Posts

Showing posts with the label kali linux

Base64 Algorithm

Image
  Introduction              -----> Base64 encoding is used to c onvert binary data into a text-like format that allows it to be transported in environments that can handle only text safely.               -----> Base64 is sometimes also refered to as PEM , which stands for Privacy-enhanced Electronic Mail . There, Base64 was used to create printable text again after binary e-mail data that was generated during the e-mail encryption process.   How it works               Base64 encoding takes the original binary data and operates on it by dividing it into tokens of three bytes . A byte consists of eight bits, so Base64 takes 24bits in total. These 3 bytes are then converted into four printable characters from the ASCII standard.  The first step is to take the three bytes (24bit) of binary data and split it into f our numbers of six bits . Because the ASCII standard defines the use of seven bits, Base64 only uses 6 bits (corresponding to 2^6 = 64 characters) to ensur

Popular Tools In Kali Linux

Image
Popular Tools in Kali Linux           Here’s our list of best Kali Linux tools that will allow you to assess the security of web-servers and help in performing hacking and pen-testing . 1. Nmap       -----> Nmap or “Network Mapper” i s one of the most popular tools on Kali Linux for information gathering. In other words, to get insights about the host, its IP address, OS detection, and similar network security details (like the number of open ports and what they are).                -----> And it will scan the devices connected to the network. 2. Aircrack-ng                  -----> Aircrack-ng is a tool that comes pre-installed in Kali Linux and is used for wifi network security and hacking. Aircrack is an all in one packet sniffer, WEP and WPA/WPA2 cracker, analyzing tool and a hash capturing tool.           -----> It is a tool used for wifi hacking.   It mainly focuses on 4 areas: Monitoring : Captures cap, packet, or hash files. Attacking : Performs

Why Hackers prefer linux

Image
Why Hackers use and Prefer linux           Linux is an open-source operating system of a computer and comes from its old version mentioned as Unix.                    Today the use of Linux is developing day by day. And due to more benefits of Linux OS over different operating system hackers also fancies to use Linux instead of any other operating system like Windows or Mac,                    No wonder the other operating system is more user-friendly than this operating system, but this OS has amazing special features that make it more dominating than others.        #1 Open Source             Linux is an open-source operating system in The internet and other operating systems made based on linux are also open source.               Linux’s source code is at your fingertips as you can easily modify the source code of this OS according to your need and also the most of the applications that run on this operating system is also of open source which makes more benefit . #2. Ligh

Social