Skip to main content

Posts

what is reconnaissance in hacking

  The process of collecting information about an intended target of a malicious hack by probing the target system. Active reconnaissance typically involves port scanning in order to find weaknesses in the target system (i.e., which ports are left vulnerable and/or if there are ways around the firewall and routers). What is footprinting and reconnaissance?     Footprinting (also known as reconnaissance ) is the technique used for gathering information about computer systems and the entities they belong to. To get this information, a hacker might use various tools and technologies. This information is very useful to a hacker who is trying to crack a whole system. What is passive reconnaissance?     Passive reconnaissance is an attempt to gain information about targeted computers and networks without actively engaging with the systems. In active reconnaissance , in contrast, the attacker engages with the target sys...

Difference Between Procedure Oriented Programming (POP) & Object Oriented Programming (OOP)

Difference Between Procedure Oriented Programming (POP) & Object Oriented Programming (OOP) Procedure Oriented Programming Object Oriented Programming Divided Into In POP, program is divided into small parts called functions . In OOP, program is divided into parts called objects . Importance In POP,Importance is not given to data but to functions as well as sequence of actions to be done. In OOP, Importance is given to the data rather than procedures or functions because it works as a real world . Approach POP follows Top Down approach . OOP follows Bottom Up approach . Access Specifiers POP does not have any access specifier. OOP has access specifiers named Public, Private, Protected, etc. Data Moving In POP, Data can move freely from function to function in the system. In OOP, objects can move and communicate with each other through member functions. Expansion To add new data and function in POP is not so easy. OOP provides an easy wa...

Difference Between Interpreter and Compiler

Interpreter Vs Compiler : Difference Between Interpreter and Compiler We generally write a computer program using a high-level language. A high-level language is one which is understandable by us humans. It contains words and phrases from the English (or other) language. But a computer does not understand high-level language. It only understands program written in 0's and 1's in binary, called the machine code. A program written in high-level language is called a source code. We need to convert the source code into machine code and this is accomplished my compilers and interpreters. Hence, a compiler or an interpreter is a program that converts program written in high-level language into machine code understood by the computer. The difference between an interpreter and a compiler is given below: Interpreter Compiler Translates program one statement at a time. Scans the entire program and translates it as a whole into machine code. ...

PYTHON - today day script

script that tell you today day !!!!!!!! import datetime a = datetime.datetime.today().weekday() if a == 0:     print("It's Monday.") elif a == 1:     print("It's Tuesday.") elif a == 2:     print("It's Wednesday.") elif a == 3:     print("It's Thursday.") elif a ==4:     print("It's Friday.") elif a == 5:     print("It's Saturday.") elif a == 6:     print("It's Sunday.")    

PYTHON - password Generator script

 python script project --- password Generator import string from random import * letters = string.ascii_letters  digits = string.digits  symbols = string.punctuation chars = letters + digits + symbols min_length = 8 max_length = 16 password = "".join(choice(chars) for x in range(randint(min_length, max_length))) print(password)

How To Install Python 3 and Set Up a Local Programming Environment on Windows 10

Introduction Python is a versatile programming language that can be used for many different programming projects. First published in 1991 with a name inspired by the British comedy group Monty Python, the development team wanted to make Python a language that was fun to use. Easy to set up, and written in a relatively straightforward style with immediate feedback on errors, Python is a great choice for beginners and experienced developers alike. Python 3 is the most current version of the language and is considered to be the future of Python. This tutorial will guide you through installing Python 3 on your local Windows 10 machine and setting up a programming environment via the command line. Prerequisites You will need a Windows 10 computer with administrative access that is connected to the internet. Step 1 — Opening and Configuring PowerShell We’ll be completing most of our installation and setup on a command-line interface, which is a non-graphical way to i...

how to copy all post of victim blogger

Hack a blogspot website This simple tutorial will help to teach to how to hack a blogger website this tutorial is exclusively provided by the author of the thexfirebug. This is a awesome tutorial is help you to hack a blogger website. The information is provided in the site is only for educational purpose only.Implement this information in your own risk, thexfirebug.blogspot.in is not take responsibility of this information. So here it is..... First you go to the blog that you want to hack like anyblog.blogspot.com Now here we are using google loop hlo to hack the blogger website. What we are using ,actually if you know blogger provide atom feed facility by using this facility only we're going to hack blogger website. Now we,re inject javascript to "anyblog.blogspot.com". LIKE anyblog.blogspot.com/atom.xml?redirect=false&start-index=1&max-results=500 A atom.xml(xml file)  file will download or a bunch of text will load in the browser If text l...

How To Identify a Blogspot Template a Blogger is Using

Blogger platform is one of the easiest ways to open a blog. It is one of the best blog platform for newbie bloggers. With the free host from google and the only requirement which is having a domain that you will use to map to blogspot sub domain.  Choosing a perfect niche would make you successful in blogging but without the right blogger template, your post won’t be easily indexed by search engines. Search engine optimization blog are indexed faster than the non-seo blogs so getting a good seo and responsive blogger template is needed for all bloggers. You might have visited various blog hosted in blogger.com and be wondering how elegant and responsive the blogger template looks. But the main problem you have is knowing the name of the blog website template.  There are lots of blogger templates, free and premium. Free blogger templates mostly comes with a footer link of the blog designer while premium template doesn’t. Most top blogger, remove or hide the f...

How to reset Windows password with Kali Linux

How to reset Windows password with Kali Linux Download Kali Linux  and burn the ISO to a CD/DVD. Boot Windows machine with the LiveCD . On the boot menu of Kali Linux, select Live (forensic mode) . Kali Linux initialize and when it loads, it will open a terminal window and navigate to the Windows password database file. Almost all versions of windows password is saved in SAM file. This file is usually located under /Windows/System32/config . On your system it may look something like this: /media/hda1 /Windows/System32/config . Below is the screenshot. The SAM database is usually in the /media/name_of_hard_drive/Windows/System32/config The screen shot below lists the SAM database file on my hard drive. The screen shot below lists the SAM database file on my hard drive. Type command chntpw -l SAM  and it will list out all the usernames that are contained on the Windows system. The command gives us a list of usernames on the system. When ...

HOW TO INSTALL STEAM ON KALI LINUX

HOW TO INSTALL STEAM ON KALI LINUX apt-get update apt-get upgrade apt-get install gdebi apt-get install gdebi  realpath wget  https://github.com/GhostSquad57/Steam-Installer-for-Wheezy/archive/master.zip unzip Steam-Installer-for-Wheezy-master.zip cd  Steam-Installer-for-Wheezy-master /   gdebi steam-debian_1.0.0.49-7_all.deb if gdebi does not work than use this command    dpkg -i "path where the pakge is store" ex - dpkg -i " steam-debian_1.0.0.49-7_all.deb" done ..... If you have some error talk a bout the root permission do that: found this in /usr/bin/steam Commented this lines and try again: (just find these line and add this sign "#" like i have added down # Don't allow running as root #if [ "$(id -u)" == "0" ]; then # show_message --error $"Cannot run as root user" # exit 1 #fi If you have some issus about libGL.so.1 is missing or not found,  i res...

how to install/Run PlayOnLinux as root on Kali Linux

PlayOnLinux is a Linux application that is based on Wine, which let’s you install Microsoft Windows programs on Linux. It runs on Bash and Python and is free to download and install. The initial install of PlayOnLinux is easy since it can be found in the repository, but you’ll have to do some tweaking if you want to run it as a root user, like on Kali Linux as example. Installing PlayOnLinux To get PlayOnLinux installed on an Ubuntu-based distro like Kali, you can try installing it using the default repositories by running: apt - get install playonlinux apt-get install wine To avoid some errors later on, I would also suggest running the following commands to get the 32-bit version of Wine installed: apt - get install wine : i386 wine -- version apt - get install wine32 Run PlayOnLinux as root If you’re running Kali Linux (or any other distro) as root, you’ll run into a message saying “PlayOnLinux is not supposed to be run as root. Sorry”. To get aro...

kodi: how to install fusion repo on kali linux (PART - 2)

kali linux : first install kodi than follow these steps  steps to install kodi in kali linux given here :- how to install kodi in kali linux    How to Install Fusion Kodi (Jarvis & Krypton) Here is a guide for installing Fusion for Kodi. With Fusion installed you will have access to a wide range of repos from which you can install all the add-ons you need. To Install Fusion on Kodi: Open Kodi Select SYSTEM > File Manager Select Add Source Select None Type the following EXACTLY http://fusion.tvaddons.ag and select Done Highlight the box underneath Enter a name for this media Source & type fusion Select OK Basically that is all you need to do to get Fusion on your device. To use Fusion and install repos from it you need to do the following: Go back to your Home Screen Select SYSTEM Select Add-Ons Select Install from zip file Select fusion Select kodi-repos Select english/international/adult From here you can now c...

KODI - how to install kodi in kali linux / debian (PART-1)

What's Kodi? Kodi is a free, open-source media player. Kodi started off on the Xbox, where it was known as Xbox Media Center (or XBMC), but that feels a long time ago: the software is now available on a huge range of platforms and in more than 65 languages, and incorporates the work of hundreds of programmers. And it's now known as Kodi, of course - the name change happened in 2014. What does Kodi do? It plays digital media. TV (live and recorded), films, other video, music, podcasts, photos, slideshows. That sort of thing.( you can watch free latest  movie , tv , game etc etc..yaa kodi is everything lol.... Sounds fairly standard. Well, yes, but Kodi is designed to act as a media centre - the original idea was to install it on a PC that's connected to a big-screen TV - and has specific features for that role. Such as a '10-foot user interface', designed to be legible on a TV when sitting on a sofa, and compatibility with remote control hardware ...

steps to increase cracking speed in kali linux / debian / ubuntu /linux

 steps to increase cracking speed   if you have nvida graphic card than install driver to high speed your cracking  steps given here :- https://devilzlinux.blogspot.com/2017/03/prerequisites-first-youll-need-to.html Attack modes (speed increased in these attack) Brute-Force attack Combinator attack Dictionary attack Hybrid attack Mask attack Rule-based attack Toggle-Case attack   hashcat -b root@kali:~# hashcat -b OpenCL Platform #1: NVIDIA Corporation ====================================== * Device #1: Geforce GTX 970, 1009/4095 MB allocatable, 13MCU Hashtype: MD5 Speed.Dev.# 1 .....: 10443.1 MH / s Hashtype: SHA1 Speed.Dev.# 1 .....: 3349.8 MH / s Hashtype: SHA256 Speed.Dev.# 1 .....: 1321.8 MH / s There are a multitude of configurations to improve cracking speed, not  mentioned in this guide. However, we encourage you to take a look  at the hashcat documentation for you...

how to Install NVIDIA Drivers on Kali Linux (gtx. gt, nvida etc)

 how to Install gtx NVIDIA Drivers on Kali Linux   Prerequisites First, you’ll need to ensure that your system is fully upgraded and that your card supports CUDA . Note: GPUs with a CUDA compute capability > 5.0 are recommended, but GPUs with less will still work. apt update && apt dist-upgrade -y && reboot note - don't skip this command and please reboot . if u didnt reboot than your pc will stuck and there is no fix after that   Let’s determine the exact GPU installed, and check the kernel modules it’s using. root@kali:~# lspci -v 01: 00.0 VGA compatible controller: NVIDIA Corporation GM204 [ GeForce GTX 970 ] ( rev a1 ) ( prog-if 00 [ VGA controller ] )     Subsystem: ZOTAC International ( MCO ) Ltd. GM204 [ GeForce GTX 970 ]     Region 1 : Memory at e0000000 ( 64 -bit, prefetchable ) [ size =256M ]     Capabilities: [ 60 ] Power Management version 3     Capabiliti...

TorGhost - How to become anonymous online By Change IP on Kali Linux 2016.2 (Anonymouse Browsing) ✔

TorGhost - How to become anonymous online By Change IP on Kali Linux 2016.2 (Anonymouse Browsing) ✔ TorGhost – channel all traffic through tor network in kali linux       Tor is one of the best freely available network to protect your identity. Its considered safe because of its highly cryptographic data transfer methods.you can switch between exit nodes every 10 seconds manually with this script  TorGhost  for your ease. Two main features of TorGhost 1. Routes all traffic TorGhost can route all the network traffic through tor network i.e. every single application that tries to connect internet will go through tor network. No single ping will be leaked out, thus protecting your identity. Normally most of us use proxychain or similar application to route the traffic for a specific app. The problem is some application tends ignore proxy for much faster connection which can leak out sensitive information thus r...

how to install tor in kali linux 2016.2

TOR stands for The Onion Router.it allows us to surf internet anonymously.it protects your privacy on internet.  watch video for steps to install tor in linux   Tor Browser protects your privacy on internet by moving your traffic across different Tor servers . Disclaimer – Our tutorials are designed to aid aspiring pen testers/security enthusiasts in learning new skills, we only recommend that you test this tutorial on a system that belongs to YOU. We do not accept responsibility for anyone who thinks it’s a good idea to try to use this to attempt to hack systems that do not belong to you Why We need TOr Browser The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. It prevents somebody watching your Internet connection from learning what sites you visit. it prevents the sites you visit from learning your physical location, and it lets you access sites which are block...