Uncategorized

Here is a small list of some of the Frequently asked Questions about hacking:




How long does it take to become a hacker?

Hacking is not something that can be mastered overnight. It really takes quite some time to understand and implement the skills that actually put you in the hacker’s shoes.
So, for anyone who is wanting to become a hacker, all it takes is some creativity, willingness to learn and perseverance.


What skills do I need to become a hacker?

In order to become a hacker, it is essential to have a basic understanding of how a computer system works. For example, you may start off with basics of operating system, computer networks and some programming.
At this point in time, you need not worry much about this question as this book will take you through all those necessary concepts to establish the skills that you need to possess as a hacker.


What is the best way to learn hacking?

As said earlier, the best way to learn hacking is to start off with the basics. Once you have established the basic skills, you can take it even further by going through the books that discuss individual topics in a much detailed fashion. Do not forget the power of Internet when it comes to acquiring and expanding your knowledge.

Uncategorized

Here is a small list of some of the Frequently asked Questions about hacking:



How long does it take to become a hacker?

Hacking is not something that can be mastered overnight. It really takes quite some time to understand and implement the skills that actually put you in the hacker’s shoes.
So, for anyone who is wanting to become a hacker, all it takes is some creativity, willingness to learn and perseverance.


What skills do I need to become a hacker?

In order to become a hacker, it is essential to have a basic understanding of how a computer system works. For example, you may start off with basics of operating system, computer networks and some programming.
At this point in time, you need not worry much about this question as this book will take you through all those necessary concepts to establish the skills that you need to possess as a hacker.


What is the best way to learn hacking?

As said earlier, the best way to learn hacking is to start off with the basics. Once you have established the basic skills, you can take it even further by going through the books that discuss individual topics in a much detailed fashion. Do not forget the power of Internet when it comes to acquiring and expanding your knowledge.

Uncategorized

Leaked Samsung roadmap reveals upcoming laptop, tablet and phone launch plans



We saw the release of Samsung’s long-awaited Galaxy A52 and A72 midrangers at yesterday’s Unpacked event. Samsung 2021 product launch roadmap Based on this info we can see the next Samsung Unpacked event is scheduled for April 14 and will be focused on PCs and more specifically Galaxy Book laptops. We’ll most likely get the successor to last year’s Galaxy S20 FE in the form of the Galaxy S21 FE. So far we’ve seen few bits of info regarding this device such as it will be offered in 128/256GB storage variants and White, Gray/Silver, Pink, and Violet colors.

━━━━━━━━━━━━

Uncategorized

HOW TO RUN .EXE FILE IN ANDROID



Files with the EXE extension are executable files intended for use within Windows or MS-DOS. You can’t make all EXE files work on an Android. However, many older DOS-based EXE files can be opened with the DOS emulator DOSBox.

Step 1
Install a DOSBox app on your Android device. AnDOSBox, aDosBox and DosBox Turbo are three different DOSBox apps available from the Google Play store.

Step 2
Open the DOSBox app.

Step 3
Type “cd \foldername” into the command line, where “foldername” denotes the folder in which your EXE is contained. For example, if your EXE is in the Download folder, type “cd \download.”

Step 4
Click Enter on your Android keyboard.

Step 5
Enter the name of the EXE file. You do not need to enter the .exe extension.

Step 6
Tap “Enter” on your Android keyboard.

Uncategorized

Image Payload Creating and Injecting Tools



Features:

• Bypassing CSP using polyglot JPEGs

• Encoding Web Shells in PNG IDAT chunks

• Hidden malvertising attacks (with Polyglot images)

• XSS payload revisiting (in PNG and IDAT chunks)

• XSS Facebook upload (Wonky and PNG content)

Tools:

bmp.pl, gif.pl, jpg.pl, png.pl

Requirements:

GDString::CRC32Image::ExifTool

Install

Clone the repo:

$ git clone https://github.com/chinarulezzz/pixload.git

Note: Debian users need to install the following packages:

$ sudo apt install libgd-perl libimage-exiftool-perl libstring-crc32-perl

Pixload Usage Examples

BMP Payload Creator/Injector

Usebmp.pl to create BMP Polyglot image with custom/default payload, or inject payload into existing image:

$ ./bmp.pl [-payload ‘STRING’] -output payload.bmp
If the output file exists, then the payload will be injected into the existing file. Else the new one will be created.

GIF Payload Creator/Injector

$ ./gif.pl [-payload ‘STRING’] -output payload.gif

JPG Payload Creator/Injector

There are two ways in which you can achieve this:

1. Comment section injection:

$ ./jpg.pl -place COM -output payload.jpg

2. DQT table injection:

$ ./jpg.pl -place DQT -output payload.jpg

PNG Payload Creator/Injector

$ ./png.pl [-payload ‘STRING’] -outp

Uncategorized

RouterSploit Framework



Scan the routers devices and check the vulnerabilities of Routers/Devices and exploits by the using frameworks it consists of many more powerful modules for penetration testing operations
RouterSploit.

Installation:
$ apt install python
$ apt install python2
$ git clone https://github.com/reverse-shell/routersploit.git
$ cd routersploit
$ pip2 install -r requirments-dev.txt
$ pip2 install -r requirments.txt
$ pip2 install request
$ pip2 install requests
$ python2 rsf.py

Usage:
$ show all
it shows all modules of rotersploit

$ use [module name]
it shows how you can use that module


Uncategorized

OnePlus Nord’s Android 11 update fixed, rollout resumes




The developers needed a few days to the fix issues in OnePlus Nord’s Android 11 update, which was paused due to bug reports coming in. A hotfix is rolling out for OnePlus Nord’s Android 11 update It sounds like all the reported bugs have been squashed. System Update to Android 11 version The brand new UI design brings you a more comfortable experience with various optimizations of details Optimized the stability of some third-party apps and improved experience Optimized power consumption to increase battery life Fixed the known issues Improved system stability Ambient Display Newly added Insight clock style, a joint creation with Parsons School of Design.

━━━━━━━━━━━━━

Uncategorized

OnePlus Watch is arriving on March 23




Now we know the OnePlus Watch is coming on March 23 alongside the OnePlus 9 series. OnePlus India March 12, 2021 In a post on its official forums, OnePlus said its “Fresh addition to the OnePlus family is healthy, punctual and even takes care of you while you sleep.” These wordings confirm the OnePlus Watch will come with health and fitness features and sleep tracking, but that’s hardly a surprise since most smartwatches come with those features these days. While OnePlus hasn’t divulged much about its smartwatch yet, it has announced a contest where nine winners will be rewarded with the company’s first smartwatch.

━━━━━━━━━━━━━

Uncategorized

Samsung Galaxy M42 to become the first 5G smartphone in the series




Back in November, we came across several certification listings for Samsung’s upcoming Galaxy M42 which confirmed a 6,000 mAh battery. Samsung Galaxy M42 Wi-Fi certification The model number in particular is significant as past international versions of 5G Samsung devices have all sported the B/DS marking which means the M42 will also be a 5G phone. Roid 11 confrimation The listing itself does not give out any additional spec details for the M42 apart from it having dual-mode Wi-Fi connectivity.

Uncategorized

5 Basic Tools For Password Cracking



——————————————————————————————
#1 John The Ripper :- John the Ripper is a free password cracking software tool. Originally developed for the Unix operating system, it can run on fifteen different platform.

#2 NCrack :- Crack is a Unix password cracking program designed to allow system administrators to locate users who may have weak passwords vulnerable to a dictionary attack. Crack was the first standalone password cracker for Unix systems and the first to introduce programmable dictionary generation.

#3 Hydra :- Hydra is a parallelized password cracker which supports numerous protocols to attack. It is very fast and flexible, and new modules are easy to add. This tool makes it possible for researchers and security consultants to show how easy it would be to gain unauthorized access to a system remotely.

#4 Medusa :- Medusa is a speedy, massively parallel, modular, login brute-forcer for network services created by the geeks at Foofus.net. It currently has modules for the following services: CVS, FTP, HTTP, IMAP, MS-SQL, MySQL, NCP (NetWare), PcAnywhere, POP3, PostgreSQL, rexec, rlogin, rsh, SMB, SMTP (VRFY), SNMP, SSHv2, SVN, Telnet, VmAuthd, VNC, and a generic wrapper module.

#5 Aircrack-ng : Aircrack-ng is a Free and a Very Common Tool Used for Cracking Password of WPA,WPA2 Hashesh. It is Mainly Used For Wireless Pen Testing. By Using Aircrack-ng You Can Crack Passwords Via Brute Force or Wordlist Based Attack.

Uncategorized

How to Access DarkWeb or DeepWeb



Steps

There are many ways to access the dark web. Being a part of the deep net, dark web operates differently than the clear-net, and needs special client software to be accessed. While there are multiple ways to access the dark web, the most common and recommended method involves using TOR, and then visiting the .onion websites. All dark web website have a URL with .onion domain, which looks similar to the way the clear-net websites have .com, .org, .net, etc. Once you have TOR and find out the .onion address of a deep web site (hidden web site),you can simply enter it in the URL bar on TOR browser, and it’ll open, just as normal websites open in usual browsers.

If you read the previous boring section, you’d see that I mentioned how the dark net often uses uncommon communication protocols, etc. In case of the dark web, we see that phenomenon with respect to the onion websites. I won’t go in much depth, but first look at a .onion URL suggests that it’s similar to the clear-net websites. However, internally, the way they work is nothing similar to the clear-net. Precisely, .onion is not part of the internet’s DNS root, and hence, normal DNS servers can’t resolve your request if you type the URL of a .onion website on your browser. TOR redirects these requests through it’s own servers, similar to the way proxies work, and then we get to the website, without the involvement of DNS servers anywhere. This ensures that search engine bots can’t browse around the deep web, and that anonymity is maintained, both of the client looking at the web pages, as well as the server serving the web pages (In other words, the server doesn’t know who the client is, and the client doesn’t know anything about where the server is.)

If you’re using Windows, you can download the Tor executable on web..versions for linux and mac available also you can use in your android device but it’s not safe.

Uncategorized

#Huawei P50 series will be the first to come with HarmonyOS out of the box




The post about Huawei P50 and HarmonyOS Icons for new Petal apps/features As for existing devices, a mass migration to HarmonyOS is expected to start in April with high-end Huawei phones leading the way. In preparation for that migration, the company is expanding its Petal line of alternative services. Soon Huawei will unveil the Petal Assistant, a Petal keyboard and Petal Vision.

Uncategorized

List of all internet errors



– 400 (Bad request)

– 401 (Authorization required)

– 402 (Payment required)

– 403 (Forbidden)

– 404 (Not found)

– 405 (Method not allowed)

– 406 (Not acceptable)

– 407 (Proxy authentication required)

– 408 (Request Timeout)

– 409 (Conflict)

– 410 (Gone)

– 411 (Length required)

– 412 (Precondition failed)

– 413 (Request entity too large)

– 414 (Request URI too large)

– 415 (Unsupported media type)

– 416 (Request range not satisfiable)

– 417 (Expectation failed)

– 422 (Unprocessable entity)

– 423 (Locked)

– 424 (Failed dependency)

– 500 (Internal server error)

– 501 (Not Implemented)

– 502 (Bad gateway)

– 503 (Service unavailable)

– 504 (Gateway timeout)

– 505 (HTTP version not supported)

– 506 (Variant also negotiates)

– 507 (Insufficient storage)

– 510 (Not extended)

Uncategorized

Cross-site Scripting (XSS)



Cross-site Scripting (XSS) is a client-side code injection attack. The attacker aims to execute malicious scripts in a web browser of the victim by including malicious code in a legitimate web page or web application. The actual attack occurs when the victim visits the web page or web application that executes the malicious code. The web page or web application becomes a vehicle to deliver the malicious script to the user’s browser. Vulnerable vehicles that are commonly used for Cross-site Scripting attacks are forums, message boards, and web pages that allow comments.

A web page or web application is vulnerable to XSS if it uses unsanitized user input in the output that it generates. This user input must then be parsed by the victim’s browser. XSS attacks are possible in VBScript, ActiveX, Flash, and even CSS. However, they are most common in JavaScript, primarily because JavaScript is fundamental to most browsing experiences.

Uncategorized

FIREWALL IN ANY ANDROID DEVICE



DESCRIPTION: firewall is the security in any operating system that disallows all the dangerous IP’s and also the harmful programs to penetrates in the operating system

Steps To Add Firewall In Any Android Device:

Step 1. First of all, you need to download and install the cool android app that is NoRoot Firewall the app that will allow you to add firewall feature to your device.

Step 2. Now you need to launch the app after installing it in your device. Now you need to click on “Start”….

Step 3. Now you need to allow the connection, simply tap on “OK” to continue

Step 4. Now you need to move over the “Pending Access” tab and there you will see all the apps that require connecting to the internet. Simply allow them or deny them as per your wish

That’s it! you are done, now your Android has a Firewall that will be securing your device from various threats.

Uncategorized

Generate metasploit Payloads in Easiest way using TM venom specially for Termux users




[!] Tmvenom :- Tmvenom is a python based tool specially designed for Termux users.This payload generates some basic payloads using metasploit-framework so You must install metasploit framework on your Termux.This tool works both rooted and non rooted devices.This is very helpfull for beginners.

Requirments:-

1. Termux App
2. metasploit-framework

Installation :


$ apt update

$ apt upgrade

$ apt install git

$ apt install python2

$ git clone https://github.com/TechnicalMujeeb/tmvenom

$ cd tmvenom

$ chmod +x *

$ sh install.sh

Usage :

$ python2 tmvenom.py
&
$ python2 tmvenom2.py

Now select payload options and you can easily generates payloads.

Uncategorized

ᴄʀᴀᴄᴋɪɴɢ ᴜsɪɴɢ ʙʀᴜᴛᴇ ғᴏʀᴄᴇ

“ᴄʀᴀᴄᴋɪɴɢ ᴜsɪɴɢ ʙʀᴜᴛᴇ ғᴏʀᴄᴇ (ᴏʀ ᴅɪᴄᴛɪᴏɴᴀʀʏ ᴀᴛᴛᴀᴄᴋ) ᴛᴀᴋᴇs ᴀ ʟᴏɴɢ ᴛɪᴍᴇ ᴀɴᴅ ᴏɴʟʏ ᴡᴏʀᴋs ᴡɪᴛʜ sɪᴍᴘʟᴇ ᴘᴀssᴡᴏʀᴅs. ɪᴛ ɪs ᴍᴜᴄʜ ʙᴇᴛᴛᴇʀ ᴛᴏ ᴄᴀʀʀʏ ᴏᴜᴛ ᴏᴛʜᴇʀ ᴍᴇᴛʜᴏᴅs sᴜᴄʜ ᴀs ᴘʜɪsɪɴɢ ʙᴇғᴏʀᴇ sᴜᴄᴄᴜᴍʙɪɴɢ ᴛᴏ ʙʀᴜᴛᴇ ғᴏʀᴄᴇ.”

ᴡʜᴀᴛ ʏᴏᴜ ᴡɪʟʟ ɴᴇᴇᴅ

ᴀɴ ᴏʙᴊᴇᴄᴛɪᴠᴇ ᴀᴄᴄᴏᴜɴᴛ ᴛᴏ ᴀᴛᴛᴀᴄᴋ

– ᴀ ᴄᴏᴍᴘᴜᴛᴇʀ ᴡɪᴛʜ ᴛʜᴇ “ᴋᴀʟɪ ʟɪɴᴜx” ᴏᴘᴇʀᴀᴛɪɴɢ sʏsᴛᴇᴍ (ᴏʀ ᴀɴʏ ᴏᴛʜᴇʀ ᴅᴇʙɪᴀɴ ᴅɪsᴛʀɪʙᴜᴛɪᴏɴ).

– ᴅᴇᴄᴇɴᴛ ɪɴᴛᴇʀɴᴇᴛ ᴄᴏɴɴᴇᴄᴛɪᴏɴ 

ɪғ ʏᴏᴜ ᴅᴇᴄɪᴅᴇ ᴛᴏ ᴜɴʙʟᴏᴄᴋ ᴛʜᴇ ᴄᴏɴᴛᴇɴᴛ ʏᴏᴜ ᴜɴᴅᴇʀsᴛᴀɴᴅ ᴘᴇʀғᴇᴄᴛʟʏ ᴛʜᴀᴛ ɪ ᴅᴏ ɴᴏᴛ ᴛᴀᴋᴇ ᴄʜᴀʀɢᴇ ᴏғ ᴛʜᴇ ᴜsᴇ ʏᴏᴜ ɢɪᴠᴇ ᴛᴏ ᴛʜᴇ ᴄᴏɴᴛᴇɴᴛ ᴏғ ᴛʜɪs ᴘᴏsᴛ ᴀɴᴅ ɪ ᴡɪʟʟ ɴᴏᴛ ʙᴇ ʀᴇsᴘᴏɴsɪʙʟᴇ ғᴏʀ ʏᴏᴜʀ ᴀᴄᴛɪᴏɴs ᴏɴᴄᴇ ʏᴏᴜ ʜᴀᴠᴇ ᴜɴʟᴏᴄᴋᴇᴅ ᴛʜᴇ ᴄᴏɴᴛᴇɴᴛ. ᴛʜᴀɴᴋs ^^

1- sᴛᴀʀᴛ “ᴋᴀʟɪ ʟɪɴᴜx” ᴀɴᴅ ɢᴏ ᴛᴏ ᴛʜᴇ ᴛᴇʀᴍɪɴᴀʟ. ᴛʜᴇɴ, ᴛʏᴘᴇ ᴛʜᴇ ɴᴇxᴛ:

> sᴜᴅᴏ sᴜ

ᴀɴᴅ ᴘᴜᴛ ᴛʜᴇ ᴀᴅᴍɪɴ ᴘᴀssᴡᴏʀᴅ ᴛᴏ ʟᴀᴜɴᴄʜ ᴛʜᴇ ᴛᴇʀᴍɪɴᴀʟ ɪɴ ʀᴏᴏᴛ ᴍᴏᴅᴇ.

2- ɴᴏᴡ ᴡᴇ ᴀʀᴇ ɢᴏɪɴɢ ᴛᴏ ᴄʟᴏɴᴇ ᴛʜᴇ ᴛᴏᴏʟs ᴛʜᴀᴛ ᴡᴇ ᴀʀᴇ ɢᴏɪɴɢ ᴛᴏ ᴜsᴇ. ᴛʏᴘᴇ:

> ᴄᴅ [ᴛʜᴇ ᴘᴀᴛʜ ᴡʜᴇʀᴇ ʏᴏᴜ ᴡᴀɴᴛ ᴛᴏ ᴅᴏ ᴛʜᴀᴛ]

> ɢɪᴛ ᴄʟᴏɴᴇ ʜᴛᴛᴘs: //ɢɪᴛʜᴜʙ. ᴄᴏᴍ/ᴇᴛʜɪᴄᴀʟ-ʜ4ᴄᴋ3ʀ/ɪɴsᴛᴀɢʀᴀᴍ      (ᴅᴇʟᴇᴛᴇ ᴛʜᴇ sᴘᴀᴄᴇs)

> ᴄᴅ ɪɴsᴛᴀɢʀᴀᴍ

3- ᴅᴏ ᴀ ʟs. ʏᴏᴜ ᴡɪʟʟ sᴇᴇ 3 ғɪʟᴇs/ᴅɪʀᴇᴄᴛᴏʀɪᴇs: “ᴄᴏʀᴇ”, “ɪɴsᴛᴀɢʀᴀᴍ.ᴘʏ” ᴀɴᴅ ᴀɴᴏᴛʜᴇʀ ғɪʟᴇ. ᴡᴇ ᴀʀᴇ ɢᴏɪɴɢ ᴛᴏ ɢɪᴠᴇ ᴘᴇʀᴍɪssɪᴏɴs ᴛᴏ ᴛʜᴇ ᴛᴏᴏʟ. ᴛʏᴘᴇ ɪɴ ᴛʜᴇ ᴛᴇʀᴍɪɴᴀʟ:

> ᴄʜᴍᴏᴅ +x ɪɴsᴛᴀɢʀᴀᴍ.ᴘʏ

4- ɴᴏᴡ ᴡᴇ ɴᴇᴇᴅ ᴛᴏ ᴄʀᴇᴀᴛᴇ ᴀ ᴡᴏʀᴅʟɪsᴛ ғᴏʀ ᴘᴀssᴡᴏʀᴅs. ɪ ᴡɪʟʟ ɴᴏᴛ ᴇxᴘʟᴀɪɴ ʜᴏᴡ ᴛᴏ ᴅᴏ ᴛʜɪs ʙᴇᴄᴀᴜsᴇ ɪᴛ ɪs ᴄᴏᴍᴍᴏɴ sᴇɴsᴇ, ʙᴜᴛ ɪғ ʏᴏᴜ ʜᴀᴠᴇ ɴᴏ ɪᴅᴇᴀ ᴡʜᴇʀᴇ ᴛᴏ sᴛᴀʀᴛ ʏᴏᴜ ᴄᴀɴ ᴅᴏᴡɴʟᴏᴀᴅ ᴛᴏᴏʟs sᴜᴄʜ ᴀs “ᴄʀᴜɴᴄʜ” ᴏʀ “ᴄᴜᴘᴘ”, ɪɴsᴛᴀʟʟ ᴛʜᴇᴍ ᴀɴᴅ ᴍᴀᴋᴇ ᴀ ᴍᴀɴ ᴏғ ᴛʜᴇsᴇ ᴘʀᴏɢʀᴀᴍs ᴛᴏ ʟᴇᴀʀɴ ʜᴏᴡ ᴛᴏ ᴜsᴇ ᴛʜᴇᴍ. ᴏɴᴄᴇ ᴡᴇ ʜᴀᴠᴇ ᴀ ғɪʟᴇ ᴡɪᴛʜ ᴛʜᴇ ʟɪsᴛ ᴏғ ᴘᴏssɪʙʟᴇ ᴘᴀssᴡᴏʀᴅs, ᴡᴇ ᴍᴏᴠᴇ ᴏɴ ᴛᴏ ᴛʜᴇ ɴᴇxᴛ sᴛᴇᴘ.

5- ɴᴏᴡ, ᴡʜᴇɴ ᴡᴇ ʜᴀᴠᴇ ᴛʜᴇ ᴡᴏʀᴅʟɪsᴛ, ᴡᴇ ᴀʀᴇ ɢᴏɪɴɢ ᴛᴏ ʟᴀᴜɴᴄʜ ᴛʜᴇ ᴛᴏᴏʟ ᴡɪᴛʜ ᴛʜᴇ ɴᴇxᴛ sʏɴᴛᴀx:

> ᴘʏᴛʜᴏɴ ɪɴsᴛᴀɢʀᴀᴍ.ᴘʏ [ᴜsᴇʀɴᴀᴍᴇ] [ᴘᴀᴛʜ ᴛᴏ ᴛʜᴇ ᴡᴏʀᴅʟɪsᴛ]

(ʀᴇᴍᴇᴍʙᴇʀ ᴛᴏ ᴅᴇʟᴇᴛᴇ ᴛʜᴇ ][ ᴡʜᴇɴ ʏᴏᴜ ʟᴀᴜɴᴄʜ ᴛʜᴇ ᴄᴏᴍᴍᴀɴᴅ)

6- ᴡᴀɪᴛ ᴜɴᴛɪʟ ᴛʜᴇ ᴘʀᴏᴄᴇss ɪs ғɪɴɪsʜᴇᴅ. ᴛʜᴇ ᴘʀᴏɢʀᴀᴍ ʙʏ ɪᴛsᴇʟғ ᴡɪʟʟ ʙᴇ ᴄʜᴇᴄᴋɪɴɢ ᴛʜᴇ ᴅɪғғᴇʀᴇɴᴛ ᴄᴏᴍʙᴏs ᴀɴᴅ ᴡɪʟʟ ᴀssɪɢɴ ᴀ ᴘʀᴏxʏ ᴀᴜᴛᴏᴍᴀᴛɪᴄᴀʟʟʏ.

7- ɪғ ᴛʜᴇ ᴘʀᴏɢʀᴀᴍ ғɪɴᴅs ᴛʜᴇ ᴘᴀssᴡᴏʀᴅ, ɪᴛ ᴡɪʟʟ ɴᴏᴛɪғʏ ʏᴏᴜ ᴀɴᴅ sʜᴏᴡ ʏᴏᴜ ɪᴛs ᴄᴏʀʀᴇsᴘᴏɴᴅɪɴɢ ᴘᴀssᴡᴏʀᴅ..