Skip to main content

Why there is no Place like 127.0.0.1? | Explained


          Why Hackers say that there is no place like 127.0.0.1?

1.What is 127.0.0.1?
It is IPv4 address(127.0.0.1) called localhost or loop back address.It does not allow you to communicate with other computers like your real IP address.It is also known as IIS(Internet Information service).The peoples say that their is no place like home in world same as Hackers  say that there is no place like 127.0.0.1.It means your own computer where you can test all your hacking attacks safely and testing something on localhost is totally legal.It is legal because you are not harming others.

2.How to Activate it?
The following are the steps:
  1. Go to Control Panel
  2. Click on ``Programs and Features``
  3. Then on left side you will see option ``Turn Windows Features on or off `` Click on it
  4. Scroll down and You will see option ``Internet Information services `` and then enable it.
  5. Now open chrome and search 127.0.0.1.
  6. Your localhost is enabled now and you can use it.
3.My Opinion:
My opinion is that it is the best place to learn Ethical Hacking via testing attacks such as SQL injection attack,Phishing attack, Brute force attack e.t.c

What is Darkweb and Deep web

Comments

Popular posts from this blog

View localhost from anywhere

How to create a Tunnel between Localhost and Internet || View localhost from anywhere || Explained To view localhost from anywhere you will need to download ngrok from the following link:                           Download ngrok After downloading extract the archive file and then run ngrok. For Connecting localhost to internet type the following command:    ngrok http localhost or ngrok http 127.0.0.1 Then it will Create a tunnel between localhost and internet and gives you a two link one with http and another with https. Then through this link you can view localhost from anywhere.

Hacking an Facebook ID

Hacking an Facebook ID  There are two methods that are used for hacking Facebook account:        Phishing attack        Token access 1: Phishing attack In phishing attack the attacker downloads the Facebook Login page and then create a database and makes little bit changes in Facebook login page so that victim should login.   The Facebook Phishing page may look like this: Then attacker uploads it to online server or offline server such as Xampp and then creates a tunnel between localhost and Internet to make it available everywhere. The tunnel can be created using ngrok.                Working: The attacker sends it to his victim and when victims login to fake page it redirects it to real Facebook page and the information which user has entered into fake page will be stored in txt file and now hackers can access his/her...

Corona Locker a newly found malware

Corona Locker || Newly found Malware || Explained It is a screen locker, which is distributed through a fake WLAN program called wifihacker.exe tries to lock users out of windows by making annoying sounds and displaying a warning message. The victim is asked to contact attackers through an e-mail address displayed on the screen to unlock the screen. Once installed, the malware creates a variety of Registry settings that prevent the Task Manager and Run Commands from working, the desktop icons are hidden, Start Menu is disabled, and more.