Skip to main content

Posts

Showing posts from December, 2016

Reason why python is best for hackers

Many people learn Python specifically just for hacking and  when I first started with Python and moving from Java to Python personally felt a lot comfortable. When I needed to write a script which was not available on the internet I had to choose between Perl  and Python. Because Perl is another very popular open source interpreted programming language. When you google you will know that Python is a more popular programming language in hacking world. When compared to Perl, the Python programs are definitely clearer, simpler, easier to write and hence more maintainable and understandable. If you are someone interested in tinkering with the information security tasks, Python is a  great language to learn because of the availability of the large number of reverse engineering and exploitation libraries for your use. Why Python ? Without developing some of the basic scripting skills, aspiring hacker will be condemned to realm of the script kiddie. This actually means you will be limited

Original kickass torrent is back 'what a day'

After a long wait, the original KickassTorrents website is back with a new domain KATcr.co. Brought back by the original staffers, the new website looks just like KAT.cr. The website is rebuild using new user database, and safe elements. At the moment, due to high server load, the users are experiencing some troubles loading the website. After the death of KickassTorrents, the world’s most famous torrent website, a  number of fake proxies  arrived on the scene. This also helped the other torrent websites gain popularity. Back in July, we told you about Katcr.co. This website was a result of the original KickassTorrents staffers who grouped to build a  community website . Then, it didn’t offer any torrent links. Now, a larger group of KickassTorrent employees have launched the website loaded with torrents —  KATcr.co This fully operating torrent site looks similar to the deceased Kat.cr. Talking to  TF , the KATcr team said that the majority of original KAT site admins and crew have

Google is killing HTTP here is why

 Google is working to make users more aware of security risks posed by websites using an HTTP (Hyper Text Transfer Protocol) connection to transfer data. For this, a “not secure” warning label will be displayed in Google Chrome 56 scheduled to launch in January 2017. Modern times have witnessed a more sophisticated way of stealing data and stalking a person on the internet. The HTTP connection used by many websites is enough to lure malevolent minds to fulfill their intentions. Google is determined to demote the adoption of HTTP connection by websites. The reason behind this objective is that the HTTP connection is not secure. What does that mean? If a website uses an HTTP connection, the passwords and credit card details you type there are sent in plain text over the network making it possible for any middleman to read all of it. And it is not only about the credit card numbers, a website using an HTTP connection can be modified by a person before it reaches your computer. Another

Credit cards can be hacked

Beware! Your Credit/Debit Card Can Be Hacked In Just 6 Seconds Card number, expiry date, CVV2, address -- everything is guessable      A new attack mechanism, called Distributed Guessing Attack, can steal your credit and debit card details in as few as six seconds. This assault exploits two basic security flaws in the online payment systems–unlimited guesses on payment pages and variation in the payment data fields. Today, different kinds of cards have become the de facto means of online payments. This has also resulted in an increase in the number of online frauds taking place every month. The current situation, automatically, presents before us the question — what security methods are being taken to ensure a safe cashless transaction? The researchers from the University of Newcastle have carried out a research and published their result in the IEEE Security & Privacy Journal. The study shows how an attack mechanism, called Distributed Guessing Attack, can bypass all the secu

Anonymous warns the world world war 3 is coming soon

Hacktivist group Anonymous has shared a new video and highlighted the strong possibility of World War 3. The collective says that the WWIII is coming soon, citing different developments in Russia and China. If we talk about the possibility of the WWIII, different people have different opinions. While some people call it a far-fetched possibility, others cite some recent events and say that WWIII is closer than ever. Along the similar lines, the hacktivist collective Anonymous has released a new video warning the people about the World War 3. What’s the basis of such prediction? Well, in recent times, Britain and the United States promised troops are preparing to move   to Poland in NATO’s biggest military build-up on Russian borders since the Cold War. Also, according to another report, across Russia, 40 million military personnel and civilians have just finished up emergency drills. This exercise has been done to prepare the people to protect themselves against any eminent possibi

Top programming language for landing on a good and decent jobs

A programming language is a notation for writing programs, which are specifications of a computation or algorithm. Some, but not all, authors restrict the term “programming language” to those languages that can express  all  possible algorithms.Traits often considered important for what constitutes a programming language include: Function and targetA  computer programming language  is a language used to write computer programs, which involve a computer performing some kind of computation or algorithm and possibly control external devices such as printers, disk drives, robots,and so on. For example, PostScript programs are frequently created by another program to control a computer printer or display. More generally, a programming language may describe computation on some, possibly abstract, machine. It is generally accepted that a complete specification for a programming language includes a description, possibly idealized, of a machine or processor for that language. In most practical

Ever thought about sudo in linux here is a complete meaning

Sudo In Linux — A Lot More Than An Elevated Permissions Tool      At times, it is necessary to perform tasks with root privileges, there are a few solutions for this, some more secure than the others. This article will outline those solutions with an emphasis on sudo and its broad ability that is virtually unknown to many system administrators. When in need of running a process with elevated privileges, there are a three main solutions. Firstly, you can login as root, but this can only be done with the root password and still carries some security concerns. Secondly, you can use su to run a single command as root, still, this requires the root password. Lastly, there’s sudo, if improperly configured, it is a security nightmare, but if done properly, which is very easy, it can maintain a secure system while allowing flexibility in day to day operations. The first step to understanding the power and flexibility of sudo is in understand the aliases. User Alias  – This is exactly as

Poison tap can hack locked device in seconds

 What can you do with your $5 bill? You can get a trickster Raspberry Pi Zero which can fool a locked and password protected computer. It can hijack cookies, create backdoors, compromise the internal router, and above all, make the computer believe it’s connected to the internet.  We have seen many instances of people taking advantage of the USB to gain access to a device. A Raspberry Pi board can be a good companion while doing such activities. Usually, these USB hacking activities take advantage of one or more vulnerabilities in the operating system. But, what about a $5 Raspberry Pi Zero that’s an imposter. Poison tap  a trickster Pi Zero board, has been created by Samy Karkar. When connected to an exposed USB or Thunderbolt port, the device says to a computer that it’s an ethernet (via USB) device, not a regular USB device, and it’s a door to the entire internet. Your innocent machine quickly believes what is said by the PoisonTap, completely unknown of its real intentions. The