Posts

Showing posts from June, 2020

Base64 Algorithm

Image
  Introduction              -----> Base64 encoding is used to c onvert binary data into a text-like format that allows it to be transported in environments that can handle only text safely.               -----> Base64 is sometimes also refered to as PEM , which stands for Privacy-enhanced Electronic Mail . There, Base64 was used to create printable text again after binary e-mail data that was generated during the e-mail encryption process.   How it works               Base64 encoding takes the original binary data and operates on it by dividing it into tokens of three bytes . A byte consists of eight bits, so Base64 takes 24bits in total. These 3 bytes are then converted into four printable characters from the ASCII standard.  The first step is to take the three bytes (24bit) of binary data and split it into f our numbers of six bits . Because the ASCII standard defines the use of seven bits, Base64 only uses 6 bits (corresponding to 2^6 = 64 characters) to ensur

Physical Tools Used For Hacking

Image
Physical Tools Used For Hacking  #1. Raspberry Pi     We are now on the third generation of these low-budget computers, which can be used in multiple ways. A classic example in security audits is to use a Raspberry Pi with its appropriate battery pack, a distribution platform like Kali Linux, and applications like FruityWifi, which together act like the Swiss army knife of pen testing . #2. WIFI PINEAPPLE                         The leading rogue access point and WiFi pentest toolkit for close access operations. Passive and active attacks analyze vulnerable and misconfigured devices . #3. Shark Jack           This portable network attack tool is a pentesters best friend optimized for social engineering engagements and opportunistic wired network auditing. Out-of-the-box it's armed with an ultra fast nmap payload, providing quick and easy network reconnaissance.             The simple scripting language and attack/arming switch make loading payloa

Why Hackers prefer linux

Image
Why Hackers use and Prefer linux           Linux is an open-source operating system of a computer and comes from its old version mentioned as Unix.                    Today the use of Linux is developing day by day. And due to more benefits of Linux OS over different operating system hackers also fancies to use Linux instead of any other operating system like Windows or Mac,                    No wonder the other operating system is more user-friendly than this operating system, but this OS has amazing special features that make it more dominating than others.        #1 Open Source             Linux is an open-source operating system in The internet and other operating systems made based on linux are also open source.               Linux’s source code is at your fingertips as you can easily modify the source code of this OS according to your need and also the most of the applications that run on this operating system is also of open source which makes more benefit . #2. Ligh

Linux termux 2.0

Image
Termux Commands                               Welcome back guys on an another Post of termux commands in this part we going to learn about the termux commands and it's uses. And don't forget to subscribe. Lets get started ! Now open the termux and enter apt update  &&apt upgrade to update and upgrade all packages in the application. List Files: Commend: ls              If i want to list the file persent in the terminal the commend used is ls   Example:       Changing The working directory:   The commend used to change the working directory is cd (change direction) . Example if I want to change my working directory to Storage the commend will be cd storage  Commend cd..  Is used to change the working directory to the default.  To Create A Folder: Commends:   mkdir [file name] Example:   If you want to create a folder  mkdir commends is used. For example if I want to create a folder  test the commend will be mkdir Test . The output wil

Basic commands on linux

Image
Basic commands of Linux           Welcome guys on an another Post in this part we are going to see about the Basics commands in Linux. When we come to it is totally different from other operating systems like windows, mac etc.        In windows and Mac GUI (Graphical User Interface) is persent and easier to handle. While on the other hand Linux dose not have GUI only commends are used.      And hera we are going to use an app called TERMUX.   What is Termux?        Termux is an Android terminal emulator and Linux environment app that works directly with no rooting or setup required. A minimal base system is installed automatically - additional packages are available using the APT package manager.       Advanced Packaging Tools (more commonly referred to as APT) is used to find, install, and remove software in Termux. Start off by updating packages and upgrading with these commands apt update apt upgrade      When ever you entering into termux e

Operating System used by Hackers

Image
Operating System Used By Hackers                Hey guys in this part we are going to see about the top 5 operating systems used by hackers. There many os are used for hacking purpose but the similar thing of all that's its based on linux. If want to learn then learn linux first.    Top 5 Operating Systems Used by Hackers   1.Kali Linux                      Linux is based on the Debian-Linux distribution , and is especially designed for digital forensics and penetration testing .         Kali comes pre-installed with more than 300 penetration testing programs and can be installed as a primary operating system on the hard disk, live CD/USB and can even run as a virtual machine using some virtualisation software. And kali is my favorite too.  I recommend kali if you know more about hacking if you are an amateur don't use kali works on root user (super user).    Download Kali Linux 2. Back Box   BackBox is an Ubuntu-based Linux distribution aimed at assisting ethical hackers an

Types Of Hackers

Image
Types of Hackers     I n   this article we are going to see the types of hackers present        This will help you understand what kind of protection you require for your system and who are the faceless criminals targeting your personal or business information. Before you become proactive for your safety, it is essential to understand what you are facing or fighting. So now, let’s begin    White Hat Hackers   Black Hat Hackers   Gray Hat Hackers   Script Kiddies   Red Hat Hackers   Blue Hat Hackers l    1. White Hat Hackers     W hite hat hackers, also known add  ethical  hackers  are the cybersecurity experts who help the Govt and organizations by performing penetration testing and identifying loopholes in their cybersecurity. They even do other methodologies and ensure protection from black hat hackers and other malicious cyber crimes.             They will hack into your system with the  good intention of finding vulnerabilities  and help you remove virus and malware from your syste

Introduction To hacking

Image
Introduction To hacking!  What is hacking?              Hacking is the catch-all term for any type of misuse of a computer to break the security of another computing system to steal data, corrupt systems or files, commandeer the environment or disrupt data-related activities in any way. In other word hacking is "Finding A New Way".                  Hacking is identifying weakness in computer systems or networks to exploit its weaknesses to gain access. Example of Hacking: Using password cracking algorithm to gain access to a system. Legality of Ethical Hacking                           Ethical Hacking is legal if the hacker abides by the rules stipulated in the above section on the definition of ethical hacking.   What is Ethical Hacking?           4 Ways that Ethical Hackers cover their tracks | EC-Council Official Blog Ethical Hacking is identifying weakness in computer systems and/or computer networks and coming with countermeasures that protect the weaknesses.   Hacking P

Social