DISCLAIMER
The goal of this blog is to teach you how to penetrate computer network, computer, (web or non-web) servers, (web or non-web) applications, and (web or non-web) users; protect against common attacks; and generally improve your understanding of what (web or non-web) security is. In a perfect world, no one would use the tools and techniques discussed in these blogs in an unethical manner. But since that’s not the case, keep the following in mind as you read along:
- Think before you hack.
- Don’t do malicious things.
- Don’t attack a target unless you have written permission.
- Many of the tools and techniques discussed in this blog are easily detected and traced.
Use of this blog is only for education purpose. I shall not responsible for any errors, omissions, or damages arising out of the use of the information contained in this blog. If you do something illegal, you could be sued or thrown into jail. One basic assumption this blog makes is that you understand right from wrong. I endorse using this blog not to do anything illegal. If you break into someone's network, server or web application without permission, law enforcement agency kicks your door in!
Those who access or use the blog from any locations do so at their own risk and are responsible for compliance with local law.
Some of the post on this blog include links to external websites. I don’t take responsibility for the content of these external sites. I will not responsible for any misuse of the contents present in this blog.
Note: Before you step into the cyber security and ethical hacking world, it is very important that, set up your own a safe environment for learning and practice.
For that, SETTING UP A TEST/VULNERABLE ENVIRONMENT