Skip to main content

Posts

Showing posts from October, 2016

How tor works

 Using the publicly available data, data visualization software firm Uncharted has prepared TorFlow — a map for visualizing how TOR’s data looks as it flows all across the world. It shows TOR network’s node and data movements based on the IP addresses of relays bouncing around the connections of users to avoid spying. TOR is the world’s most widely used tool for anonymity purposes . It has grown into a powerful network that’s spread all over the world. Surprisingly, the TOR project is transparent about the location of the TOR nodes and thousands of machines that power the network. This non-profit organization frequently published an updated list about the bandwidth and location of the computers and data centers spread all across the world. Using the same public data,  TorFlow  maps the TOR network’s nodes and data flow all around the world. This data movement is measured based on the IP addresses and bandwidth of the relay computers bouncing around the connections of users to avoi

How to hack IO devices in less than 5 minutes

The world we live in, everything that surrounds us is now vulnerable to hackers. From your microwave to security cameras in your office, all of these can be hacked and used to do malicious things you can’t imagine. As of now, we have 6.4 billion IoT devices and that number will reach 20 billion by the year 2020. This is the reason why security researchers are urging us to take security of IoT devices seriously, and my friend, they are soo right. Of Course they are people who will say that it is already late as they consider the huge and massive DDoS attacks which have attacked KrebsOnSecurity, OVH, and just recently Dyn. All of these attacks used botnets of unsecured IoT devices. But hey, hijacking IoT devices for DDoSing is only one of many ways attackers are going to use the affected IoT devices. Are IoT Devices the Weak Spots of Enterprise networks ? IoT devices are not just the points of attacks, they are the entry points hackers use to further attack the enterprise or even s

Remove virus from android

Desktops aren’t the only gadgets that can be affected by a virus. Android devices have a malware problem and it’s growing every day. If you do get a virus, you could perform a factory reset to get rid of it, but that means you’d lose all your data — those photos you shot, the saved games, the text messages, and everything else. Obviously, you want a factory reset to be your last option. So what can you do to remove a virus from Android without a factory reset? Is It Really a Virus? If your phone isn’t functioning the way it should be, there’s a chance you have some malware on it. One wrong tap somewhere and a malicious file might have been downloaded on your phone, which is leeching battery life, Internet resources, or your personal data. But it could be something else. Suppose your Android refuses to boot or crashes every time it starts up. Or maybe you can’t seem to download apps from the Play Store. These are not necessarily caused by a virus. So don’t panic! First, check our

Which devices will get Android N upgrade the complete list

  As the Android 7.0 Nougat is here, people are searching the web to know when their phone will get Nougat update. To answer your question, we have prepared a list of the popular brands, telling you about their plans to roll out the Android 7.0 Nougat update. While brands like Moto, Nexus, HTC, and LG are preparing for any early OTA update, other are likely to do the same in January-February 2017. Every year we witness the release of a brand new version of Google’s Android operating system. While last year’s update was named Android 6.0 Marshmallow, this year we’ve got  Android 7.0 Nougat . Android Nougat is being termed as a major rollout, packing a heavy chunk of  new features and improvements . Coming loaded with new features like multitasking, VR, keyboard themes, and new emojis, Android 7.0 Nougat is arriving soon to Android devices. Keeping these great features aside, another important question is — “When will my phone get Android 7.0 Nougat update?” If we take a look at t

Scientists have discovered a way to upload knowledge to your brain

Scientists have discovered that feeding knowledge directly into the brain could be as easy as going to sleep. This was made possible at HRL laboratories based in California where researchers claimed a 33 percent improved learning. It seems, soon the Matrix-movie like realities could be a possibility. Imitating the same efforts at HRL Laboratories, based in California, researchers are finding out a way to upload information to the brain. They are also successful on a much smaller scale than seen in the movies. Researchers working on this claim to have developed a simulator which can feed information directly into a person’s brain. Once the information is fed, that can be used to teach a person new skills in a shorter amount of time. We have already seen in the Matrix movie that the protagonist Neo is able to learn kung fu in seconds after the martial art is ‘uploaded’ straight to his brain. The study was first conducted on a trained pilot. Electric signals were fed into the brain of

Have you logged out of your friend devices here is how to find out

May be you logged into your Facebook account in your friend’s computer and you are not sure if you have logged out. Or you are worried if someone else has your password and access to your account. Thankfully, Fb tracks all your log-in’s,  where you are logged in from and when you did. So you can see every device logged into your account, and end any sessions you don’t want active. Facebook provides data on the location, the device or browser used, and the last accessed date or time for every active login session. If you see any unfamiliar devices or locations, you can end those sessions from your current one. To find out where your account is currently logged in, open a web browser, log into Facebook, and go to the  Facebook account settings page . Then, click “Security” on the left side of the browser window.  On the Security Settings page, click on the “Where You’re Logged In” section. There’s an “Edit” link, but you can click on any part of the section to view and edit it. 

DDOS attack

DDoS attack is one of the favorite tools used by hackers to disrupt an online service. Here, we are going to tell you more about the attack using an easy-to-understand infographic. Most of us are aware of the fact that DDoS attack- Distributed Denial of Service- is one of the most common attacks faced- and the recent times have seen a tremendous growth in such attacks. Recently, the New York Magazine’s website was down due to an alleged DDoS attack for more than 12 hours. For those who are new to this term, in simple works, a DDoS attack is an attempt to make an online service/website unavailable by flooding it with tons of traffic from different sources. DDoS attack is one of the favorite tools used by hacktivists and other online groups to fulfill their motives by hiding behind a storm of HTTP request. The attacker makes a network of infected systems (botnets) by spreading malicious emails and software. After being infected, these systems could be controlled remotely and thus used

Drac os advanced penetrating and lightning fast

Dracos Linux  ( www.dracos-linux.org ) is the Linux  open source operating system and built based on the Linux From Scratch under the protection of the GNU General Public License v3.0. This operating system is one variant of Linux distributions, which is used to perform security testing (penetration testing).  Dracos linux  in Arm by hundreds hydraulic pentest, forensics and reverse engineering. Does not use a GUI-based tools-tools and just have the software using the CLI (command line interface) to perform its operations. Now Dracos currently already up to version 2.0 with the code name “ Leak “. Note:  Dracos Linux is purposed as an educational,especially to recognize the operation system of linux and we respect ethical hacking.

Guide to become ethical hacker

I often get a number of people ask for guidance  about how they can become an ethical hacker. I also receive even more requests about how to become a black hat hacker. The latter requests are ignored. below is a definition of an ethical hacker Ethical hacker A person who hacks into a computer network in order to test or evaluate its security, rather than with malicious or criminal intent. So if you want to be an ethical hacker the truth is there is no easy method to become a skilled hacker ……  it’s easy to be a script kiddie and load up Armitage or Fast-track and fire every exploit known to man at a target. But what’s the point at firing Linux exploits at a Windows box!.   You need essential prerequisite knowledge If you want to get into the IT  security world as a white hat you must be competent in the following areas: Networking Programming Databases systems (Linux and Windows) Once you have a fairly good knowledge of the above points THEN it would a good idea to learn about

Build your own camera DIY

Here is how it’s possible to build your own DIY home alarm and surveillance system from a Raspberry Pi – PrivateEyePi is an open source, configurable, automated home alarm system which you can build and code yourself. Its creator documented the whole system extensively and provides parts lists and pricing; wiring schematics; and all the code you’ll need. You can use motion detectors, or switches attached to doors, or a mixture of the two. There are instructions on adding cameras to the setup, and you can even add a temperature gauge to check on whether your central heating’s working when you’re away. You’ll be able to monitor everything via your computer or smart phone. You can install PrivateEyePi from  here   DIY home alarm and surveillance system   It is also possible to add home surveillance to the project by using a third party application called “motion” to operate the webcam. Motion is great because: ·it is free ·easy to setup ·requires a small amount of CPU processing

How to host your website on linux

Today I am going to show you on “ How to host your website on Linux VPS (WordPress) .” The reason why we are going to host your website on Linux VPS  is because they have more stability and reliability for basic web hosting needs, more control compared to shared hosting, cost effective solutions for small website, assured 99.95% uptime (depends upon your VPS providers) and lot of features. Buying a VPS from RamNode: We need to choose a Linux VPS depending upon the traffic your website gonna receive. Here is the  link where I brought my VPS from: Income Traffic 0-750 views/day: Plan 1Income Traffic 750-2k views/day: Plan 2Income Traffic 2k-5k views/day: Plan 3Income Traffic 5k+ views/day: I request you to switch VPS provider since I don’t recommend RamNode VPS for more than 5k views/day, reason is they only provide 1GB connection speed.  After few minutes you will receive the VPS details.  After buying a VPS continue the steps given below. If you have any doubts do not hesita

Use google in linux

 Short Bytes:  Googler allows you to use Google search in the Linux command line. This Linux command line utility can be used as a standalone tool or in combination with a text-based web browser. Developed using Python, Googler can be found on its developer’s GitHub repository. For Linux users, most of their daily activities revolve around the command line from  listing contents of a directory , changing  file permissions , installing packages, etc. How about using the internet? Well, there are text-based web browsers for Linux command line in existence. But what’s the first thing we open using these web browsers, it’s Google. So, what if we could open Google directly without using the command line text-based web browser. Googler can make this happen. we stumbled upon this awesome utility which allows Google Search in the command line. The Googler command line utility, initially intended for Servers running GUI-less Linux distros, allows you to search Google and open the results us

Crash linux with command that is possible to tweet

Linux is supposed to the most secure operating system in the world with very few flaws but a security researcher has discovered that a single command line is enough to crash the popular Systemd feature in Linux. System administrator  Andrew Ayer  has discovered a potentially critical bug in systemd which can bring a vulnerable Linux server to its knees with a single command line.”After running this command, PID 1 is hung in the pause system call. You can no longer start and stop daemons. Systemd is an essential part of the boot process for most Linux distributions. According to Ayer, in a blog post titled “How to Crash Systemd in One Tweet,” after running the command, the Linux processes identifier 1 (PID 1) is hung in the pause system call. This prevents a clean system reboot and results in system instability. “After running this command, PID 1 is hung in the pause system call. You can no longer start and stop daemons. inetd-style services no longer accept connections. You cannot c

Cheat sheet for linux

 mkdir  – make directories Usage: mkdir [OPTION] DIRECTORY… eg. mkdir lhn ls  – list directory contents Usage: ls [OPTION]… [FILE]… eg. ls, ls ­l, ls lhn cd  – changes directories Usage: cd [DIRECTORY] eg. cd lhn pwd  ­-  print name of current working directory Usage: pwd vim  – Vi Improved, a programmers text editor Usage: vim [OPTION] [file]… eg. vim lhn.txt cp  – copy files and directories Usage: cp [OPTION]… SOURCE DEST eg. cp sample.txt sample_copy.txt cp sample_copy.txt target_dir mv  – move (rename) files Usage: mv [OPTION]… SOURCE DEST eg. mv source.txt target_dir mv old.txt new.txt rm  ­ remove files or directories Usage: rm [OPTION]… FILE… eg. rm file1.txt , rm ­rf some_dir find  – search for files in a directory hierarchy Usage: find [OPTION] [path] [pattern] eg. find file1.txt, find ­name file1.txt history  – prints recently used commands Usage: history cat  – concatenate files and print on the standard output Usage: cat [OPTION] [FILE]… eg. cat file

How to fix corrupted pendrive

In this article, I am going to tell you about various methods which will help you to repair your corrupted SD card or Pen drive. Very often we face this problem of a corrupted storage device and this guide will surely answer all your questions. Dealing with a corrupted SD card or pen drive is a tedious task. We spend hours to get back our storage into working condition but get nothing. This article comprises of various methods which will help you repair your corrupted pen drive or SD card. For SD card, you will have to insert it into the slot provided in your computer or by using a card reader. Use adapter if you have a microSD card. It will not work if you connect some device having the SD card like a smartphone or a camera. Check out these different methods. Different methods to repair corrupted pen drive or SD card: Change the drive letter Sometimes your computer is unable to assign drive letters (like C, D, E) to your storage media. Due to this reason the files on it can’t be

Lunix malware havoc

The Krebs DDoS attacks have proven that the IoT landscape is a fertile ground that can breed huge botnets capable of launching massive DDoS assaults. As such, it should be no surprise that malware authors are now focusing their efforts on this sector and putting out new threats in the hopes of building the next Mirai botnet. One of the latest additions to the IoT malware market is a trojan codenamed Linux/NyaDrop, recently reverse engineered by MalwareMustDie, the same researcher who discovered the Mirai malware. MalwareMustDie points out in his research that this binary appeared in May, but was somewhat simplistic and not that common. Things changed after the Krebs DDoS attacks, and a new sample has appeared on the market, with the malware’s author most likely drawn back to the IoT landscape by Mirai’s success. Just like most IoT malware nowadays, NyaDrop’s author relies on brute-forcing Internet-exposed IoT devices using their default credentials. In a conversation on Twitter, Ma

How game designers are demanding and how to become one

With the advent of advanced gaming consoles and smartphones, the game designing industry needs more and more skilled people to create creative and immersive games. If you have the right set of skills, the industry promises an exciting career with a fat paycheck. Read the article to know everything in detail. In the recent years, the demand for a game designer has increased at an unprecedented pace. This is an exciting career path that lets your show creativity and create the roots and aesthetics of a game. A game designer works on the graphics, animation, and CGI to bring the games closer to reality. Over the past decade, the game designing industry has ditched its male-dominant tag and more women have entered this field. Talking about the first step, if you are really interested in the field, you need to go to college and get a bachelor’s degree in computer engineering, computer science, arts, animation, or graphic designing. If you find a specialised program in game designing, go f

Top hacking app for Android 2016

As Android has emerged as the top mobile operating system, we have seen a great rise in the Android hacking apps. For our readers, we have prepared a list of the best hacking apps for Android that can be used by a technology enthusiast, an IT security administrator, or an ethical hacker. Based upon the industry reviews and our own experience, here is a compilation of the top Android hacking applications. Along with the description of apps, we have provided the relevant website and download links to help you get started instantly. Disclaimer:  Please note that FOSSBYTES is publishing this list just for educational purposes. We don’t support use of any tool to indulge in some unethical purposes. 9 Best Hacking Apps For Android Phones – 2016 AndroRAT AndroRAT stands for Android and RAT (Remote Administrative Tools). This top hacking tool was released a long time ago as a client/server application. The app aims to give you the control of the Android system remotely and fetch the infor

By opening jpeg 2000 image file you can get hacked

:  Security researchers at Talos have discovered zero-day vulnerability in JPEG 2000 image file format. A specially crafted JPEG 2000 file can trigger a massive read and write of adjacent heap area memory, causing a code execution possibility. Azero-day flaw in the JPEG 2000 image file format has been  discovered by the security experts at Cisco Talos group . The JPEG 2000 is often used to embed images in the PDF documents. This vulnerability affects the image file format parser implemented in OpenJPEG library. OpenJPEG is an open-source JPEG 2000 codec written in C language. This revelation has been made in a security advisory published by Talcos. The advisory states that the flaw could allow arbitrary code execution. This flaw was first discovered by Aleksandar Nikolic of Cisco Talos. The security researchers have successfully tested the JPEG 2000 exploit on the OpenJPEG openjp2 2.1.1. What makes this zero-day flaw in JPEF 2000 so scary? In order to exploit the vulnerability, a

Get the new google allo on your Android

 You might have used Google Allo and its Google Assistant. Recently, the company launched Pixel smartphones with Google Assistant. By tweaking some lines of code in the build.prop file on your rooted Android Nougat phone, you can get the new assistant on your devices. People got to know about Google Assistant when the company unveiled its  Allo messaging application . Few weeks later, at its hardware launch event in October, Google showed off its  Pixel smartphones . Google is marketing the deeply integrated Google Assistant as the major selling point. Google has hinted that its new assistant will be Pixel-exclusive. However, just by editing a few lines of code in a single config file, you can get the Google Assistant up and running on your Android device. Before telling you more about the process, let me tell you that you should be having Android Nougat installed and you need root access. Important:  Another thing, before trying to get Google Assistant working on your device, make

How to activate god mode in Windows 7,8,10

How To Activate 'God Mode' On Windows 7,8 and 10 What if I tell you, Your windows actually have two control panels ? God mode is something that serves users more than 260 settings on any windows version and that too in a particular location. Therefore, we are going to share the easiest method that will help you enable God mode in your windows computer. Go through the post to know about it. Today we will be talking about God Mode. In simple words, it gives system administrators access to numbers of settings that are actually hidden or not available in the form of shortcuts. God mode will be helpful for users who want to access more complex system configurations. Let me clarify one thing, it is not something detective type of things that is kept hidden. It is simply a control panel which brings us numerous settings all together which makes it easier to manage various settings. God mode was first revealed in 2007 and it works on all windows versions which include Windows 7,

Ubuntu latest release

The latest offering from Canonical is the Ubuntu 16.10 Yakkety Yak open source operating system. It comes with the developer preview of the Unity 8 graphical shell and improvement to the Nautilus file browser. Ubuntu 16.10 has been updated with GNOME 3.20 applications and offers Linux kernel 4.8. Canonical Inc. has released the next major update after Ubuntu 16.04 Xenial Xerus in the name of Ubuntu 16.10 Yakkety Yak. Let’s have a look at the best features of Ubuntu 16.10 Yakkety Yak: 1. Linux Kernel 4.8  Ubuntu 16.10 ships with Linux kernel 4.8 out of the box. It brings a number of security features along with major changes to the XFS and Btrfs file systems. It supports Nvidia Pascal and AMD OverDrive for overclocking GPUs using Linux drivers. The new Linux kernel has given me a sense of satisfaction for my new laptop. I dual-booted it with Mint 17 but the wireless failed to work due to older kernel version which lacked support for 7th gen Intel processors. 2. Nautilus 3.20 

use zantu on android

Zanti 2 is a android application which is made up for network penetration testing. What Zanti 2 can do? Scan the whole network show alive host in the network scan port through Nmap for port Scanning Scan Service on each port and find vulnerability. Perform Brute force Attack Perform Shell Shock etc Vulnerability MITM : Man In The Middle Attack Session Hijackings SSL Striping Sniffing Packets Replace Image Redirect URL and IP Intercept and modified live download. Disclaimer –  I recommend that you test this tutorial on a system that belongs to YOU.   For Demonstration : Before  install Zanti your Phone must be rooted  .. In case your phone is not rooted search in the site you will find how to root android its very easy. I used Zanti in my android device and Scan the network. I choose the Mac OSx Machine which was my laptop. After that start The MITM on and SSL strip to grab some packets and try to grab the password of that machine. in the end i successfully travel the