Skip to main content

Posts

How can a VPN protect you on public Wifi?

Public wireless fidelity is a terrific tool once out and regarding because it permits you to stay on-line. However, the drawback is that wireless fidelity hotspots aren't safest of things. Several of the hotspots found in low retailers, hotels and the other public place ar lacking robust passwords or suffer from router configurations that are poor. These will leave you, full hospitable hackers. You'll be able to get protection through a VPN. So, however, will a VPN defend you on public Wifi? How public Wifi networks are hacked? First, let's agitate the question of; however, a local public area network is hacked and why. Several free square measure network|WLAN|wireless fidelity|WiFi|local area network|LAN} hotspots are straightforward to hack, even to a novice. Once hackers have gained access, they'll use different tools to urge your personal details. Hackers will steal your passwords, your bank details, MasterCard details, and additional. They'll steal your...

Terminus - A Terminal For a Modern Age

  Terminus is a highly configurable terminal emulator for Windows, macOS and Linux. Theming and color schemes Fully configurable shortcuts Split panes Remembers your tabs PowerShell (and PS Core), WSL, Git-Bash, Cygwin, Cmder and CMD support Integrated SSH client and connection manager Full Unicode support including double-width characters Doesn't choke on fast-flowing outputs proper shell experience on Windows including tab completion(via Clink) Terminus is an alternative to window's standard(conhost), Powershell ISE, PuTTy or iTerm Terminus is not a new shell or a MinGW or Cygwin replacement. Neither is it lightweight - it RAM usage is of importance, consider Conemu or Alacritty Plugins Plugins and themes can be installed directly from the Settings view inside Terminus. clickable-links - makes paths and URLs in the terminal clickable shell-selector - a quick shell selector pane title-control - allows modifying the title of the terminal tabs by pr...

12 Best Linux Distributions for Hacking and Pen-Testing

I have basically listed out various Linux distributions focusing on security. These Linux distros provide various tools that are needed for assessing networking security and other similar tasks. List is in no particular order. 1.Kali Linux Kali Linux is the most widely known Linux distro for ethical hacking and penetration testing. Kali Linux was developed by Offensive Security taking on the mantle of BackTrack. Kali Linux is based on Debian. It comes with a large amount of penetration testing tools from various fields of security and forensics. And now it follows the rolling release model, meaning every tool of your collection will always be up-to-date. It is the most advanced penetration testing platform out there. It supports a wide range of devices and hardware platforms. Moreover, Kali Linux provides decent documentation and a large & active community. You can easily install Kali Linux in VirtualBox inside Windows and start your hacking practice right away. 2.Back...

Session Hijacking

The concept of session hijacking is an interesting topic among other scenarios. It is basically hijacking of sessions by intercepting the communication between hosts. The attacker usually intercepts the communication to obtain the roles of authenticated user or for the intention of Man-in-the-Middle attack. Session Hijacking In order to understand the session hijacking concept, assume an authenticated TCP session between two hosts. The attacker intercepts the session and takes over the legitimate authenticated session. When a session authentication process is complete, and the user is authorized to use resources such as web services, TCP communication or other, the attacker takes advantage of this authenticated session and places himself in between the authenticated user and the host. Authentication process initiates at the start of TCP session only, once the attacker successfully hijacks the authenticated TCP session, traffic can be monitored, or attacker can get the role of t...

The Metasploit Project

The Metasploit Project is a computer security project that provides information about security vulnerabilites and aids in penetration testing and IDS signature development. Is is owned by Boston, Massachusettes-based security company Rapid7. Is is best-known sub-project is the open-source Metaspoilt Framework, a tool for developing and executing exploit code against a remote target machine. Other important sub-projects include the Opcode Database, shellcode archive and related research. The Metasploit Project includes anti-forensic and evasion tools, some of which are built into the Metasploit Framework. Metasploit Framework. Metasploit is pre-installed in the Kali Linux operating system. History Metasploit was created by H. D. Moore in 2003 as a portable network tool using Perl. By 2007, the Metasploit Framework had been completely rewritten in Ruby. On October 21, 2009, the Metasploit Project announced that it had been acquired by Rapid7, a security company that provides u...

The Dark Web

The Dark Web is an area that resides on the Deep Web. Several people confuse the Deep Web and the Dark Web thinking they are the same thing. This is definitely not the case. The Dark Web is mainly accessed via a software client called Tor, which will be discussed in more detail later in this paper. Tor is a special browser that allows you to navigate the Dark Web. One popular use of the Dark Web is in relation to malware. Large amount of malware are using the Dark Web to communicate with their Command & Control (C&C) servers. An example of a piece of malware that does this is SkyNet (Cox, 2015). SkyNet is a trojan that has the capabilities of performing a DDoS attack or mine Bitcoins. It uses Hidden Service provided by Tor to communicate anonymously with its C&C servers. An advantage of using these Hidden Service for C&C communication is that the traffic is encrypted, so it makes the origin, destination, and payload. Another advantage is that the owner ...

Under The Ocean of the Internet - The Deep Web

Introduction The Internet is like big ocean. The ocean is filled with large continents and islands that people visit. A large continent would be Google, and an island would be the news site for your local newspaper. Every day the average person visits these continents and islands using their web browser, which act as a boat navigating to destinations on the Internet. The reality though is that these continents and islands only make up 4% of the Internet. The rest of the Internet is made up of the Deep Web, which is located under the ocean. The Deep Web or Invisible web is used for both good and bad, while some may assume its use is for illegal purposes. The use of the Internet continues to evolve, and the Deep Web is a big part of that. Internet Usage People all over the world use  the Internet every day. There are currently over 3billion people that use the Internet, more than 1 billion websites, and 3.5 billion Google searches a day. There are also 500 million tweets sent a...