Posts

Macros and Macro Processors

A   Macro  is a unit of specification for program generation through expansion (like a function). Macro consists of a name, a set of formal parameters and a body of code. When a macro is called the using the macro name with the set of actual parameters then the name with the parameters is replaced by the code generated from its body. This process is called macro expansion. Two types of Macro Expansion 1. Lexical expansion. 2. Semantic expansion. Lexical Expansion It is the process of replacing one character string with another character string during program generation.( actual parameters in place of formal parameters). Semantic Expansion In simple words, semantic expansion implies generation of instructions tailored to the requirements of a specific usage. Macro Definition and Call A macro definition starts with a reserved keyword MACRO and ends with a keyword MEND. The statements enclosed in between these keywords include macro definition and its body.

Assemblers

Elements of Assembly Language Programming An assembly language is a machine dependent, low-level programming language. It provides three basic features. 1. Mnemonic operation codes: Use of mnemonic operation codes eliminates the need of memorizing the numeric operation codes. And also helps in troubleshooting. 2. Symbolic operands: Symbolic names can be associated with data or instructions. which in a simple word means, that you can keep some meaningful names to the variables or an instruction. 3. Data declarations: Data can be declared in variety of notations ( eg:  10, 10.345, 10,00.121, 0.091 etc). A Simple assembly language statement(stmt): [label] <opcode>   <operand spec>[,<op spec>...] Opcodes and their alternative mnemonic code. instruction                                    assembly   opcode                                       mnemonic    00                                               STOP    01                                     

Kali Linux

Kali Linux is Debian based Linux Distro which used by most of the Security researchers and penetration testers for pen testing of software's, websites, networks etc. It was developed by the Offensive Security Team. Kali Linux on high usage become quite unstable but that's only on high usage hope you understood what I want to tell you. Kali Linux being a Debian based Linux performs unusual sometimes, but the researchers are striving hard to keep the OS as good as possible.  It comes with 600 preinstalled tools for penetration testing which gives Kali Linux a tag of the best penetration testing OS till date. Kali Linux is said to be a modified or you can call it as updated version of Backtrack OS. Which was back in the past was considered as the best OS for hacking. Backtrack till date is remembered for its high performance and precise results. Some researchers till use Backtrack.  I personally never used Backtrack but would love to use it once, and will share my

Creating a bootable USB.

A lot of people just asks me how to create a bootable USB easily. The funny part is that they mainly ask how to make it for Linux, I mean bro, if you don't know even how to make a bootable USB then you better should stick with windows OS, because it suits you better, but for the people who are reading this article for creating bootable USB, guys, first of all, I will tell you the simplest method. Don’t expect from me to explain to you how to make it using the command prompt. So, all you need is one software of 1 MB, your ISO file, a computer and yeah USB. So, just download the software Rufus from their official site(first link after typing Rufus on Google). Then make sure your ISO image file is downloaded. Now run the Rufus.exe file and then select the USB disk, from the first 'disk' option then in the bottom right of the application there will be a mall option.  Looking like a CD mounted on HDD. Click on that and select the ISO image file. A

How I started my Hacking career?

Well, people usually think that hackers are people who talk less and work more, true but yeah we do talk and we talk to help. When I started my hacking career last year I faced problems, by problems I mean to say about my doubts, I use to have doubts in almost everything I read. I started googling things and learned a bit but I needed a guide to guide me and help me clear my doubts. I kept a question on my Quora account asking where I can get hackers, after of a couple of days of disappointment, I finally got an answer from a person he mentioned about some of the websites and Facebook groups, here is what he shared with me. For learning, he referred me: Cybrary Programming hub Hacking vision Hack this site Hack a day And also he gave me some good websites to stay updated with  the hacking news like Tha hacker news GreyHacks Fossbytes Anyways these were the sites I started with although the hacking vision was a bit complicated one

Managing Output with Manipulators in C++

Well, when I started studying C++ or you can say when I was forced to study CPP I was like already I have Maths, Physics and Chemistry to study so why this shitty extra burden on my shoulders. But that subject which I was forced to study or having no other option instead of studying CPP became my passion now. Anyways that's a hell of a story! So, this piece of reading will give you an explanation about what are manipulators and how they are implemented in CPP. Manipulators By the name you might have already thought that this is going to be something related to manipulation of something. Well, you are on a right track So, you already got an idea what it is about I would like to make it clear that what is that "something". That something is nothing but Input and Output operations. Well, in this post we will be focusing mainly on Managing Output with Manipulators. Lets, start the boring thing! The header file iomanip provides a set of functions call

What is SQL injection and Cryptography?

SQL Injection SQL Injection is a technique used to take advantage of non validated input vulnerabilities to pass sql commands through a web application for execution by a back-end database. Although SQL injection is a flaw in web applications and not a database or web server issue. SQL( structural query language ) is a textual language used by a database server. SQL commands used to perform operations on the database that include insert,select,update and delete. Programmers use these commands to manipulate data in the database server. Programmers use sequential sql commands  with client supplied parameters making it easier for attackers to inject commands. attackers attempt to execute random sql querries on a database server through a web application. Cryptography It is the practise of converting plain text message into understandable message and then sentover network to the enduser. Cryptography in networks is used for securing the communication transmission.