Saturday, September 26, 2020

WHAT IS A EAVESDROPPING ATTACK ?

 EAVESDROPPING ATTACK 


 EAVESDROPPING ATTACK 


AN EAVESDROPPING ATTACK, ALSO KNOWN AS A SNIFFING OR SNOOPING ATTACK, IS A THEFT OF INFORMATION AS IT IS TRANSMITTED OVER A NETWORK BY A COMPUTER, SMARTPHONE, OR ANOTHER CONNECTED DEVICE. THE ATTACK TAKES ADVANTAGE OF UNSECURED NETWORK COMMUNICATIONS TO ACCESS DATA AS IT IS BEING SENT OR RECEIVED BY ITS USER. HACKERS HACKING INTO DEVICES SUCH AS IP PHONES IS ALSO DONE IN ORDER TO EAVESDROP ON THE OWNER OF THE PHONE BY REMOTELY ACTIVATING THE SPEAKER PHONE FUNCTION.

 any confusion on this blog . message me on instagram my username is @manthan_khatri20

WHAT IS COOKIE THEFT ?

 COOKIE THEFT


COOKIE THEFT


COOKIE THEFT OCCURS WHEN A THIRD PARTY COPIES UNENCRYPTED SESSION DATA AND USES IT TO IMPERSONATE THE REAL USER. COOKIE THEFT MOST OFTEN OCCURS WHEN A USER ACCESSES TRUSTED SITES OVER AN UNPROTECTED OR PUBLIC WI-FI NETWORK. ALTHOUGH THE USERNAME AND PASSWORD FOR A GIVEN SITE WILL BE ENCRYPTED, THE SESSION DATA TRAVELING BACK AND FORTH (THE COOKIE) IS NOT.



 any confusion on this blog . message me on instagram my username is @manthan_khatri20

WHAT IS IP SPOOFING ?

  IP SPOOFING


spoofer


IP SPOOFING IS THE CREATION OF INTERNET PROTOCOL DM PACKETS WHICH HAVE A MODIFIED SOURCE ADDRESS IN ORDER TO EITHER HIDE THE IDENTITY OF THE SENDER, TO IMPERSONATE ANOTHER COMPUTER SYSTEM, OR BOTH. IT IS A TECHNIQUE OFTEN USED BY BAD ACTORS TO INVOKE DDOS ATTACKS AGAINST A TARGET DEVICE OR THE SURROUNDING INFRASTRUCTURE.

 any confusion on this blog . message me on instagram my username is @manthan_khatri20

WHAT IS JAVASCRIPT INJECTION ?

 JAVASCRIPT INJECTION


THE MAIN PURPOSE OF JS INJECTION IS TO CHANGE THE WEBSITE'S APPEARANCE AND MANIPULATE THE PARAMETERS. JS INJECTION BRINGS A LOT OF POSSIBILITIES FOR A MALICIOUS USER TO MODIFY THE WEBSITE'S DESIGN, GAIN WEBSITE'S INFORMATION, CHANGE THE DISPLAYED WEBSITE'S INFORMATION AND MANIPULATE WITH THE PARAMETERS (FOR EXAMPLE, COOKIES). 


 any confusion on this blog . message me on instagram my username is @manthan_khatri20

Tuesday, September 22, 2020

What is phone number spoofing ?

Number spoofing ?


Scams 


Phone number spoofing is used by scammers and hackers to perform vishing attacks on a victim they spoof their mobile number to conceal their real identity and call as someone else .it is very easy to spoof a phone number and can be useful too .it is a very common trick used by hackers as well as normal people to conceal identities or sign up for services which require you to confirm your identity via a phone number.


 any confusion on this blog . message me on instagram my username is @manthan_khatri20

Monday, September 21, 2020

How does SQL Injection work ?

 SQL Injection work ?

SQL Injection 

SQL Injection works by manipulating a server from client side using SQL commands to fetch and show data to the user. tools like SQLMAP can be used for this purpose to automate the process and make it faster.

 any confusion on this blog . message me on instagram my username is @manthan_khatri20

How do Crypters Works ?

 Crypters Works ?



Crypters are software that change the signature of a file to mask them fud by anti virus thus making them stealthier and easy to deploy in a victim machine.




 any confusion on this blog . message me on instagram my username is @manthan_khatri20


How does Brute-force Work ?

 Brute-force Work ?

Brute force

Bruteforce works by trying a lot of passwords on an account or file at a very fast rate. but it can be time consuming and has less success rate.


 any confusion on this blog . message me on instagram my username is @manthan_khatri20

How does Tor browser work ?

 Tor work

Tor Browser

Tor service is used for anonymity online it relays your connection a lot of  times to maintain anonymity and hides your I.P address . It is best used with a V.P.N .


 any confusion on this blog . message me on instagram my username is @manthan_khatri20

HOW DOES VPN WORK ?

 VPN WORK


VPN ( Virtual private network )


A VPN ENCRYPTS YOUR DATA AND SENDS IT TO A SERVER LOCATED ELSEWHERE, THE SERVER THEN DECRYPTS THE DATA SENDS IT TO THE WEBSITE. THUS YOUR IP IS HIDDEN, THE DATA IS THEN SENT BACK TO YOU IN ENCRYPTED FORM.

 any confusion on this blog . message me on instagram my username is @manthan_khatri20

HOW DOES PROXY WORK?

 PROXY WORK?

 



proxy server 


 

A PROXY IS USED FOR PRIVACY ONLINE. IT SEND YOUR REQUESTS TO A PROXY SERVER WHICH ON YOUR BEHALF MAKES REQUESTS FOR YOU. THUS, MAINTAINING PRIVACY AND ANONYMITY. 

 any confusion on this blog . message me on instagram my username is @manthan_khatri20

Sunday, September 20, 2020

Android v/s I.O.S

 

Android

Android is open-source and is easier to use compared to ios. android can also be used for hacking. rooting also provides benefits .



I.O.S

I.O.S cannot be used for hacking unless jailbroken . it is easy to use but is also expensive . it performs well in other tasks like photography.


                                      


Saturday, September 19, 2020

how does steganography work ?

 Steganography

Steganography is the process of embedding text in a hidden way into an image file . it can be decoded and encoded online. you can use it to send secret messages to people .

how does https work ?

 HTTPS is a secure protocol which is used to protect data transfer online .it encrypts your data so that hackers can't sniff your passwords and logins.

HACKING INSTAGRAM ACCOUNT

  HOW TO HACK INSTAGRAM ACCOUNT 

Clone hiddeneye install on your linux terminal Generate phishing link send it to the victim use social engineering .


any confusion on this blog . message me on instagram my username is manthan_khatri20.

Ubuntu vs Fedora

 Ubuntu 

ubuntu is a very common linux distro mostly focused on daily use and can be used  for hacking as well as normal work .


Fedora 

fedora linux is made for power users and system administrators it focuses on security hacking is possible on fedora too.

what is linux operating system

linux operating system linux   Linux is a family of open-source Unix-like operating systems based on the Linux kernel, an operating system k...