Posts

Featured

Spectre & Meltdown

Image
                                     Meltdown & Spectre First Off i Wanna apologize to My Readers for my long absence, a lot of crucial things have been happening in my life for the past 4-5 months, and finally my high school is over and i'm waiting for my reports. From now on, i'll be posting blogs every two weeks or so (that'll get shorter soon). Today's blog is all about Meltdown and Spectre, these are the two security bugs that can cause chaos to almost any processor that has been manufactured till this day.  Most of the viruses tries to exploit the vulnerability in the code of a specific program they are designed to infect, this means that they can't affect programs or OSes they are not designed to affect so to a level we are almost safe. But the problem with these two are they function on a much closer to a hardware level so they can exploit almost any process...
                                                     
https://www.facebook.com/shahineyyhttps://www.instagram.com/subnet_guyhttps://twitter.com/shahineyy

Introduction To KALI Linux & A Very Easy Project For Beginners

Image
Introduction to KALI Linux In This Project I'm gonna show you how to Persistence install Kali Linux into a USB Drive & A simple way of getting the WiFi Using Fluxion This  tutorial is for Educational purposes only and should not be used for any illegal activities . IM NOT RESPONSIBLE IF YOU CAUSE ANY DAMAGE OR MISUSE IT .Don’t INTRUDE into someone's privacy. You Will Need a USB Drive (8gb Or more.) Step I: Download & Install Kali. Download & Install The Latest Version Of  KALI Download & Install The Latest Version Of Universal USB Installer Download & Install The Latest Version Of Minitool Partition Wizard Open UUI (Universal USB installer) -Select Kali Linux From The Drop Down Menu. -Select Your KALI image (kali-Linux xxxxx.img) file from the downloaded location & Then provide the Drive Location Of your desired USB drive in which You want Kali Installed & then proceed with the installation... ...

Create a Backdoor Using CryptCat

Image
Create An Undetectable Backdoor Using Cryptcat Hey There Guys In This Tutorial I'm Going To Show You How To Create An Almost Undetectable BACKDOOR using Cryptcat So Lets Get Cracking... What Is Cryptcat ? CryptCat is a simple Unix utility which reads and writes data across network connections, using TCP or UDP protocol while encrypting the data being transmitted. It is designed to be a reliable “back-end” tool that can be used directly or easily driven by other programs and scripts. At the same time, it is a feature-rich network debugging and exploration tool, since it can create almost any kind of connection you would need and has several interesting built-in capabilities. Cryptcat enables us to communicate between two systems and encrypts the communication between them with twofish , one of many excellent encryption algorithms from Bruce Schneier et al. Twofish's encryption is on par with AES encryption, making it nearly bulletproof. In this way, the IDS...

Web Form Online Password With THC-Hydra & Burp Suite

Image
Web Form Online Password With THC-Hydra & Burp Suite Hey There Guys In This Tutorial I'm Going To Show You How To get Online Password Using Hydra & Burp Suite What Is THC-Hydra? Hydra is a parallelized login cracker which supports numerous protocols to attack. It is very fast and flexible, and new modules are easy to add. This tool makes it possible for researchers and security consultants to show how easy it would be to gain unauthorized access to a system remotely. This  tutorial is for Educational purposes only and should not be used for any illegal activities . IM NOT RESPONSIBLE IF YOU CAUSE ANY DAMAGE OR MISUSE IT .Don’t INTRUDE into someone's privacy. Step 1: Open Hydra Fire up Kali and open THC-Hydra from Applications -> Kali Linux -> Password Attacks -> Online Attacks -> hydra. Step 2: Get The Form Parameters To be able to sneak into web form usernames and passwords, we need to determine the parameters of...

How To Know The Wi-Fi Password. Using Wifiphisher

Image
Know The Wi-Fi Password. Using Wifiphisher In My First Tutorial I'm Going To Show You, How to Hack WiFi using wifiphisher. WiFiphisher is fast attack and reveals password without Taking Much of Your time. Wifiphisher Uses NO dictionaries, or brute force .  let’s get started... What Is Wifiphisher? Wifiphisher is a security tool that mounts automated phishing attacks against WiFi networks in order to obtain secret passphrases or other credentials. It is a social engineering attack that unlike other methods it does not include any brute forcing. It is an easy way for obtaining credentials from captive portals and third party login pages or WPA/WPA2 secret passphrases. How It Works... WiFiphisher creates an evil twin AP, then DoS's all User Data from AP and when users re-authenticate, they are redirected to fake AP with the same SSID. After connecting with fake AP, they will see a legitimate looking webpage that requests their password to “Upgrade fir...

Popular posts from this blog

How To Know The Wi-Fi Password. Using Wifiphisher

Spectre & Meltdown

KRACK Attacks What is it ?