Thursday 29 November 2018

Hackers Could be Thwarted by New 'deception consistency' Method

Computer hackers could be thwarted by new 'deception consistency' method.
Researchers working to make it harder for attackers to know when a system begins to detect and deceive a bad actor.

    Can you deceive a deceiver? That's the question that computer scientists have recently been exploring. That's the question that computer scientists at Binghamton University, State University of New York have recently been exploring. The researchers are looking at how to make cyber deception a more effective tool against malicious hackers.

Assistant Professor of Comp

Publicizing Security Levels May Strengthen Security

Cyber attacks grow in prominence each and every day; in fact, 2017 was the worst year to-date for data breaches, with the number of cyber incidents targeting businesses nearly doubling from 2016 to 2017.

In a research done by University of British Columbia - Sauder School of Business like a month or two ago, it was found out that according to their study, publicizing a firm's security levels may strengthen security over time. The research quantified the security levels of more than 1,200 Pan-Asian companies in order to determine whether increased awareness of one's security levels leads to improved defense levels against cybercrime.

Restoring Sublime Text Editor by Downgrading

Kali Linux as we know does come with wonderful built-in text editors such as leafpad, vim and nano (my favorite) e.t.c. However, i have a particular obsessive compulsion to use sublime text especially in web development using languages such as HTML (i don't like considering it a language), css, php and javascript.

You can download Sublime-Text into your Kali Linux, by executing:
        apt install sublime-text

That is after running apt update first.

How Hackers Are Using GPUs

GPU stands for "Graphics Processing Unit". It's a single-chip processor designed to handle graphics operations. It's primarily used to manage and boost the performance of video and graphics by use of features designed to lessen the work of the CPU and produce faster video and graphics. A GPU is not only used in a PC on a video card or motherboard; it is also used in mobile phones, display adapters, workstations and game consoles.

Web browsers use GPUs to render graphics on desktops, laptops, and smart phones. GPUs are also used to accelerate applications on the cloud and data centers. GPUs are usually programmed

Monday 26 November 2018

Fixing Operating System Boot Problems


We all at one time experience booting up issues with our computers.
Your computer may fail to boot an operating system when you perform on of the following actions:
    • Delete a Partition
    • Move a Partition
    • Install another operating system and overwrite the Master Boot Record

Luckily, we can always solve boot up failure. If your computer does not use GRUB then you are advised to consult documentation for your boot loader to learn how to fix the problem. In this article I'll deal with the case of a computer that uses a GRUB boot loader.

Wednesday 21 November 2018

Kali Linux 2018.4 Release Comes With New Tools and Tool Upgrades

We now already have the fourth and final release of Kali Linux 2018, the Kali Linux 2018.4. You can download it here. This release has brought us up to kernel version 4.18.0. It has numerous bug fixes and package updates. 

On a personal level, i remember release 2018.2, or was it 2018.3, the terminal was just dark with no control for opaqueness but the new 2018.4 comes with opaqueness control of the terminal.
I love a translucent terminal.

Monday 19 November 2018

How To Hack Wifi Networks To Get Passwords

WPA/WPA2 Attack Using Aircrack, with data capture


In this attack, we will capture data wirelessly when someone logs into the router and use a wordlist to throw the data captured until the password is found.
 

We beginning our operation by setting the adapter into monitor mode:
        airmon-ng start wlan0

If you wish to see any Routers or APs and devices, execute the command:
        airodump-ng --uptime --manufacturer -a wlan0mon
 
where:  
  • uptime shows how long the devices have been on.
  • manufacturer tells you the manufacturer of displayed device.
  • -a will ignore any "not associated" clients e.g. ones using mobile data or having no password to the routers but are attempting to connect. If you wish to see such devices/clients just omit the -a.

Beginning Wireless Penetration Testing


When beginning wifi pentesting, to prevent the pentest from getting into trouble with existing utilities such as network-manager and wpa_supplicant, check and kill all processes using the command:
        airmon-ng check kill

You can also stop their services and their processes manually e.g. using the command: 

service network-manager stop for network-manager and the kill <pid> command for wpa_supplicant.
i.e. search for their process by executing the command:
        ps aux | grep wpa_supplicant
        ps aux | grep NetworkManager

Saturday 17 November 2018

How To Fix A System Freeze In Kali Linux

A system freeze is a common problem in most operating systems. We all experience it along the way and we sometimes do know what caused it and even how to solve it e.g. when i run so many resource draining processes or applications on my system than it can handle.

There may occur a system freeze that causes a window or an application to freeze while it was still running. Many will have observed this commonly in Microsoft Windows where an application tells you "Not Responding". In Windows you can either decide to wait for it to respond - can take forever sometimes - or you decide to open the task manager and forcibly make its processes to end by clicking on the End Task button.

Friday 16 November 2018

Resetting Kali Linux Root Password

Kali Linux Change Root Password From The Grub Boot Loader


I have come across several cases in which people actually forget their login passwords. It can be very frustrating if that was the login password to your root account on a Linux system. But luckily there is a way of changing the login password. If you are using Virtual Machine, VMWare Virtual Box and ARM images, then 'toor' is usually the default password for Kali Linux.

It should come to your attention that the possibility of changing your root password when not logged in, comes both as a hacking opportunity,loophole of sorts, as well as a security issue.

Staying Anonymous On The Internet: The How To

Hello, everyone. As i said i would, here are a few ways in detail on how to maintain anonymity while on the internet.

As hackers, we want to be anonymous and hard to detect while doing our work. We therefore employ the help of several tools and procedures to help hide our identities.


USING TOR

In parrot the tor service comes installed in the system, but not so in Kali Linux. You can easily install it in your Linux distro by typing on the terminal:   
    apt install tor -y
To start using the tor service to route your traffic through a tor network, type:
    service tor start
You can check the status of the tor service by typing:
    service tor status

Also download the Tor Browser from the Tor website and make use of it.

It's advisable and recommended that you torrent and tor while on a non-root account if only to play it safe. However if you do insist on using tor on a root account (don't torrent

How To Maintain Anonymity On The Internet

Staying Anonymous


Ways and methods to maintain anonymity on the internet or any other network:

1. Using Anonsurf.
         Starting an anonsurf service on your computer. You just have to download anonsurf on your Linux system and you're ready to go.

2. Using proxychains.
         Routing your traffic through one or several proxychain(s) (though practically, you'll find it faster and convenient to use one workable proxychain)

3. Using Tor.
        Tor(The Onion Router). Using Tor browser and services, will not only make your traffic anonymous but also heavily encrypts it however much it comes as a trade off for speed.

3. Using a paid/premium VPN or even a free VPN.

Attacking Windows Using Viruses Built In C/C++

It can be quite awesome and a lot of fun building programs which can cause nuisance to a computer user, viruses or other type of malware in this case.
For windows users it can be quite a nuisance, believe me. So i decided to create a few not very nefarious and damaging viruses in C and C++ as well to deploy to a few of my friends just for the fun of it.

And Oh, there are comments to understand the code.

System Shutdown Virus(C++)

Running the following code on a windows computer causes it to shutdown, as it follows the "shutdown -s" command.


//calling the pre-processor directives
#include<stdio.h>
#include<dir.h>
#include<dos.h>
#include<fcntl.h>
#include<conio.h>
#include<cstdlib>


IP Address Generator Code

It was during one of my own personal Sherlock Holmes like cocaine frenzy moments where i crave for work, work and work (oh!, and i think i forget to mention that i use Kali Linux in practically all my work, unless it's gaming) and where the lines between reality and imagination blurs and fades into oblivion. I think i was fatigued from the many days i sometimes go with without ever sleeping a wink for i don't consider the following work exactly imaginatively impressive.
But i did it anyway.
Initially the problem was making a c++ program that could generate and display all the possible IP addresses available starting from 0.0.0.0 to 255.255.255.255. The task later evolved into comparing how that could be achieved in c++ code and in python code. Then there's comparing which one is faster at executing the task.


The Code

Well, below is  the c++ code;

#include <iostream>
#include <ctime>

using namespace std;

const int MIN = 255
const int MAX = MIN + 1;
int a,b,c,d;

The Zen Of Hacking

Originally term hacker meant someone who did the impossible with very
little resources and much skill. The basic definition is “someone who makes fine
furniture with an axe”. Hackers were the people who knew the computer inside
and out and who could perform cool, clever, and impossible feats with their
computers. Now days the term has been corrupted to mean someone who
breaks into computers, but in this book we use hacker in its original honorable
form.
My first introduction to true hackers was when I joined the Midnight
Computer Club when I went to college. This wasn't an official club, just a group
of people who hung out in the PDP-8 lab after midnight to program and discuss
computers.
I remember one fellow who had taken $10 of parts from Radio Shack and
created a little black box which he could use with an oscilloscope to align
DEC Tape drives. DEC at the time needed a $35,000 custom built machine to do
the same thing.
There were also some people there who enjoyed programming the PDP-8 to
play music. This was kind of

Hacking Windows Login

How To Hack Windows Login Password Using Chntpw


Obstacle
Unable to login to windows password protected admin account
 
Objective
Login to windows password protected admin account 

Solution(s)
  I. Make myself an admin
  II. Clear admin account's password
  III. Obtain admin account's password


Tool To Use
Chntpw

Let's Talk Anonymity: A Short Treatise On Anonymity

The internet takes a very serious position in our everyday lives. We do a lot of activities over the web, some of which we would like our ...