Posts

Showing posts from May, 2017

crack any zip file's password

                            how to crack any zip file password? 1)first, the password protected file is necessary... 2)if you don't know how to make it so we will create new one... 3)select the file by right click and go to "add  archive" 4)select the .zip and set password  5)and click ok... we made our password protected file and we are going to crack it... 6) go to kali-linux.. 7) and search for the fcrackzip and open it. 8)type the following command " fcrackzip -b -c a -l 5-5 -u file location  and press enter" yeah, finally we crack the password........      

honeypot

Image
 what is honeypot? in computer terminology , a honeypot is a computer security mechanism set to detect,deflect or in some manner, counteract  attempts at unauthorized use of information system. honeypot consists of data that appears to be a legitimate part of the site, but is actually isolated and monitored, and that seems to contain information or a resource of to attackers, who are then blocked. what is goal of create honeypot? the goal of a honeypot is to create an environment where the tools and behavior of blackhats can be captured and analyzed in the wild. based on this information, we can gain intelligence on threats faced by the internet community. a honeypot works by creating a highly controlled environment that is probed, attacked, and compromised  by blackhats. types of honeypot 1)production honeypots 2)research honeypots production honeypot : this honeypot are easy to use,capture only limited information, and are used primarily by c

botnets

Image
  what is botnets?  'a botnet is a collection of computers, connected to the internet , that interact to accomplish some distributed task ' the botnets used for illegal purpose. who controls botnets? the botnets are controlled by one person or a group. how do they work? 1)bootmaster infects victim with bot (worm,social engineering) 2)bot connects to c&cc server. this could be done using http,irc,ot any other protocol 3)bootmaster sends commands through c&c server to bot what are they used for? bootmasters have botnets in upwards of 400,000 bots. and they used it to steal money.                              botnet uses 1) distributed denial of services(ddos) 2)spam/phishing 3)ad-ware 4)click fraud ddos the ddos has been available in bots since the beginning. used for extortion take down system until they pay --> threats work too! example: 180solutions -aug2005 botmaster used bots to distribute 180so

dos(denial of service) attack

Image
What is dos attack? In computing, the dos ( denial of service ) attack is one of the most dangerous attack in cyber-attacks . Dos attack is a type of attack on a network that is designed to bring the network to its knees by flooding  It with useless traffic. Many dos attacks, such as the ping of death and teardrop attacks, exploit limitations in the TCP/IP protocols. two general class of the attack 1)flooding attacks ⇒  Point to point  attacks: TCP/UDP/ICMP flooding, ⇒  Smurf attacks ⇒  Distributed attacks: hierarchical  structurer 2)corruption attacks ⇒ Application/service specific eg. polluting p2p systems What is DDos attack? In a   distributed denial-of-service attack  ( DDoS attack ), the incoming traffic flooding the victim originates from many different sources. This effectively makes it impossible to stop the attack simply by blocking a single source. what is difference between dos and ddos? The differences between DoS an

darkweb

Image
                what is darkweb ? The darkweb is part of the world wide web that is only accessible by  means of special software,Allowing users and website operators to remain anonymous or untraceable. How we can access darkweb? 1)tor(the onion router) 2)I2P(invisible internet project)  what is tor? Tor  aims to conceal its users' identities and their online activity from surveillance and traffic analysis by separating identification and routing. It is an implementation of onion routing, which encrypts and then randomly bounces communications through a network of relays run by volunteers around the globe. Tor browser download link https://www.torproject.org/download/download Is tor safe? Yes, tor is totally safe. onion routing   is a technique for   anonymous communication over a   computer network . In an   onion network , messages are encapsulated in layers of   encryption , analogous to layers of an   onion . The encrypted data

firewall

Image
 ⇒ What is firewall? In computing, a firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules  . A firewall typically establishes a barrier between a trusted, secure internal network and another outside network, such as the Internet, that is assumed not to be secure or trusted. Firewalls are often categorized as either network firewalls or host-based firewalls . Network firewalls filter traffic between two or more networks , they are either software appliances running on general purpose hardware, or hardware-based firewall computer appliances. Host-based firewalls provide a layer of software on one host that controls network traffic in and out of that single machine How to detect how many firewall on website? 1)go to cmd in windows. 2)type command tracert  www.yoursite.com . 3)just checkout the result.  In this example we take baidu.com  in result when our request g

WannaCry

Image
⇒  What is WannaCry? First and foremost, let’s clarify exactly what WannaCry is. This malware is a scary type of trojan virus called “ransomware.” As the name suggests, the virus in effect holds the infected computer hostage and demands that the victim pay a ransom in order to regain access to the files on his or her computer.    How can I protect myself from WannaCry? Regardless of which operating system you run, you should install any and all available security updates immediately. Specifically, Windows users with machines that run Windows XP, Windows 8, or Windows Server 2003 should immediately install   this security update released on Friday by Microsoft. What can I do if my computer is infected with WannaCry? Sadly, there is no fix for WannaCry available at this time. Antivirus companies and cybersecurity experts are hard at work looking for ways to decrypt files on infected computers, but no means of third-party decryption are available right now. Hopeful
Image
 ⇒ What is an ip addresss? An   IP address   (abbreviation of   Internet Protocol address ) is an identifier assigned to each computer and other device (e.g., printer,   router ,   mobile device , etc.) connected to a   TCP/IP network that is used to locate and identify the node in communications with other nodes on the network. IP addresses are usually written and displayed in   human-readable notations. ➦ there are mainly two ip address 1)ipv4 2)ipv6 ⇒ Ipv4 address An IP address in IPv4 is   32-bits   in size, which limits the   address space   to   4294967296   (2 32 ) IP addresses. Of this number, IPv4 reserves some addresses for special purposes such as   private networks   (~18 million addresses) or   multicast addresses   (~270 million addresses). IPv4 addresses are usually represented in   dot-decimal notation, consisting of four decimal numbers, each ranging from 0 to 255, separated by dots, e.g., 172.16.254.1. Each part represents a group of 8 bit

how you can hack.. ??

Image
           ➤  The five phase of hacking 1) footprinting 2) scanning 3) gaining access 4) maintaining access 5) clearing tracks Footprinting   (also known as reconnaissance) is the technique used for gathering information about computer systems and the entities they belong to. To get this information, a hacker might use various tools and technologies. This information is very useful to a hacker who is trying to crack a whole system. possible about the target machine. The primary purpose of this phase is to gather intelligence so as you can conduct an effective penetration test. At the end of his phase, you are expected to have a list of IP of your target machine that you can scan later on. ➤ footprinting tools(reconnaissance) 1     footprinting  can be either active or passive. In active reconnaissance you send traffic to the target machine while a passive reconnaissance use Internet to gather information. When you use active reconnaissance, you