Posts

Base64 Algorithm

Image
  Introduction              -----> Base64 encoding is used to c onvert binary data into a text-like format that allows it to be transported in environments that can handle only text safely.               -----> Base64 is sometimes also refered to as PEM , which stands for Privacy-enhanced Electronic Mail . There, Base64 was used to create printable text again after binary e-mail data that was generated during the e-mail encryption process.   How it works               Base64 encoding takes the original binary data and operates on it by dividing it into tokens of three bytes . A byte consists of eight bits, so Base64 takes 24bits in total. These 3 bytes are then converted into four printable characters from the ASCII standard.  The first step is to take the three bytes (24...

Selfie Camera Hack

Image
 Selfie Camera Hack   Here in this post your are going learn about the selfie Camera hacks and this can be done by the tool named as CamPhish. And this can in kali linux as well as in termux android terminal now I am going to use kali machine for this phishing attack. Lets get started First of open your terminal in kali or in termux application. Run the commends to install the requirements for this tool. Installing and requirements This tool require PHP for webserver, SSH or serveo link. First run following command on your terminal apt-get -y install php openssh git wget    And these are the commends to download and run the tool now type the below commend and press enter to download the tool. git clone https://github.com/techchipnet/CamPhish   cd CamPhish   bash camphish.sh     And now navigate to the tool's folder using cd commend!  Other Linux commends: https://into-to-hacking.blogspot.com/2020/06/Termux1.0.html   Now we have do...

Encryption And Decryption

Image
Encryption And Decryption   # Encryption is the process of converting normal message (plaintext) into meaningless message (Ciphertext).  # Decryption is the process of converting meaningless message (Ciphertext) into its original form (Plaintext).           Types of encryption CRYPTOGRAPHY E ncryption algorithm  An encryption algorithm along with a key is used in the encryption and decryption of data. There are several types of data encryptions which form the basis of network security. Encryption schemes are based on block or stream ciphers.   Encryption key.          A sequence of values that are used with a cipher algorithm to encrypt a message. The choice of random (or cryptographically pseudorandom) keys, a secure key exchange mechanism, frequent key refreshments, and good secrecy protection of keys are all essential ingredients for the security of the integrity verifica...

Wi-Fi Hacking

Image
Wi-Fi Hacking        Wifi hacking is essentially cracking the security protocols in a wireless network, granting full access for the hacker to view, store, download, or abuse the wireless network. Usually, when someone hacks into a Wifi, they are able to observe all the data that is being sent via the network. List of Best WiFi Hacking Apps for Android 1. Aircrack-ng 2. Kali Linux Nethunter 3. WiFi WPS WPA Tester 4. dSploit 5. Nmap 6. Arpspoof 7. WiFi Inspect 8. Network Spoofer 9. WiFi Kill 10. Arcai.com’s NetCut 11. WIBR+ 12. WPS connect 13. ZAnti Penetration Testing Android Hacking Toolkit 14. Fing Network Tools 15. WIFI Analyzer     Let’s begin! So, to begin with the hack first I had to search for different WiFi signals in the nearby area, there were a few of them.   Once, I checked for the WiFi networks then I turned on my Kali machine to hack into one of these networks. I opened up my terminal and typed in   Wifite is the tool w...

Popular Tools In Kali Linux

Image
Popular Tools in Kali Linux           Here’s our list of best Kali Linux tools that will allow you to assess the security of web-servers and help in performing hacking and pen-testing . 1. Nmap       -----> Nmap or “Network Mapper” i s one of the most popular tools on Kali Linux for information gathering. In other words, to get insights about the host, its IP address, OS detection, and similar network security details (like the number of open ports and what they are).                -----> And it will scan the devices connected to the network. 2. Aircrack-ng                  -----> Aircrack-ng is a tool that comes pre-installed in Kali Linux and is used for wifi network security and hacking. Aircrack is an all in one packet sniffer, WEP and WPA/WPA2 cracker, analyzing tool and a hash capturing tool. ...

Physical Tools Used For Hacking

Image
Physical Tools Used For Hacking  #1. Raspberry Pi     We are now on the third generation of these low-budget computers, which can be used in multiple ways. A classic example in security audits is to use a Raspberry Pi with its appropriate battery pack, a distribution platform like Kali Linux, and applications like FruityWifi, which together act like the Swiss army knife of pen testing . #2. WIFI PINEAPPLE                         The leading rogue access point and WiFi pentest toolkit for close access operations. Passive and active attacks analyze vulnerable and misconfigured devices . #3. Shark Jack           This portable network attack tool is a pentesters best friend optimized for social engineering engagements and opportunistic wired network auditing. Out-of-the-box it's armed with an ultra fast nmap payload, providing quick and easy network reconna...

Why Hackers prefer linux

Image
Why Hackers use and Prefer linux           Linux is an open-source operating system of a computer and comes from its old version mentioned as Unix.                    Today the use of Linux is developing day by day. And due to more benefits of Linux OS over different operating system hackers also fancies to use Linux instead of any other operating system like Windows or Mac,                    No wonder the other operating system is more user-friendly than this operating system, but this OS has amazing special features that make it more dominating than others.        #1 Open Source             Linux is an open-source operating system in The internet and other operating systems made based on linux are ...

Social