Skip to main content

Posts

Showing posts from June, 2017

What is Social Engineering?

What is Social Engineering? Social engineering is the art of manipulating users of a computing system into revealing confidential information that can be used to gain unauthorized access to a computer system. The term can also include activities such as exploiting human kindness, greed, and curiosity to gain access to restricted access buildings or getting the users to installing backdoor software. Knowing the tricks used by hackers to trick users into releasing vital login information among others is fundamental in protecting computer systems In this tutorial, we will introduce you to the common social engineering techniques and how you can come up with security measures to counter them. Topics covered in this tutorial How social engineering Works? Common Social Engineering Techniques Social Engineering Counter Measures How social engineering Works? HERE, Gather Information : This is the first stage, the learns as much as he can about the intended victim. The

SKILLS REQUIRED BECOME A ETHICAL HACKER

What is a programming language? A programming language is a language that is used to develop computer programs. The programs developed can range from operating systems; data based applications through to networking solutions.   Why should you learn how to program? Hackers are the problem solver and tool builders, learning how to program will help you implement solutions to problems. It also differentiates you from script kiddies. Writing programs as a hacker will help you to automate many tasks which would usually take lots of time to complete. Writing programs can also help you identify and exploit programming errors in applications that you will be targeting. You don’t have to reinvent the wheel all the time, and there are a number of open source programs that are readily usable. You can  customize the already existing applications and add your methods to suit your needs . What languages should I learn? The answer to this question  depends on your target computer

TOP 6 ETHICAL HACKING TOOLS

SR    NO. TOOLS DESCRIPTION URL Link 1  Nmap   Network Mapper. This tool is used to explore networks and perform security audits.   http://nmap.org/ 2  Nessus   This tool can be used to perform; Remote vulnerability scanner Password dictionary attacks Denial of service attacks.   It is closed source, cross platform and free for personal use.   http://www.tenable.com/products/nessus    3 John The Ripper   Password cracking utility. It is cross platform. http://www.openwall.com/john/ 4 Cain & Abel   Microsoft Operating System passwords recovery tool. It is used to;   Recover MS Access passwords Uncover password field Sniffing networks Cracking encrypted passwords using dictionary attacks, brute-force, and cryptanalysis attacks. Visit their URL for more details http://www.softpedia.com/get/Security/Decrypting-Decoding/Cain-and-Abel.shtml 5 NetStumbler Used to detect wireless networks on the Windows platform. It can be used for the following tasks; Verifying network

HOW TO CRACK PASSWORD OF AN APPLICATION

What is Password Cracking? Password cracking is the process of attempting to gain Unauthorized access to restricted systems using common passwords or algorithms that guess passwords. In other words, it’s an art of obtaining the correct password that gives access to a system protected by an authentication method. Password cracking employs a number of techniques to achieve its goals. The cracking process can involve either comparing stored passwords against word list or use algorithms to generate passwords that match In this Tutorial, we will introduce you to the common password cracking techniques and the countermeasures you can implement to protect systems against such attacks. Topics covered in this tutorial What is password strength? Password cracking techniques Password Cracking Tools Password Cracking Counter Measures Hacking Assignment: Hack Now! What is password strength? Password strength is the measure of a password’s efficiency to resist password crackin

DATA SAFE USING CRYPTOGRAPHY

What is Cryptography? Cryptography is the study and application of techniques that hide the real meaning of information by transforming it into nonhuman readable formats and vice versa. Let’s illustrate this with the aid of an example. Suppose you want to send the message “I LOVE APPLES”, you can replace every letter in the phrase with the third successive letter in the alphabet. The encrypted message will be “K NQYG CRRNGV”. To decrypt our message, we will have to go back three letters in the alphabet using the letter that we want to decrypt. The image below shows how the transformation is done. The process of transforming information into nonhuman readable form is called encryption. The process of reversing encryption is called  decryption . Decryption is done using a  secret key  which is only known to the legitimate recipients of the information. The key is used to decrypt the hidden messages. This makes the communication secure because even if the attacker manage