Posts

Showing posts from 2016

Parrot Security OS 3.3 Released

In our lists of the most popular and best operating systems for ethical hacking purposes, Parrot Security OS is often listed as the best alternative to the well known Kali Linux. Back in October, we witnessed a big release of this OS, i.e., Parrot Security 3.2 CyberSloop. As a Christmas gift to ethical hackers, Frozenbox Network has unveiled a minor release in the form of Parrot Security 3.3, which is “just a working snapshot of the bigger work.” “We are sorry for all the silence behind our development process of these days, but we were secretly working on 2 main projects,” the announcement says. As expected, this Debian GNU/Linux 9 Stretch-based release fixes many small bugs and introduces new updates. The blog post also mentions the upcoming Parrot 3.4 release that’s supposed to be a bigger release. What is Parrot Parrot is a GNU/Linux distribution based on Debian and focused on Penetration Testing, Digital Forensics, Programming and Privacy protection. What Version to choose Parrot

How to Dual Boot Kali Linux and Windows 10

Image
Kali Linux is the most famous Linux distribution  for hackers and penetration testers. If you want to start your carrear as a hacker or a pen tester, our website provides you with all the right information you need. The starting point of being a hacker is good knowledge using Kali. So, in this article let us see how to Dual boot Kali Linux and windows 10. Basic Requirements For Dual Boot Kali linux and Windows 10 A laptop/ PC A Pendrive/USB Drive with minimum 8 GB storage space Windows 10 or any other version of Windows pre installed Kali linux :  https://www.kali.org/downloads/ Rufus :  https://rufus.akeo.ie/ Minitool Partition Wizard :  https://www.partitionwizard.com/download.html Step -1 First we have to download the latest version of the Kali Linux for official website, the link to which is here. You can choose either a 32 bit or a 64 bit version based on your computer. Better download the file with over 3 GB size which comes with some pre installed tools.   St

Hacked sony music account spreads britney spears death

Some Twitter accounts related to Sony Music were apparently accessed by hacker group OurMine this morning. The handles for Sony Music Global and Bob Dylan tweeted that Britney Spears was dead shortly after 8AM ET. “britney spears is dead by accident! we will tell you more soon,” the @SonyMusicGlobal account read before the tweets were deleted. A rep for Spears confirmed to CNN that the singer was, in fact, still alive OurMine is well known for breaking into accounts like these, and in this manner. In 2016 alone the group accessed everything from Google CEO Sundar Pichai’s Quora account, to Facebook CEO Mark Zuckerberg’s social media accounts, to Twitter CEO Jack Dorsey’s own Twitter account. OurMine also got ahold of BuzzFeed’s website in October shortly after the outlet ran a story that probed for the identities of the hackers. And just last week the hackers accessed the Twitter accounts of Netflix and Marvel. Sony’s movie division was famously hacked in 2014 — a breach so big that th

Hack the system and get your job,"TCS" Ethical Hacking Contest

Image
TCS  is launching the inaugural edition of Ethical Hacking Contest for students passing out in the year 2017 in two rounds. If you have the competency and desire to be a cyber-security professional, TCS is the place for you to grow. A famous quote says ‘Security is only as Strong as its Weakest Link’ .How true is the above quote! Especially in today’s digital era, where enterprises globally are seeing a rise in the number and complexity of security breaches. With Internet of Things (IoT), Social, Mobility and Cloud Computing, digital has opened up new business opportunities. But, this has also put enterprise at a greater security risk. Security breaches and data theft are a growing menace. To counter these threats posed by unscrupulous hackers, enterprises are increasingly employing security researchers and ethical hackers. Ethical hackers help find vulnerabilities in enterprise systems, before any attacker exploits the same. For more details, stay tuned to our TCS Enterprise Secur

Ethical Hacking Five Phases

Image
The process of Ethical hacking can be broken down into five distinct phases. An ethical hacker follows processes similar to those of a malicious hacker. The steps to gain and maintain entry into a computer system are similar no matter what the hacker's intentions are. Image illustrates the five phases that hackers generally follow in hacking a computer system. The five phases of Hacking are as follow: Reconnaissance Scanning Gaining Access Maintaining Access Covering Tracks Ethical Hacking Phases Passive and Active Reconnaissance Passive   reconnaissance  involves gathering information about a potential target without the targeted individual's or company's knowledge. Passive reconnaissance can be as simple as watching a building to identify what time employees enter the building and when they leave. However, most reconnaissance is done sitting in front of a computer. When hackers are looking for information on a potential target, they commonly run an Interne

Types of Hackers You should know

What Is a Hacker?    The basic definition of a hacker is someone who uses a computer system to gain unauthorized access to another system for data or who makes another system unavailable. These hackers will use their skills for a specific goal, such as stealing money, gaining fame by bringing down a computer system, or making a network unavailable -- even sometimes destroying them. However, there are three different types of hackers, each with a particular goal, and not all are the bad guys. Types of HACKERS White Hat:  A “white hat hacker” breaks security for non-malicious reasons, either to test their own security system, perform penetration tests or vulnerability assessments for a client - or while working for a security company which makes security software. White-hat hackers may also work in teams called "sneakers",red teams, or tiger teams. Black Hat:  A "black hat" hacker is a hacker who "violates computer security for little reason beyond maliciousness

How To Hack WIFI WPS pin With Kali Linux

Image
Today I’m gonna tell you. HOW TO HACK WIFI WPS PIN. Kali Linux can be used for many things, but it probably is best known for its ability to penetration test, or hack wifi wps pin . There are hundreds of Windows applications that claim they can hack WPA , don’t get them! They’re just scams, used by professional hackers, to lure newbie or wannabe hackers into getting hacked themselves. Warning..!! WIFI hacking is illegal. “This tutorial is only for educational purposes. I am not responsible for any consequences.” Hack WIFI WPS PIN using reaver method. So lets Start Cracking Step 1:  Open Terminal and Find out the name of your wireless adapter. , type ifconfig on a terminal. See the result. (here my wireless adapter is ‘wlan0’).  Step 2:  Enable Monitor mode. Now, we use a tool called airmon-ng to create a virtual interface called mon. Just type. airmon-ng start wlan0 Step 3:  Type the following commands on terminal. airmon-ng check kill Step 4 :   To find WPS networks ,we'll

GOOGLE hacked by pakistani hackers!!!

The Bangladesh domain belonging to Google is the latest to become the victim of hackers, as a group of attackers apparently coming from Pakistan managed to deface the search engine page and post their own message on the site. Hackers who are part of a group called Team Pak Cyber Attackers hijacked the Google Bangladesh search engine domain and posted a message that taunts the security systems put in place by Google. The breach was mostly possible with DNS hijacking, which was the same method that other hackers turned to in the past to disrupt other Google websites, including the Vietnamese homepage. In this latest hack, the attackers posted a message on the Google Bangladesh page that included the Pakistan Zindabad slogan, which translates to Long Live Pakistan. “Struck by Faisal 1337. Google Bangladesh Stamped by Team Pak Cyber Attackers. Security is an illusion. Pakistan Zindabad,” the full message posted on the Google website read. Google has obviously moved very fast to restore acc

Steam server down!!Phantom Squad DDOS attack on steam!!Gamer's R.I.P.

Image
Steam servers DDoSed and taken down by Phantom Squad hacker group, gamers left in lurch during busy Christmas weekend  Right now they are showing a trailer of what they can achieve. Yes, we are talking about Phantom Squad who have promised to bring down Steam, Sony’s PlayStation and Microsoft’s Xbox down during the week starting today. And they seemed to have started with Steam today.    The DDoS attack mounted by PhantomNations on Steam servers is so severe that almost all regional gaming servers are down and the report now shows as 0.00 % online. It is worthwhile to remember that Steam operates about 17 regional servers including  3 for US, 4 for Europe and Australia, India, Brazil, Japan etc.  All Steam activities including the Steam community and the Steam Store are down so you cannot buy Steam games as Christmas gifts for your near and dear ones. The blame for the Steam outage lies solely on Steam developers as the Phantom Squad had warned of such attacks during the busy Christmas

Design an A.I. Mark Zuckerberg's successfull AI attempt.

Image
Mark Zuckerberg designs an A.I(J.A.R.V.I.S -IRON MAN) Building Jarvis Mark Zuckerberg shares his experience Mark Zuckerberg says his personal challenge for 2016 was to build a simple AI to run my home -- like Jarvis in Iron Man. My goal was to learn about the state of artificial intelligence -- where we're further along than people realize and where we're still a long ways off. These challenges always lead me to learn more than I expected, and this one also gave me a better sense of all the internal technology Facebook engineers get to use, as well as a thorough overview of home automation. So far this year, I've built a simple AI that I can talk to on my phone and computer, that can control my home, including lights, temperature, appliances, music and security, that learns my tastes and patterns, that can learn new words and concepts, and that can even entertain Max. It uses several artificial intelligence techniques, including natural language processing, speech recogniti

Kickass Torrent Back Online

Image
KICKASS   TORRENT BACK  from the draftd! Back in July, the world's largest and most notorious BitTorrent distribution site Kickass Torrents (KAT) with millions of unique daily visitors was shut down by the U.S. authorities following the arrest of its alleged owner Artem Vaulin . Shortly after the shutdown, a group of devoted original KAT staffers launched the Katcr.co forum in hopes of bringing back KickassTorrents to its former glory, in the near future. Now, Katcr.co has launched a fully operational torrent website, which looks identical to the original Kickass Torrents (KAT) portal, TorrentFreak reports . Note: In case the new KickassTorrents website does not immediately load, give it a few tries, as the site is experiencing a massive surge in traffic. Launched today and located at KATcr.co/new , the new Kickass Torrents site starts with a clean user database while many members of the original staff are back on board, including its dedicated uploaders. Here's what the KA

Install linux on Android : GNUrootdebian

Image
Working more with Linux is like going more deep into computers. Linux platform provides powerful tools for networking,server handling and development purposes. Read more about What is linux?  and  Linux Distributions Android is a mobile operating system developed by Google, based on the Linux kernel and designed primarily for touchscreen mobile devices such as smartphones and tablets How many times have you been on the go and discovered that you needed to pull off some Linux-fu, but the only piece of tech you had was an Android device? Imagine if you were able to fire up a Linux command prompt on that device and make use of apt-get to install whatever command line tool you needed. Wget? No problem. Traceroute? Yes. Ssh? Absolutely. Just about any tool you can install on Linux, you can install linux on Android. Even some graphical apps will work (even though command line tools work best). Before we get going, I should warn you that this isn't like installing a full-blown Linux dist