Base64 Algorithm

Image
  Introduction              -----> Base64 encoding is used to c onvert binary data into a text-like format that allows it to be transported in environments that can handle only text safely.               -----> Base64 is sometimes also refered to as PEM , which stands for Privacy-enhanced Electronic Mail . There, Base64 was used to create printable text again after binary e-mail data that was generated during the e-mail encryption process.   How it works               Base64 encoding takes the original binary data and operates on it by dividing it into tokens of three bytes . A byte consists of eight bits, so Base64 takes 24bits in total. These 3 bytes are then converted into four printable characters from the ASCII standard.  The first step is to take the three bytes (24bit) of binary data and split it into f our numbers of six bits . Because the ASCII standard defines the use of seven bits, Base64 only uses 6 bits (corresponding to 2^6 = 64 characters) to ensur

Operating System used by Hackers

Operating System Used By Hackers 

             Hey guys in this part we are going to see about the top 5 operating systems used by hackers. There many os are used for hacking purpose but the similar thing of all that's its based on linux. If want to learn then learn linux first. 
 
Top 5 Operating Systems Used by Hackers  


1.Kali Linux 
       
       
  •     Linux is based on the Debian-Linux distribution, and is especially designed for digital forensics and penetration testing.
 
  •       Kali comes pre-installed with more than 300 penetration testing programs and can be installed as a primary operating system on the hard disk, live CD/USB and can even run as a virtual machine using some virtualisation software. And kali is my favorite too. 
  • I recommend kali if you know more about hacking if you are an amateur don't use kali works on root user (super user). 
 

2. Back Box
 
  • BackBox is an Ubuntu-based Linux distribution aimed at assisting ethical hackers and penetration testers in security assessments. 
  • BackBox OS is designed with the objective of being faster, easily operable and having a minimal desktop environment.  
  • The Linux distribution could be excellent for those who are looking for more practical security research.

3. Parrot-sec forensic os
     
  •  It is an operating system based on Debian GNU/Linux mixed with Frozen box OS and Kali Linux to provide the best penetration and security testing experience for the attackers and security testers. 

  • It is an operating system for IT security and penetration testing developed by the Frozen box Dev Team.

  • This is the one of the best feature in parrot os which does not persent in kali pre installed. Anonsurf is a utility that makes the operating system communication go over TOR or other anonymizing networks. 

  • According to Parrot, AnonSurf secures your web browser and anonymizes your IP.

4.DEFT Linux
  
  •  DEFT (Digital Evidence and Forensics Toolkit) is based on GNU Linux and DART (Digital Advanced Response Toolkit), a forensics system comprising some of the best tools for forensics and incident response.

  • DEFT Linux is especially designed for carrying out forensics tasks and runs live on systems without tampering with the hard disk or any other storage media.

  • It is used actively by ethical hackers, pen testers, government officers, IT auditors and even the military for carrying out various forensics based systems analysis.


5.Samurai Web Testing Framework

  • Samurai Web Testing Framework primarily focuses on testing the security of Web applications and comprises lots of Web assessment and exploitation tools.

  • The Samurai Web Testing Framework includes popular testing tools like Fierce Domain Scanner and Maltego for Reconnaissance, WebScarab and Ratproxy for mapping, w3af and Burp for discovery, and BeEF and AJAXShell for exploitation.

  • The framework is based on Ubuntu , is fully open source and receives regular updates with regard to products

                The above operating systems are open source and it is free to download . 
Thanks for reading this article.


Contact Us

If you have any questions about these Terms and Conditions, You can contact us:

  • By email: Lokie2301@gmail.com

Comments

Popular posts from this blog

Base64 Algorithm

Linux termux 2.0

Social