Posts

Showing posts from 2017

Macros and Macro Processors

A   Macro  is a unit of specification for program generation through expansion (like a function). Macro consists of a name, a set of formal parameters and a body of code. When a macro is called the using the macro name with the set of actual parameters then the name with the parameters is replaced by the code generated from its body. This process is called macro expansion. Two types of Macro Expansion 1. Lexical expansion. 2. Semantic expansion. Lexical Expansion It is the process of replacing one character string with another character string during program generation.( actual parameters in place of formal parameters). Semantic Expansion In simple words, semantic expansion implies generation of instructions tailored to the requirements of a specific usage. Macro Definition and Call A macro definition starts with a reserved keyword MACRO and ends with a keyword MEND. The statements enclosed in between these keywords include macro definition and its body.

Assemblers

Elements of Assembly Language Programming An assembly language is a machine dependent, low-level programming language. It provides three basic features. 1. Mnemonic operation codes: Use of mnemonic operation codes eliminates the need of memorizing the numeric operation codes. And also helps in troubleshooting. 2. Symbolic operands: Symbolic names can be associated with data or instructions. which in a simple word means, that you can keep some meaningful names to the variables or an instruction. 3. Data declarations: Data can be declared in variety of notations ( eg:  10, 10.345, 10,00.121, 0.091 etc). A Simple assembly language statement(stmt): [label] <opcode>   <operand spec>[,<op spec>...] Opcodes and their alternative mnemonic code. instruction                                    assembly   opcode                                       mnemonic    00                                               STOP    01                                     

Kali Linux

Kali Linux is Debian based Linux Distro which used by most of the Security researchers and penetration testers for pen testing of software's, websites, networks etc. It was developed by the Offensive Security Team. Kali Linux on high usage become quite unstable but that's only on high usage hope you understood what I want to tell you. Kali Linux being a Debian based Linux performs unusual sometimes, but the researchers are striving hard to keep the OS as good as possible.  It comes with 600 preinstalled tools for penetration testing which gives Kali Linux a tag of the best penetration testing OS till date. Kali Linux is said to be a modified or you can call it as updated version of Backtrack OS. Which was back in the past was considered as the best OS for hacking. Backtrack till date is remembered for its high performance and precise results. Some researchers till use Backtrack.  I personally never used Backtrack but would love to use it once, and will share my

Creating a bootable USB.

A lot of people just asks me how to create a bootable USB easily. The funny part is that they mainly ask how to make it for Linux, I mean bro, if you don't know even how to make a bootable USB then you better should stick with windows OS, because it suits you better, but for the people who are reading this article for creating bootable USB, guys, first of all, I will tell you the simplest method. Don’t expect from me to explain to you how to make it using the command prompt. So, all you need is one software of 1 MB, your ISO file, a computer and yeah USB. So, just download the software Rufus from their official site(first link after typing Rufus on Google). Then make sure your ISO image file is downloaded. Now run the Rufus.exe file and then select the USB disk, from the first 'disk' option then in the bottom right of the application there will be a mall option.  Looking like a CD mounted on HDD. Click on that and select the ISO image file. A

How I started my Hacking career?

Well, people usually think that hackers are people who talk less and work more, true but yeah we do talk and we talk to help. When I started my hacking career last year I faced problems, by problems I mean to say about my doubts, I use to have doubts in almost everything I read. I started googling things and learned a bit but I needed a guide to guide me and help me clear my doubts. I kept a question on my Quora account asking where I can get hackers, after of a couple of days of disappointment, I finally got an answer from a person he mentioned about some of the websites and Facebook groups, here is what he shared with me. For learning, he referred me: Cybrary Programming hub Hacking vision Hack this site Hack a day And also he gave me some good websites to stay updated with  the hacking news like Tha hacker news GreyHacks Fossbytes Anyways these were the sites I started with although the hacking vision was a bit complicated one

Managing Output with Manipulators in C++

Well, when I started studying C++ or you can say when I was forced to study CPP I was like already I have Maths, Physics and Chemistry to study so why this shitty extra burden on my shoulders. But that subject which I was forced to study or having no other option instead of studying CPP became my passion now. Anyways that's a hell of a story! So, this piece of reading will give you an explanation about what are manipulators and how they are implemented in CPP. Manipulators By the name you might have already thought that this is going to be something related to manipulation of something. Well, you are on a right track So, you already got an idea what it is about I would like to make it clear that what is that "something". That something is nothing but Input and Output operations. Well, in this post we will be focusing mainly on Managing Output with Manipulators. Lets, start the boring thing! The header file iomanip provides a set of functions call

What is SQL injection and Cryptography?

SQL Injection SQL Injection is a technique used to take advantage of non validated input vulnerabilities to pass sql commands through a web application for execution by a back-end database. Although SQL injection is a flaw in web applications and not a database or web server issue. SQL( structural query language ) is a textual language used by a database server. SQL commands used to perform operations on the database that include insert,select,update and delete. Programmers use these commands to manipulate data in the database server. Programmers use sequential sql commands  with client supplied parameters making it easier for attackers to inject commands. attackers attempt to execute random sql querries on a database server through a web application. Cryptography It is the practise of converting plain text message into understandable message and then sentover network to the enduser. Cryptography in networks is used for securing the communication transmission.

Hack this site ?

Hacking website is not a very simple job first you need to find a back-door in the website or you can call it a vulnerability . There are multiple ways to find vulnerabilities. I generalized them in two ways: There are two ways for that Easy way : Buy any Vulnerability scanner and scan with it and find vulnerabilities if you want to know about softwares then this is some softwares which can help you. 1. Nessus VS 2. Saint VS 3. Qualys VS 4. Nexpose VS 5. GFI Languard VS 6. Coreimpact VS 7. Solar winds engineers toolset VS Tough way : Scan your website manually for each of OWASP top 10 vulnerabilities on your website and try to find some bugs. OWASP top 10 vulnerabilities are most preferable for finding the bugs most of the time you can rely on them. every year a company OWASP does an analysis in which they try to find the most common vulnerabilities present in the majority of the websites. OWASP top 10 vulnerabilities are 1. SQL injection. 2. Broken authentic

What is sniffing?

Image
Wiretapping is a process of monitoring the telephone and internet conversations by a third party attackers connect a hardware or software or combination of both to the switch carrying information between two phones or hosts on the internet. Types of wire taping 1. Active wire taping : It only monitors, records the traffic (silently) and also alters the traffic. 2. Passive wire taping : It only monitors and records the traffic. Sniffing attacks are vulnerable to following protocols. 1. Telnet 2. FTP 3.SMTP 4. HTTP 5. POP3 6. NTP 7. IMAP 8. SNMP 9. RDP In network sniffing attacks are mostly done on data link layer and network layer of OSI reference model based switches Recommended sniffing tool is Wireshark.  Wireshark is available for both windows and Linux , it is the best tool for sniffing and it's absolutely free . You can download Wireshark from their official site  Wireshark download . Session Hijack

How to do Scanning?

Image
Scanning refers to a set of procedures for identifying active hosts , ports and services in a network. Scanning is one of the components of intelligence gathering an attacker uses to create a profile of the target organization. Types of Scanning 1. Network Scanning. 2. Vulnerability Scanning. Network Scanning  Objectives of Network Scanning are Identifying live hosts and MAC Addresses.  List of Network Scanning Softwares. 1. NMAP. 2. Angry IP Scanner. 3. Advanced IP Scanner. 4. Pingtester. Vulnerability Scan It is a proactive method for analyzing vulnerabilities on target network with help of vulnerability scanning. vulnerabilities can be classified as severe,high,medium,low and information based on risks found on the target. List of commercial vulnerability scanners used in coperate companies. 1. Nessus VS 2. Saint VS 3. Qualys VS 4. Nexpose VS 5. GFI Languard VS 6. Coreimpact VS 7. Solar winds engineers toolset VS Scanning Counter Mea

Footprinting

Image
Footprinting is the first step in the hacking process. In this method, hacker tries to gain as much information as possible about target which may lead to compromise the target. Types of footprinting 1. Open source information gathering. 2. Information gathering with hacking tools. Google Hacking It is an open source information gathering technique where hacker try to find important information about targets, like companies subdomains, IP addresses, email ID's, Employee's database, passwords and sites of the company which are vulnerable to hacking attacks through the help of special keywords used in google search engine is known as Google hacking. List of Google Dorks 1. inurl: login.asp or (php,aspx) 2. filetype: ppt ethical hacking    ( instead ppt you can also put doc,xls etc) 3. intitle: ethical hacking 4. inurl: ac.in filetype:xls name 5. inurl: view/index.shtml (unprotected cameras) and there are lots of keywor

Networking Fundamentals

Image
Network A network is a group of two or more computers linking together for sharing information with each other. Types of Networks 1. LAN (Intranet). 2. WAN (Internet). 3. MAN (LAN + WAN). 4. CAN (campus area network). 5. PAN (personal area network). 6. SAN (storage area network). 7. HAN (home area network). 8. SAN (space area network). Classes of IP Address             Class                                              IP Range               A                                          0.0.0.0 - 126.255.255.255               B                                      128.0.0.0 - 191.255.255.255               C                                      192.0.0.0 - 223.255.255.255               D                                      224.0.0.0 - 239.255.255.255                       E                                      240.0.0.0 - 254.255.255.255 Note   " Class A IP address range 127.0.0.0 - 127.255.255.255 i

Cyber War

Image
Information Warfare or InfoWar     source: " http://map.norsecorp.com " Definition "The term info war refers to use of information and communication technologies (ICT) to take competitive advantages over an opponent." Example Suppose there is a mobile company say, Samsung, Samsung has developed a new android with lots of features and options in that particular phone. The phone has not yet released it's just in the testing stages, and another company named ABC, tries to hack the Samsung database to steal the information about that particular project. This is called info war. Defensive Info War It refers to all the strategies  and actions to defend against attacks on ICT assets (properties). It includes prevention, alerts, detection, emergency preparedness and incident response for cyber attacks coming through the internet. Offensive Info War It refers to all strategies and actions to attack against ICT assets. It i