Posts

Showing posts from August, 2017

‘Honesty app’ Sarahah is dishonest, as it uploads your phone contacts to the server

Image
Sarahah, the anonymous feedback messaging app, is all over the place. Be it Facebook, Twitter, Instagram or Snapchat, everyone is talking about the app for the last couple of weeks. For those unaware, 'Sarahah' - meaning 'honesty' in Arabic, is an app that allows users to send anonymous messages to others with the app. Created by Saudi Arabian developer Zain al-Abidin Tawfiq, the app is aimed to help people identify their strengths and weaknesses. However, users have no way of knowing who sent the message or how to reply to them. The app is available in two languages, English and Arabic, for iOS and Android users. "Sarahah helps you in discovering your strengths and areas by taking the right idea from your employees and your friends in a private manner", the app description explains. However, it now appears that the app is collecting more than just feedback messages. Apparently, the app is uploading users' phone numbers and email addresses in the c

Simple way to hack the FACEBOOK account with workstation hijacking

Image
you can hack any website by steal browser cookies. we want few plugin for execute of this attack, so we should install below plugin on your browser. Chrome : Cookie Manager firefox   : Cokkies Manage+ in my case, i choose chrome to my target.click cookies icon and get the cookies manager plugin. search the facebook cookies by using search bar. check the fb cookies information and copy it.   (if you have any doubt check the below images). 3. open the firefox and go to tool and get cookies manager+. there is a option called new cookies for generate the cookies on the cookies manager. then select the new cookies and generate the fake cookies like below images.facebook should have datr, sb, c_user, xs, fr and act  cookies for login likewise each website has different cookies components. 4. access the facebook.com now u will login as user victim. Note:- this is just basic concept for fb account hacking by cookies. i will tell how to get v

NMAP

Image
Nmap is a network scanning tool.  it indicates the live hosts in a range of IP addresses, also we can gathers others information by using nmap. Normally we use two format to scan a network which are 192.168.56.* or 129.168.56.0/24. we can use to "nmap help" command and find the nmap functions.

How to install nessus on kali linux

Image
Nessus is a vulnerability scanning tool.its for all os. some of os version has this tool internally. if you have os without nessus follow my instructions. STEP1  go to this link and get the nessus file : https://www.tenable.com/products/nessus/select-your-operating-system select your os type and download the file. after that click the get an Activation code button. choose the free option and provide your information for the key registration. if you done the registration they will send the key through email which are provide for you.                          STEP2 follow the below images

How to Embed a Secret Message in a Graphic

Image
                                               Step 1: Download and install S-Tools.                                                Step 2: Create a secret message text file  Step 3: Create a simple .bmp graphics file.                                         Step 5: Embed the message into a graphic image file.                       Step 6: Use the unencrypted passphrase to protect the embedded text file.                                            

Encryptions And Decryption

Image
it is a way of secure the data. It’s based on two-way mechanism. if we want, we can encrypt (convert to unreadable format from original data) the data also decrypt(convert to original data from unreadable format) the data and get the original data by using the key. this is based on public key info structure (PIK). Also, it has two type, those are symmetric and asymmetric. ·        Symmetric We use a single key for encrypting and decrypting in Symmetric encryption. ·        Asymmetric It has two keys, one is public key other one is a private key. However, we called as the key pair for those keys. We can use both keys to encrypt or decrypt the data. But there is one condition if we use the public key to encrypt the data. We should use a private key to decrypt otherwise we can not recover the original data.

Wargame Bandit Answer

Image
Wargames bandit Level 0 ·        I have chosen a tool for remote login. Its putty. ·        Enter the host name : “bandit.labs.overthewire.org”, password and user name : bandit0 and password0 in the putty. Level 0 to 1 ·       Then use the ls-a command and check the files of present working directory. ·        Use to cat command to view the readme file and get the password for login to the level1. ·        Password is : boJ9jbbUNNfktd78OOpsqOltutMc3MY1 Level 1 to 2 ·        Login to the level 2 by using password from you got previous level “boJ9jbbUNNfktd78OOpsqOltutMc3MY1” ·        Writ the ls command and view the file list of present working directory ·        then write the command cat ./- to view the dash file. And get the password for nextlevel : CV1DtqXWVFXTvM2F0k09SHz0YwRINYA9 Level 2 to 3 ·        Use to ls command and get file called ass  "spaces in this filename" . that has space between two words in the file n

Way of Hashing

Image
Hashing is a way of securing our data. Hashing is not used for reusable data, since the feature of backing up original data is not present in the mechanism of Hashing. At current, Hashing has become a way to restore passwords into the database. This is done by the user registering into a system using password and the password will be converted to an other value and will be stored in the database. However, Hashing is not advised for storing data, since Hashing works be randomizing and not ordering data. Hash value is one of the main features for not retrieval data. For example when a password is used on a system, it will be stored under Hash value. When a password is given in a system under the Hash value the system is likely to save the password and make the login time quick. For this to happen the old Hash value and new Hash value has to be matched, if they are not matched the log in will be failed and only if Hash value matches the log in will be successful. ·          H