Skip to main content

Posts

Showing posts with the label hacking

Why Gray Hat Hacking? Ethics and Law

The purpose of this book is to support individuals who want to refine their ethical hacking skills to better defend against malicious attackers. This book is not written to be used as a tool by those who wish to perform illegal and unethical activities. In this chapter, we discuss the following topics: •   Know your enemy: understanding your enemy’s tactics •   The gray hat way and the ethical hacking process •   The evolution of cyberlaw Know Your Enemy “We cannot solve our problems with the same level of thinking that created them.” —Albert Eisenstein The security challenges we face today will pale in comparison to those we’ll face in the future. We already live in a world so highly integrated with technology that cybersecurity has an impact on our financial markets, our elections, our families, and our healthcare. Technology is advancing and the threat landscape is increasing. On the one hand, vehicles that ar...

How to access the deep web? What you need to know

How to access the deep web?, (Warning: the content of this publication is purely informative, you are solely responsible for what you do with that information). This means that in a conventional way it is not possible to access these services which opens up a whole market of possibilities for illegal operations and any type of task that requires certain anonymity. It is not as tough as you think. But, you can’t just access the deep/dark web like a normal web using a normal browser despite your need to use an anonymity software like Tor, which only accesses .Onion Links. Using Tor browser, you can browse the deep web anonymously. But, that doesn’t enough, you need an extra protection to secure your identity on the invisible web. Because it contains dangerous links which may breach the security. What can you find in the deep web?​ In addition you can find almost anything, an example of this are the online markets such as Silk Road; Where everything has a price, ...

Manpages of aircrack-ng in Debian experimental

NAME airbase-ng - multi-purpose tool aimed at attacking clients as opposed to the Access Point (AP) itself SYNOPSIS airbase-ng [options] <interface name> DESCRIPTION airbase-ng is multi-purpose tool aimed at attacking clients as opposed to the Access Point (AP) itself. Since it is so versatile and flexible, summarizing it is a challenge. Here are some of the feature highlights: - Implements the Caffe Latte WEP client attack - Implements the Hirte WEP client attack - Ability to cause the WPA/WPA2 handshake to be captured - Ability to act as an ad-hoc Access Point - Ability to act as a full Access Point - Ability to filter by SSID or client MAC addresses - Ability to manipulate and resend packets - Ability to encrypt sent packets and decrypt received packets The main idea is of the implementation is that it should encourage clients to associate with the fake AP, not prevent them from accessing the real AP. A tap interface (atX) is created when airbase-ng is run. This can be used to...

SSH Brute Force | Metasploit, Nmap, and THC Hydra

Introduction As you are no doubt aware, reading this article, SSH is a common ,command line only, remote access protocol to virtually all non-windows devices. SSH is commonly used to administer or interact with servers, routers, embedded devices, and sometimes mobile phones. SSH is the protocol (RFC 4251), The de-facto implementation is OpenSSH, the OpenBSD project. Windows devices can run SSH, but Windows admins typically use RDP to administer machines because Windows Administration has historically required a GUI [1]. SSH Supports many modes of access including public key cryptography, one time passwords, and simple username/password authentication. Usename password authentication is vulnerable to brute force. A wide variety of tools support brute forcing ssh. Here, I will review three commonly used tools. Metasploit, Nmap and THC Hydra. Metasploit Metasploit is a commonly used commercial penetration testing platform that includes a broad spectrum of attacks and is incred...

Hacking Faq

I. HACKING • What is hacking? • How do I crack shadowed passwords? • How can I tell the difference between an encrypted password and a shadowed password? • Where can I find the password file if it’s shadowed? • Where is the password file located? • What is an exploit? • What are some basic telnet commands? • How do I get out of the log file? • What is a DNIC? • What is an NUA? • What is a VAX/VMS? • What is telnet? • What is an anonymous remailer? • What is PGP? • What is a tcp/ip? • What is a virus? • What is a trojan? • What is a worm? • What do I need to become a hacker? • What are some common accounts for Novell Netware? • How can I gain supervisor access to Novell Netware? • How do I access the passwords for Novell? • How do I crack a Novell Netware password? • What are the domain codes? II. PHREAKING • What is phreaking? • How do I start phreaking? • What are boxes? • What kind of boxes are there? • How do I make a box? • What is a loop? III. Security • How do I set u...