Monday, September 21, 2015

Top 5 Websites To Learn How To Hack Like A Pro

Top 5 Websites To Learn How To Hack Like A Pro


hackerYou might be surprised to learn just how many people want to learn how to hack. The stereotype is that of the young college guy – a computer science major for sure – who spends his evenings and weekends writing up intricate hacking scripts to break into whatever computer system he can get his hands on.

Free Penetration Testing and Ethical Hacking Training Websites

 

Best Free Hacking Tutorials  Resources to Become Pro Hacker

List of Best Free Hacking Tutorials and Resources to Become Pro Hacker
Learning to become hacker is not as easy as learning to become a software developer. I realized this when I started looking for learning resources for simple hacking people do. Even to start doing the simplest hack on own, a hacker requires to have in depth knowledge of multiple topics. Some people

Sunday, September 20, 2015

15 Resources to learn C# programming for beginners



15 Resources to learn C# programming for beginners

by on August 5, 2015 in Programming
15 Best Ways to Learn C Sharp
C# is a general-purpose and an object-oriented programming language and is widely used in developing enterprise applications. C# was developed by Microsoft and is the principal

What is a Metasploit

Metaspoit Framework is a open source penetration tool used for developing and executing exploit code against a remote target machine it, Metasploit frame work has the world’s largest database of public, tested exploits. In simple words, Metasploit can be used to test the Vulnerability of computer systems in order to protect them and on the other hand it can also be used to break into remote systems.

Ettercap Tutorial: DNS Spoofing & ARP Poisoning Examples

Ettercap stands for Ethernet Capture.
Ettercap is a comprehensive suite for man in the middle attacks.
It features sniffing of live connections, content filtering on the fly and many other interesting tricks. It supports active and passive dissection of many protocols and includes many features for network and host analysis.

Download and Install

Download the install the Ettercap package from Ettercap.
You can also install from the mirror as follows:
# apt-get install ettercap-gtk ettercap-common
This article explains how to perform DNS spoofing and ARP poisoning using Ettercap tool in Local Area Network ( LAN ).
Warning: Do not execute this on a network or system that you do not own. Execute this only on your own network or system for learning purpose only. Also, do not execute this on any production network or system. Setup a small network/system for testing purpose and play around with this utility on it for learning purpose only.

Ettercap Basics

First let’s learn some basics about Ettercap. Ettercap has the following 4 types of user interface
  • Text Only – ‘-T’ option
  • Curses – ‘-C’ option
  • GTK – ‘-G’ option
  • Daemon – ‘-D’ option
In this article, we will mainly focus on the “Graphical GTK User Interface”, since it will be very easy to learn.

Launching an ARP Poisoning Attack

We have already explained about why we need ARP and the conceptual explanation of ARP cache poisoning in ARP-Cache-Poisoning. So please have a look into it, and this article will cover how to perform it practically.
The following diagram explains the network architecture. All the attacks explained here will be performed on the following network diagram only. Using Ettercap in a production environment is not advisable.


WAN Attacks explained MSF 2015


WAN Attack explained video
https://www.youtube.com/watch?list=PL6pRPNzfppygZULn2zZZDOR_PcXp41imF&v=V6vvLhhhLq0

The Hacks of Mr. Robot: How to Hide Data in Audio Files

A you know, Mr. Robot is my favorite TV show this year, and not just for the realistic hacking. Rami Malek, the actor who plays Elliot, is incomparable in his depiction of a young man with social anxiety who is alienated from a superficial, materialistic society and wants to make a better world. I believe we will see a lot more of this actor in coming years.
In addition, the writing is excellent, although some of the depictions of Evil Corp employees, especially Tyrell Wellick, are a bit two dimensional and cliché. Overall, though, this is one of the best TV shows since Breaking Bad!
As the plot unfolds, it becomes clear that Elliot hacks and doxes the people in his life (including himself), then stores the information he finds onto CDs. He then labels them with some classic band label.

Many have wondered why he’d be doing that and how safe would that be?

The Hacks of Mr. Robot: How Elliot & Fsociety Made Their Hack of Evil Corp Untraceable

Well, the first season of Mr. Robot just ended and Elliot and fsociety successfully took down Evil Corp! They have effectively destroyed over 70% of the world’s consumer and student debt! Free at last! Free at last!

Of course, global financial markets crashed as well, but that’s another story.Although there were many elements that made the hack successful, such as Darlene developing a zero-day exploit (I’ll