Posts

Showing posts from March 27, 2016

Adding More Exploits In Kali Installation.

Image
Exploit Database knowtechno.com Hello guys in today's post we will discuss about what are the things we were not doing to be in the list of modern blackhats and the top in the list is “Not Knowing About The Exploit-db”. Till now we have all been working only on the mainstream exploits which were well known but old enough to sometimes fail mainly for the updated operating systems. But now it is time to move on to the next step. Many of us may have already realized till now that it is pretty hard to break into a fully updated and patched operating systems so to move on to the real world of penetration testing we first have to know about the exploit-db. Visit Here For Much Better And Easier Way.  or Here! Exploit-db From the Devs. The Exploit Database (EDB) is a CVE compliant archive of exploits and vulnerable software. A great resource for penetration testers, vulnerability researchers, and security addicts alike. Our goal is to collect exploits from various sources an

Denial Of Service {DoS} Attacks and What It Is For beginners.

Image
Like any other things related to hacking, a DoS Attack isn't always anyone's reach. However, it can be understood very easily if someone explains properly. In today's post, I will try to come up with a brief and simple explanation of the denial of service attacks, before I begin use of confusing phrases like packets and all that. We're going to start at the easiest point. What Specifically does the denial of service attack do? We all know that wireless hacking gives us the password for the wireless. Man in the middle attack gives us the power to spy a network traffic. Vulnerability exploitation gives you the control over the victims machine. In all these places where does the DoS stand? What does it exactly do? Basically, what it does is it takes the right of the victim user to use its machine. In today's scenario, it is used to interrupt online services. Many black hats/hacktivists groups do this type of attack on governments and private websites to make them

Windows Will Have Ubuntu In It.

Image
Source: slashgear.com According to sources at Canonical, Ubuntu Linux's parent company, and Microsoft, you'll soon be able to run Ubuntu on Windows 10. This will be more than just running the Bash shell on Windows 10. After all, thanks to programs such as Cygwin or MSYS utilities, hardcore Unix users have long been able to run the popular Bash command line interface (CLI) on Windows. With this new addition, Ubuntu users will be able to run Ubuntu simultaneously with Windows. This will not be in a virtual machine, but as an integrated part of Windows 10. Sponsored Links The details won't be revealed until tomorrow's morning keynote speech at Microsoft Build. It is believed that Ubuntu will run on top of Windows 10's recently and quietly introduced Linux subsystems in a new Windows 10 Redstone build. Microsoft and Canonical will not, however, sources say, be integrating Linux per se into Windows. Instead, Ubuntu will primarily run on a foundation of

The Remidi T8 First Wearable Music Instrument.

Image
The Remidi T8 turns the whole human hand into music by playing infinite combinations of notes and sounds A NEW WAY TO CREATE MUSIC The T8 gives complete motion freedom, works on every surface and allows to combine motion with music, in order to perform and approach with music in a whole new way and free the art of sound. Sponsored Links AIR MODULATION The motion sensors opens to a wider expression of music: players can still alter the sound while a notes already started, simply by moving their hand or twisting their wrist. Sponsored Links THE BRACELET AND THE GLOVE The wristband hosts the control center, while the glove hosts 8 pressure sensitive spots to trigger notes. They plug to each other through the magnetic connector on the  back of the hand. Sponsored Links ONE HAND, ENDLESS KEYBOARDS The encoder on the bracelet has the main function to browse through users' note sets. Players just turn it to switch from a note set to another, from

Android N On any Device

Image
Android N has been released!.. Well not completely by the way. it would be sometime before it will be released to general public, but at least it gave chance to some flashaholics to try the things before hand and also it gives us the opportunity about what to expect in the new android version of the Google tech giant. Too bad for flashaholics like me and out there somewhere who have unsupported device and would be waiting with the general public till the launch. But there is some good news for them, Those who cant wait any any more to get their hands on the new " Android N " a new xposed module is there for them " Android N-ify " Just Click for the download page. Sponsored Links Android N-ify Xposed Module by XDA Senior Member MrWasdennnoch aims to bring some of the features and look of Android N to devices running Android Lollipop and Marshmallow. Currently, the Xposed module is in beta state, meaning you can expect the occasional bug and ‘d

Protection Against DDoS

Image
Distributed denial-of-service (DDoS) attacks are always in top headlines worldwide, as they are plaguing websites in banks, and virtually of almost every organization having a prominent online presence. The main cause behind the proliferation of DDoS attacks is that there is a very low-cost that the attacker has to incur to put such attack in motion. Fortunately, today various prevention methods have been developed to tackle such attacks. Before delving further into understanding about the ways to prevent DDoS attack, let’s first understand what exactly a DDoS attack is! ADs Understanding DDOS Attack A DDoS (distributed denial-of-service) attack is an attempt made by attackers to make computers’ resources inaccessible to its anticipated user. In order to carry out a DDOS attack the attackers never uses their own system; rather they create a network of zombie computers often called as a “Botnet” – that is a hive of computers, to incapacitate a website or a web server.

Some Funny Tricks With Chrome Developer Tool

Image
As you probably know, there is a button on the right-click menu of Google Chrome and IE 10+ called ''Inspectelement''. This the developer tool. And you can have a lot of fun with it. I'll give you two examples on how to use it in this tutorial. ADs ___________________________ 1. Change the text of a webpage: ‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾ You can have fun on webpages just by changing the value of a <span> (a text label). For example, go on the 4shared.com site (a free file sharing site). Then create an account if you don't have one (or just connect with Google, Facebook or Twitter). When you are done, upload something that is heavy (more than 100 MB) by dragging and dropping it on the home page of 4shared. Then you can see an uploading status window on the screen. So right-click on the percentage and click on ''Inspect element''. Now you can see a little window that appears on the bottom of the web browser. T