Posts

Featured

Spectre & Meltdown

Image
                                     Meltdown & Spectre First Off i Wanna apologize to My Readers for my long absence, a lot of crucial things have been happening in my life for the past 4-5 months, and finally my high school is over and i'm waiting for my reports. From now on, i'll be posting blogs every two weeks or so (that'll get shorter soon). Today's blog is all about Meltdown and Spectre, these are the two security bugs that can cause chaos to almost any processor that has been manufactured till this day.  Most of the viruses tries to exploit the vulnerability in the code of a specific program they are designed to infect, this means that they can't affect programs or OSes they are not designed to affect so to a level we are almost safe. But the problem with these two are they function on a much closer to a hardware level so they can exploit almost any process...
                                                     
https://www.facebook.com/shahineyyhttps://www.instagram.com/subnet_guyhttps://twitter.com/shahineyy

KRACK Attacks What is it ?

Image
K ey  R einstallation  A tt ack  Breaking WPA2 by Forcing Nonce Reuse Hey there READERS! Instead of How-to Post, today I'm Gonna be Posting About a Vulnerability Which Has Recently Been Discovered by Mathy Vanhoef Mathy Vanhoef, a postdoctoral computer researcher said:  We have discovered serious weaknesses in WPA2, a protocol that secures all modern protected WI-FI Networks. An attacker within the range of a victim can exploit these weaknesses using Key Re-installation Attacks (KRACKs) As you might have heard or read About WPA2 (Wireless Protected Access II) the most common wireless protocol that you’ll find in use on networks such as home, public cafes, etc. Researchers have Found a serious flaw in the protocol which allows hackers within the range of the network decrypt password and access internet traffic. It can allow attackers to steal information such as credit cards, passwords, chat messages, email, photos, etc. An...

Introduction To KALI Linux & A Very Easy Project For Beginners

Image
Introduction to KALI Linux In This Project I'm gonna show you how to Persistence install Kali Linux into a USB Drive & A simple way of getting the WiFi Using Fluxion This  tutorial is for Educational purposes only and should not be used for any illegal activities . IM NOT RESPONSIBLE IF YOU CAUSE ANY DAMAGE OR MISUSE IT .Don’t INTRUDE into someone's privacy. You Will Need a USB Drive (8gb Or more.) Step I: Download & Install Kali. Download & Install The Latest Version Of  KALI Download & Install The Latest Version Of Universal USB Installer Download & Install The Latest Version Of Minitool Partition Wizard Open UUI (Universal USB installer) -Select Kali Linux From The Drop Down Menu. -Select Your KALI image (kali-Linux xxxxx.img) file from the downloaded location & Then provide the Drive Location Of your desired USB drive in which You want Kali Installed & then proceed with the installation... ...

Create a Backdoor Using CryptCat

Image
Create An Undetectable Backdoor Using Cryptcat Hey There Guys In This Tutorial I'm Going To Show You How To Create An Almost Undetectable BACKDOOR using Cryptcat So Lets Get Cracking... What Is Cryptcat ? CryptCat is a simple Unix utility which reads and writes data across network connections, using TCP or UDP protocol while encrypting the data being transmitted. It is designed to be a reliable “back-end” tool that can be used directly or easily driven by other programs and scripts. At the same time, it is a feature-rich network debugging and exploration tool, since it can create almost any kind of connection you would need and has several interesting built-in capabilities. Cryptcat enables us to communicate between two systems and encrypts the communication between them with twofish , one of many excellent encryption algorithms from Bruce Schneier et al. Twofish's encryption is on par with AES encryption, making it nearly bulletproof. In this way, the IDS...

Web Form Online Password With THC-Hydra & Burp Suite

Image
Web Form Online Password With THC-Hydra & Burp Suite Hey There Guys In This Tutorial I'm Going To Show You How To get Online Password Using Hydra & Burp Suite What Is THC-Hydra? Hydra is a parallelized login cracker which supports numerous protocols to attack. It is very fast and flexible, and new modules are easy to add. This tool makes it possible for researchers and security consultants to show how easy it would be to gain unauthorized access to a system remotely. This  tutorial is for Educational purposes only and should not be used for any illegal activities . IM NOT RESPONSIBLE IF YOU CAUSE ANY DAMAGE OR MISUSE IT .Don’t INTRUDE into someone's privacy. Step 1: Open Hydra Fire up Kali and open THC-Hydra from Applications -> Kali Linux -> Password Attacks -> Online Attacks -> hydra. Step 2: Get The Form Parameters To be able to sneak into web form usernames and passwords, we need to determine the parameters of...

Popular posts from this blog

How To Know The Wi-Fi Password. Using Wifiphisher

Spectre & Meltdown

KRACK Attacks What is it ?