Skip to main content

Posts

Showing posts from April, 2021

Hide-My-IP

 In this we gonna see an important tool for Hiding the IP.  Tool name :- Hide-My-IP 🔗 Link:-  https://www.hide-my-ip.com/ This is a tool , once installed on your computer , will allow you to bypass censorship, hide your identity and surf the internet anonymously . Surf anonymously, prevent hackers from acquiring your IP adress , send anonymous email and encrypt your internet connection. Protect your online privacy by Changing your IP with Hide My IP.

IP masking

  Usually Linux users or administrators know how to change their IP manually. Here , we will see a famous tool used to change the IP address . 📍 JonDo-The IP Changer : 🔗Link:-  https://anonymous-proxy-servers.net/en/jondo.html You may use the JonDonym for anonymous surfing, anonymous e-mail, chats and other purposes. JonDo, formerly JAP is the ip Changer proxy tool you have to install on your computer. It acts as a proxy and will forward the traffic of your computer .It acts as a proxy and will hide your IP adress. JonDo will provide an anonymisation on proxy for you , but it does not change your system setting. You have to configure the proxy setting of each internet application you want to use anonymous with JonDonym by self.

♒Virus database in termux♒

Hey all here. Introducing the new virus DB TheZoo. This is a project created to make malware analysis open and available to the public. 🔻 Installation   Updating packages:   apt update -y  apt upgrade -y   Install git and python:   apt install git  apt install python   Download the tool itself:   git clone https://github.com/ytisf/theZoo   Open the folder with the utility:   cd theZoo Launch   Run the utility with the command:   python theZoo.py  Next, we select the base from which we will take the virus, for example, botnets:  search botnet  And download our malware virus:  use serial number of the virus in the database  Then just enter get and get the directory.  Each directory consists of 4 files:  - Malware files in an encrypted ZIP archive.  - SHA256 amount of 1st file.  - MD5 sum of the 1st file.  - File of passwords for the archive.

Best WiFi Adapter for Kali Linux

1. Alfa AWUS036NH  We are using this WiFi adapter from the BackTrack days (before releasing Kali Linux) and still we consider it as one of the best. For it’s long range signals we can do our penetration testing jobs from a long distance. Alfa AWUS036NHA Kali Linux WiFi Adapter 2020 Alfa AWUS036NH is plug and play and compatible with any brand 802.11g or 802.11n router using 2.4 GHz wavelength and supports multi-stream & MIMO (multiple input multiple output) with high speed transfer TX data rate up to 150 MBPS. It also comes with a clip which can be used to attach this adapter on a laptop lid. Chipset: Atheros AR 9271. Compatible with any brand 802.11b, 802.11g or 802.11n router using 2.4 Ghz wave-length. Includes a 5 dBi omni directional antenna as well as a 7 dbi panel antenna. Supports security protocols: 64/128-bit WEP, WPA, WPA2, TKIP, AES. Compatible with Kali Linux RPi with monitor mode and packet injection. High transmitter power of 28 dBm – for long-rang and high gain WiFi.

OTP Bypassing :

  Bypass OTP Schema:- → Response mnipulate → Bruteforce → Sms forwarding → Broken authentication we can use any random value Here, We will discuss about How attacker able to bypass OTP Schema by response manipulate technique . If You don’t know What is response manipulate is a technique attacker try to analyze Request using some proxy tool attacker can change value of Response without entering correct OTP. Steps Of Testing : 1. Here We have a vulnerable Application which allow us to Bypass OTP Schema That consist broken authentication schema. As when We login Or Sign up as authenticate some application ask for OTP Confirmation, As above picture when user enter OTP Confirmation Code which comes to User Email After entering OTP we can access as Authenticate user , 2. Here For checking Is application is vulnerable for OTP Bypass we will use some random OTP 0000 Value As above picture we Entered wrong OTP Value , Now, here we have to do before Click Verifiy Open Some proxy tool to intercep

MAC Spoofing :-) MAC spoofing play an important role in WiFi hacking , network hacks and MITM ( Man in the middle attacks ).

  📌 MAC spoofing in Kali :-) Steps  :-  1. Disable the interference 2. Change the MAC  3. Enable the interference  Practicals :-  Run the command " ifconfig "  Check the interference you want to change the MAC, let's say it as the interference eth0 In the response returned by the ifconfig command look for the entry "ether". This will contain the corresponding MAC address 1. Disable the interference :-  ifconfig eth0 down 2. Change the MAC :-  ifconfig eth0 hw ether 00:11:22:33:44:55 3. Enable the interference :-  ifconfig eth0 up Now check by running the command ifconfig. The MAC address will be changed.  Note  :- Once we change the MAC address , it doesn't stay forever , once you re-start the system , the original MAC automatically replaces the spoofed one.

Courses

  We will be offering you :- 1. Programming 2. Administrating Linux 3.Ethical-Hacking 4.Bug-Bounty 5.Cyber-Security Login yourself for cost  free :-) Join us