Posts

Showing posts with the label HACKING

WHY IS LINUX BEST OS FOR HACKING?

Image
TECHGNOR LINUX IS THE BEST OS FOR HACKING WHAT IS LINUX? Linux is an open source operating system for computers. Linux is a Unix-like operating system, meaning that it supports multitasking and multi-user operation. Linux is widely used for supercomputers, mainframe computers, and servers. Linux can also run on personal computers, mobile devices, tablet computers, routers, and other embedded systems. One of the most prominent examples of this is the Android mobile operating system, which is based on the Linux Kernel. Linux is capable of running many of the same applications and software as Windows and Mac OS X. Linux operating systems, software, and applications are commonly referred to as Linux distributions (distros for short). HACKING WITH LINUX Linux is an extremely popular operating system for hackers. There are two main reasons behind this. First off, Linux’s source code is freely available because it is an open source operating system. This means that Linux is very ea...

MAN IN THE MIDDLE ATTACK

Image
TECHGNOR MAN IN THE MIDDLE ATTACK What is a Man-in-the-Middle (MITM) attack? A MITM attack happens when a communication between two systems is intercepted by an outside entity. This can happen in any form of online communication, such as email, social media, web surfing, etc. Not only are they trying to eavesdrop on your private conversations, they can also target all the information inside your devices. Taking away all the technicalities, the concept of an MITM attack can be described in a simple scenario. Imagine being brought back to the days of old when snail mail was rife. Jerry writes a letter to Jackie expressing his love for her after years of hiding his feelings. He sends the letter to the post office and it’s picked up by a nosy mailman. He opened it and, just for the hell of it, he decided to rewrite the letter before delivering the mail to Jackie. This results in Jackie hating Jerry for the rest of her life after “Jerry” called her a fat cow. The moral of the stor...

USB RUBBER DUCKY

Image
TECHGNOR USB RUBBER DUCKY The USB Rubber Ducky is a keystroke injection tool disguised as a generic flash drive. Computers recognize it as a regular keyboard and accept pre-programmed keystroke payloads at over 1000 words per minute. Payloads are crafted using a simple scripting language and can be used to drop reverse shells, inject binaries, brute force pin codes, and many other automated functions for the penetration tester and systems administrator. Since 2010 the USB Rubber Ducky has been a favorite among hackers, penetration testers and IT professionals. With origins as the first IT automation HID using an embedded dev-board, it has since grown into a full fledged commercial Keystroke Injection Attack Platform. The USB Rubber Ducky captured the imagination of hackers with its simple scripting language, formidable hardware, and covert design. FOLLOW ME AT FACEBOOK VISIT OUR FACEBOOK PAGE FOR MORE JOIN THE FORUM

PYTHON IS BEST FOR HACKING

Image
TECHGNOR PYTHON IS BEST The word “hacker” is an overloaded word. It has multiple meanings based on context. See the Jargon file for a long list of potential meanings. I’m going to focus on three ideas of “hacking” and why they all connect well with Python: A hacker can be someone who puts things together without care, usually performing the work quickly with an eye for the intended behavior, not the long term survivability of the thing. Often a programmer “hacks together a prototype” or other such forms. Python is great for this early hacking period, where code is often disposable and any solution is good for now. With a giant standard library, and a packaging system that puts prebuilt tools and frameworks at your fingertips, it is often very easy to hack something into existence. Another version of hacking is working with enthusiasm. Figuring out exactly where to improve your code, profiling options, putting things together and taking them apart again. Taking apart things ju...

METASPLOIT:THE BEST HACKING AND PENTESTING SOFTWARE.

Image
TECHGNOR METASPLOIT The Metasploit Project is an open source project that provides a public resource for researching security vulnerabilities and developing code that allows a network administrator to break into his own network to identify security risks and document which vulnerabilities need to be addressed first. The Metasploit Project offers penetration (pen) testing software and provides tools for automating the comparison of a program's vulnerability and its repaired (patched) version. Anti-forensic and advanced evasion tools are also offered, some of them built into the Metasploit Framework. Metasploit Framework, the Metasploit Project's best-known creation, is a software platform for developing, testing, and executing exploits. It can be used to create security testing tools and exploit modules and also as a penetration testing system. It was originally created as a portable network tool in 2003 by HD Moore. The Metasploit Project also offers Metasploit Expres...