Skip to main content

Posts

HOW TO CRACK PASSWORD OF AN APPLICATION

What is Password Cracking? Password cracking is the process of attempting to gain Unauthorized access to restricted systems using common passwords or algorithms that guess passwords. In other words, it’s an art of obtaining the correct password that gives access to a system protected by an authentication method. Password cracking employs a number of techniques to achieve its goals. The cracking process can involve either comparing stored passwords against word list or use algorithms to generate passwords that match In this Tutorial, we will introduce you to the common password cracking techniques and the countermeasures you can implement to protect systems against such attacks. Topics covered in this tutorial What is password strength? Password cracking techniques Password Cracking Tools Password Cracking Counter Measures Hacking Assignment: Hack Now! What is password strength? Password strength is the measure of a password’s efficiency to resist password crackin

DATA SAFE USING CRYPTOGRAPHY

What is Cryptography? Cryptography is the study and application of techniques that hide the real meaning of information by transforming it into nonhuman readable formats and vice versa. Let’s illustrate this with the aid of an example. Suppose you want to send the message “I LOVE APPLES”, you can replace every letter in the phrase with the third successive letter in the alphabet. The encrypted message will be “K NQYG CRRNGV”. To decrypt our message, we will have to go back three letters in the alphabet using the letter that we want to decrypt. The image below shows how the transformation is done. The process of transforming information into nonhuman readable form is called encryption. The process of reversing encryption is called  decryption . Decryption is done using a  secret key  which is only known to the legitimate recipients of the information. The key is used to decrypt the hidden messages. This makes the communication secure because even if the attacker manage

HOW TO HACK WIRELESS NETWORK

What is a wireless network? A wireless network is a network that uses radio waves to link computers and other devices together. The implementation is done at the Layer 1 (physical layer) of the OSI model. How to access a wireless network? You will need a wireless network enabled device such as a laptop, tablet, smartphones, etc. You will also need to be within the transmission radius of a wireless network access point. Most devices (if the wireless network option is turned on) will provide you with a list of available networks. If the network is not password protected, then you just have to click on connect. If it is password protected, then you will need the password to gain access. Wireless Network Authentication Since the network is easily accessible to everyone with a wireless network enabled device, most networks are password protected. Let’s look at some of the most commonly used authentication techniques. WEP WEP is the acronym for Wired Equivalent Privacy. It

HACK WEB

What is a web application? What are Web Threats? A web application (aka website) is an application based on the client-server model. The server provides the database access and the business logic. It is hosted on a web server. The client application runs on the client web browser. Web applications are usually written in languages such as Java, C#, and VB.Net, PHP, ColdFusion Markup Language, etc. the database engines used in web applications include MySQL, MS  SQL  Server, PostgreSQL, SQLite, etc. Most web applications are hosted on public servers accessible via the Internet. This makes them vulnerable to attacks due to easy accessibility. The following are common web application threats. SQL Injection  – the goal of this threat could be to bypass login algorithms, sabotage the data, etc. Denial of Service Attacks – the goal of this threat could be to deny legitimate users access to the resource Cross Site Scripting XSS – the goal of this threat could be to inject code t

HACK WEBSERVER

Topics covered in this tutorial Web server vulnerabilities Types of Web Servers Types of Attacks against Web Servers Effects of successful attacks Web server attack tools How to avoid attacks on Web server Hacking Activity: Hack a WebServer Web server vulnerabilities A web server is a program that stores files (usually web pages) and makes them accessible via the network or the internet . A web server requires both hardware and software. Attackers usually target the exploits in the software to gain authorized entry to the server. Let’s look at some of the common vulnerabilities that attackers take advantage of. Default settings – These settings such as default user id and passwords can be easily guessed by the attackers. Default settings might also allow performing certain tasks such as running commands on the server which can be exploited. Misconfiguration of operating systems and networks – certain configuration such as allowing users to execute commands on the s