• About Amol Wagh

    Author is a Tech blogger & loves to share his work on web by writing guidelines for Ethical Hacking students & Security professionals. Performing various types of hacking from pen test to smartphone hacking – He enjoys hacking just for personal research purpose. Working with more of 'grey as well as black hat' hackers for learning advanced hacking as well as defending techniques & share them with learners. His prime area of research is Cyber Criminals & currently working on a Video Product Development to teach hacking & Pen Testing for absolute beginners.

    http://www.hackersenigma.com

    Free Domain Names To Win In A Contest

    by  • August 11, 2009 • General • 4 Comments

    Hii,, I have a great blog contest on my other blog SEO Blogging Tips This is a truly great day for us to celebrate many things together. SEO Blogging Tips, is the blog about Search engine optimization & Blogging tips. We have completed our 50 posts yesterday. Get higher on Google with all new PR2, […]

    Read more →

    Gmail Account Is Secure From Hacking

    by  • August 9, 2009 • Google Hacking, Student Series • 6 Comments

    We use mail clients for sharing emails through our friends & colleagues & different purposes. But what are essential aspects for a perfect mail service are mentioned as follows. Simple User Interface Customization in GUI Easy Filtration Spam Filtration Secured mail transactions Overall Security From 6 aspects mentioned above we find first 5 in any […]

    Read more →

    Malware Can Spread Through Software Updates

    by  • August 2, 2009 • Ethical hacking, Network Security, Packet Sniffing • 1 Comment

    We have seen exploits in plug ins & apps are helping hackers to find vulnerabilities & intrude inside a secured system or a network, I came across the news from cnet.com which says that two researchers from Israeli security firm Radware have found out a way which gives access to a computer by updating any software mostly affects the Skype & other applications.

    Read more →

    Black Box Testing in Penetration Testing

    by  • July 3, 2009 • Student Series • 1 Comment

    This article is the part of series “Ethical Hacking Student Guide Series.” Don’t forget to subscribe with Hackers Enigma to stay updated. Black box is a second type of penetration testing which is something “real hackers thing” In black box testing a professional ethical hacker is hired to perform test on a network. He just […]

    Read more →

    White Box Testing in Ethical Hacking

    by  • July 2, 2009 • Student Series • 3 Comments

    This article is posted under the ‘Ethical Hacking Student Guide Series’ Don’t forget to subscribe to be updated. White box testing is the form of penetration testing as I explained before; it is performed with the full knowledge of subjected network or system. Ethical hackers are hired for this purpose which could be freelancers or […]

    Read more →

    Penetration Testing In Ethical Hacking

    by  • June 30, 2009 • Student Series • 3 Comments

    This article is posted under the “Ethical Hacking Student Guide Series”. So don’t forget to subscribe our blog to stay updated. Penetration testing in simple words can be defined as the test on the live networks or servers directly by attacking by the trained ethical hacking professional person or network security administrator. If you still […]

    Read more →

    Vulnerabilities – Know More

    by  • June 27, 2009 • Student Series, Vulnerabilities • 0 Comments

    Vulnerabilities are the tricks-of-the-trade for hackers, giving an intruder the ability to heighten one’s access by exploiting a flawed piece of logic inside the code of a computer. Like the hackers that seek them out, vulnerabilities are usually quite mysterious and hard to prove they even exist. They are confusing or undocumented source code, usually […]

    Read more →

    Unobtrusive Mapping of Network

    by  • June 20, 2009 • DDoS, Denial of Service, Ethical hacking, Network Security • 0 Comments

    Networks are generally mapped with almost no knowledge, from far much away from the actual network we gather information and interpret the network topology is known as Black Box. In this case, cracker initiate with IP address of server or URL of the website of victim organization. Ethical hacker must aware of Zone Transfer detailing, […]

    Read more →