Saturday , 30 May 2020

Understanding Wireless Devices

Understanding Wireless Devices

Wireless Devices: Mobile devices, including Smartphones, e-book readers, and tablet computers, are popular. Many of these devices use either RF signaling or cellular technologies for communication. Below shows you the result of an Amazon Kindle’s Search for wireless network.   Wireless Scanning is done by a wide variety of devices, such as the Amazon Kindle.   If the device uses …

Read More »

EXTRACTING INFORMATION FROM E-MAIL SERVERS

EXTRACTING INFORMATION FROM E-MAIL SERVERS

E-Mail Servers: E-mail servers can provide a wealth of information for hackers and penetration testers. In many ways, e-mail is like revolving door to your target’s organization. Assuming your target is hosting their own e-mail server, this is often a great place to attack. It is important to remember. “You can’t block what you must let in.” In other words, …

Read More »

Using a Sniffer – Sniffer Tools

Using a Sniffer

Using a Sniffer: We touched on some of the basics of using a sniffer in the previous section, but now let’s get down and dirty. Quite a few sniffer software packages are available that perform nearly identical functions.  The real advantage of one over the other is the robustness of functionality in how the sniffer displays that data and what …

Read More »

Download Top 18 Ethical Hacking Books

Top 18 Books

Download Top 18 Most Amazing Books of Ethical Hacking: Hello, Everyone Today I am going to Share some of the Most Amazing E-Books on Ethical Hacking So, That you Guys Would Learn The Most in This year.   You Can Download All The Books or Read Them Online.   Secrets of Super and Professional Hackers Kali Linux Wireless Penetration Testing …

Read More »

Kerberos: Cracking Kerberos

Kerberos: Cracking Kerberos

Kerberos: On the Microsoft platform, version 5 of the Kerberos authentication protocol has been in use since Windows 2000. The protocol offers a robust authentication framework through the use of strong cryptographic mechanism such as symmetric key cryptography. It provides mutual authentication of client and server.   The Kerberos protocol makes use of the following groups of components: Key distribution …

Read More »

Planting a Backdoor – Using Netcat

Planting a Backdoor

Planting a Backdoor: There are many ways to plant a backdoor on a system, but let’s look at one provided via the PsTools suite. This suite includes a mixed bag of utilities designed to ease system administration. Among these tools is PsExec, which is designed to run commands interactively or noninteractively on a remote system. Initially, the tools may seem …

Read More »

DNS Spoofing – Performing DNS Spoofing

DNS Spoofing – Performing DNS Spoofing

DNS Spoofing: DNS is an important service for just about any network today. Some networks, such as those that use Active Directory, cannot even function without DNS being present in the environment. With these points in mind, we need to look at an attack, the attacking party modifies the DNS server to change the flow of traffic to go from …

Read More »

The Life and Times of a Virus

The Life and Times of a Virus

The Life and Times of the virus: Let’s explore what it meant to be a virus before we get too far along. Simply put, a virus is a self-replicating application that attaches itself to other executable programs. Many viruses affect the host as soon as they are executed; other lie in wait, dormant, until a predetermined even or time, before …

Read More »

Ways to Locate Wireless Networks

Ways to Locate Wireless Networks

Ways to Locate Wireless Networks: In order to attack, you must first find a target, and though site surveys can make this easier, they cannot help in every case. Several tools and mechanism make locating a target network easier.   The following tools can complement wardriving or be used on their own: OpenSignal is a useful app that can be …

Read More »

Countermeasures of Social Networking

Countermeasures of Social Networking

Countermeasures for Social Networking: Because social networking exploded in popularity so quickly, companies and individuals had little time to deal with the problems the technology brought to bear. Surveys taken a few years ago found that many companies either did not have policy in place regarding social networking or were unaware of the risks. Recently, however, people are slowly starting …

Read More »