Finish partitioning and write changes to disk'.

You’ll be asked 'Write changes to disks?', select 'Yes'. Now, the OS will start installing. Take a break, because it’ll take like 20-30 minutes.

Step 11

After some time, it’ll ask you, 'Use a network mirror?', click yes. Then you’ll be asked for HTTP Proxy Information, leave it empty. It’ll go ahead and download some files from the network mirror.

Step 12

After that is done, it’ll ask you, 'Install the GRUB boot loader to the master boot record?', select 'Yes', then finally you’ll see 'Installation Complete'. Hit 'Continue'.

Step 13

Kali Linux will restart, after that, a window will appear with the option 'Other...', click on it and you’ll be asked for username and password. Recall that the username is 'root' and the password is 'toor'.

Step 14

Kali Linux is installed. But don’t rejoice just yet -) now, my friend, you will update and upgrade.
For that, go to: Applications (top left) >Acessories>Terminal, and a window like cmd will open, write on it: apt-get update && apt-get -y upgrade && apt-get -y install dkms | I hope you made no mistake in typing those? It’s really important you didn’t.

Now, hit Enter. After the installation is complete, write power off, and the Virtual Machine will turn off.

Step 15

Your Kali Linux OS is installed, and good to go. Recall, you’ll be using root as username and toor as password.

Enjoy your Kali Linux

Subscribe to my mailing list

* indicates required
7 easy steps to hack a website in 2018 |

Hi, ever wondered how to hack a website? Or if it's doable. Maybe you wish to check how vulnerable your site is but don’t know how to go about it. Today is your lucky day because I’m about to break the steps into simplified pieces for you.

Why hack a website? Isn’t it illegal?

Before we get into the ‘HOW’, lets first look at why you or anyone would need to hack into a website.

There are different known classifications of hackers which include; white-hat, black-hat etc. White-hat hacking which is widely encouraged is an Internet slang according to Wikipedia refers to an ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies to ensure the security of an organization's information systems. That being said, we can say the reason behind hacking a site would be to retrieve lost information about your site, checking how vulnerable your website is. In some cases, to hack into and bringing down a site dealing with stuff like child pornography.

Ok! lastly! you need to know that the information on this page or any page associated with this website is strictly for educational purposes. If your objective is to use them for illegal activities, then read no further. Spyhood takes no responsibility for any activity done with the knowledge it shares. Read our Disclaimer for more info.

NOTE: The below steps are like the basic of the basics. I use them because advanced hacking methods always tend to be too complicated for most people.

Let's get to business. Get a pen if you ain't with your Computer.

You'd be needing some hacking tools to grow as a hacker

 3 Methods to hack a website

I’ll be showing you with images different ways to hack a website and get successful results. Two of these methods is further broken into 7 easy steps. They include;
  • 1      Hacking via SQL injection(online)
  • 2      Hacking via SQL injection(with a software)
  • 3      Hacking with basic HTML coding

How to hack a website using online SQL injection in 7 steps

SQL injection is a code injection technique, used to attack data-driven applications, in which nefarious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker).


Use your system's firefox to open and type in inurl:.php?idas it is in the above picture. You’ll see a list of websites with dork php. Click on any of them.


I choose this site. The address should start with .php

Put apostrophe i.e ' at the end of the url to check if the website is vulnerable. If it says “you have an error in your SQL syntax” like it says in the above picture, then it means the website is most likely to be vulnerable. So proceed.


Remove the apostrophe and add order by 2--  .This is to see how many columns the website has and probably the most important stuff you have to do here. So read carefully. 

Keep testing with 3--, 4--, 5-- until you get a message like “unknown column”. In mine, 11 is the farthest the site has as seen in the above picture, meaning there are 10 columns.


how to
Delete the ‘12 order by‘ and replace with null union all select 1,2,3,4,5,6,7,8,9,10--  .Mine is 10 because the site has only 10 columns. Your’s might be below or above 10. After the page loads, you’ll see a few numbers. Pick the top one. Mine is 7.


Replace 7 in the url with @@Version  .It shows 5.092 community which is great meaning the database version is over 5(basically meaning it can be hacked).



Now replace @@version with group_concat(table_name) and after the last number, add from information_schema.tables where table_schema=database()--


how to

Replace both tables in the url with column


You’ll get all the information the website has. Get those interesting to you e.g full name, pass, username etc. I’ll go with username and pass.

steps in hacking a website via sql injection

 Replace column_name with username,0x3a,pass and replace all the information tags with users--   

tutorial sql injection

You’ll get all the usernames and passwords associated with the site. In case it says ‘unknown username and blank list’. It means you have the wrong table, and you’ll have to go back and look for a different table. Or you can select another stuff to hack, like the product.

Here, the usernames are shown first because it comes before the pass in the url. i.e username:pass,username:pass,username:pass just like it is in the above image.


online hacking

To log in, google admin page finder and click on the first link. Then follow the instructions and get your own admin page finder login. I’ve already done this so I’ll login with mine.
My admin page finder login is  .Then login with any of the logins you’ve secured. I’ll go with hacked:Karica1982  .Click on profile after it logs in and you’ll find all his stuff. 

steps in hacking a website via sql injection

steps in hacking a website via sql injection

This particular method shows you how to hack a website, and how easy and scary it actually is.

You'd wanna know how to hack into a Computer

How to hack a website easily using an SQL software

Alternatively, if hacking online doesn’t suit your fancy. You can do so using some software, and fear not, you don’t need to understand a single line of SQL to carry out this attack. Thankfully another freely-available and easy-to-use software, originally developed in Iran, can be downloaded from the web saving you all the trouble of having to deal with any complex code.

I didn't analyze the steps in this method, but I hope the simplified description helps.

using an sql injection software

The program is called Havij. There are free and paid versions of Havij available with the paid-for version having more powerful functions. Again the web is your friend and cracked versions of the full Havij application are available online if you don’t wish to purchase it.

The Havij interface is like any other Windows program and all an amateur hacker needs to do is simply copy and paste the url of their target website and press a button.

Havij allows you to perform different types of hacks including one called a ‘Get’, which surprisingly gets all the information stored on the database on that particular site which can be usernames, passwords, email addresses, home addresses, phone numbers and bank details. And that's it!.

How to hack a website using basic HTML coding in 7 steps

If you have basic HTML and JavaScript knowledge, you might just be able to access password protected websites. This last method will show you easy steps on how to hack less secured websites of your choice simply through HTML.

Note: This method only works for websites with extremely low security details.

Credit: images gotten from Wikihow


Open the website you want to hack. Input wrong username and wrong password combination in its sign-in form. An error will popup saying wrong username and password. Now be ready because your experiment starts from here.


a website
Right-click anywhere on that error page> and go to view source.


Open and view the source code. There you’ll see the HTML coding with JavaScript.

·         There you find something like this....<_form action="...Login....">

·   Before this login information copy the URL of the site in which you are. (e.g. :"< _form..........action=>")


Delete the JavaScript from the above image that validates your information on the server. Do this very carefully. Hacking this site successfully depends on how efficiently you delete the javascript code validating your account information.


Go to file>save as>and save it anywhere on your hard disk with ext.html (e.g.: c:\chan.html)


Reopen your target web i.e 'chan.html' file that you saved in your hard disk earlier. You’ll see some changes in current page as compared to original One. Don't worry, that shows we’re on the right path.


Provide any username and password. And bravo! you just successfully cracked a website and entered into the account.

Some of the above steps on how to hack a website might not work for you, maybe due to the security of the target website or mistakes on your part. But surely, one will.

Let me know via the comment section if you encountered any problem while performing any of the hacks, or if you have any question and contributions on how to hack a website. I hope to tutor you again.

If you're a newbie hacker and finds it difficult to grab stuff. Worry not because i've done justice to it.

Subscribe to my mailing list

* indicates required