Sunday, December 4, 2016

MitM Attack using Bettercap.

Man in the middle attack
       
          Man-in-the-Middle Attack generally abbreviated as MitM, In computer security a man-in-the-middle attack   is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other. One example of man-in-the-middle attacks is active eavesdropping, in which the attacker makes independent connections with the victims and relays messages between them to make them believe they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker.

Friday, November 4, 2016

sqlmap Tutorial Using kali linux


What is SQL Injection?

SQL injection is an attack technique that exploits a security vulnerability occurring in the database layer of an application.  Hackers use injections to obtain unauthorized access to the underlying data, structure, and DBMS.  It is one of the most common web application vulnerabilities.

Sunday, September 18, 2016

Wine Tutorial : to installing and managing windows programs on linux.

Introduction to Wine

Different software programs are designed for different operating systems and cause of platform dependency they cant run on different platform. for example, windows programs won't run in Linux because they contain instructions that the system can't understand until they're translated by the Windows environment likewise, Linux Programs won't run under the Windows operating system because Windows is unable to interpret all of their instructions. This situation presents a fundamental problem for anyone who wants to run software for both Windows and Linux. A common solution for this problem is to install both operating systems on the same computer, known as "dual booting". When a Windows program is needed, the user boots the machine into Windows to run it; when a Linux program is needed, then the user reboots the machine into Linux.

Tuesday, September 13, 2016

100 Greatest Hacking Tools that must have every hacker!

Hacking could be great fun if you have the right kind of tools coming in handy. Well, look not further as here's a list of top 100 must-have tools for hackers. 

Saturday, September 10, 2016

7 Apps To Help You Run Windows Programs On Another OS

So you have switched to another operating system, but still miss some of your favourite programs on Windows? Here are 7 app to help your run Windows program on your current platform! 

Friday, September 2, 2016

Implementation and Time analysis of linear search algorithm

 linear search or sequential search is a method for finding a target value within a list. It sequentially checks each element of the list for the target value until a match is found or until all the elements have been searched.

Wednesday, August 31, 2016

Implementation And Time analysis of Binary Search algorithm

 binary search, also known as half-interval search or logarithmic search, is a search algorithm that finds the position of a target value within a sorted array. It compares the target value to the middle element of the array; if they are unequal, the half in which the target cannot lie is eliminated and the search continues on the remaining half until it is successful.

Monday, August 8, 2016

RUN COMMANDS



The RUN commands allows to quickly access features and applications to customize operating system environment. These run commands are available for almost all settings available in Windows control panel.

Wednesday, July 27, 2016

How to shutdown linux machine on network



To shutdown the local machine immediately, we can execute this command as root or under sudo:

Wednesday, June 29, 2016

SQL INJECTION INTRODUCTION

What are SQL injections?


An SQL injection is a kind of injection vulnerability in which the attacker tries to inject arbitrary pieces of malicious data into the input fields of an application, which, when processed by the application, causes that data to be executed as a piece of code by the back end SQL server, thereby giving undesired results which the developer of the application did not anticipate. The backend server can be any SQL server (MySQL, MSSQL, ORACLE, POSTGRESS, to name a few)