Posts

Anonymous voice changer. how it works.

Image
Hello, Guys am sure you have wondered what kinda voice do the  Anonymous uses when broadcasting on air, and you may have also tried your hands to download some of the voice changers applications, which resemble with real anonymous voice, and today will show you the exact voice changing machine that actual anonymous hackers use today. The Anonymous voice changer download link;  here Use the key below to Activate it. Register Name: www.serials.ws Register Company name: www.serials.ws The Registerd Lisence key: AA-15F01A-9719E1-EC031E-4C97F2-65ACA8 PLEAS TAKE Note: I Don't Make Any Copyright Infringements.

The world's Most Secure OS.

Image
Most people what to be browsing anonymously on the go without needing to install any software on your system buy just with a pen drive of at less 4GB. Tools You need to have is a pen drive of 4GB a system to use and TAILS(the Software) What is this Tails you are talking about? Tails is a live system that aims to preserve your privacy and anonymity online It helps you to use the Internet anonymously and circumvent censorship almost anywhere you go and on any computer, you fine ur hands-on but leaving no trace unless you ask it to explicitly. It is a complete operating system which is been designed to use on any USB stick or  DVD no matter the operating system on the original computers. This Tails so powerful that comes with several built-in applications and pre-configured with security features in mind: web browser, instant messaging client, email client, office suite, image, and sound editor, etc. Tails is a VPN on its own and it a free software and is based on Debian GNU/Linu...

Penetration testing Why It Important to your organization

pt is very important to your organization's system as we are in a digitalized world. as you know information is key and money no organization is free from hackers, some hack for fun, and some form money, here I will show you why it is important for your organization to conduct a pentest one in a while. the reason, why you need a pentest, is that it helps to find vulnerabilities in your system. weather you like it or not, ur system is never powerful enough to stop an attack or it immune to vulnerabilities. there is a rule called the 90/10 rule which says the security of a system is 10% on the software and 90% of a security system depends on the user. once ur system is hacker, even before it is hack u need professionals like   Kevin Mitnick Security  (Security testing isn’t just something we do. It’s all we do. And we’ve been doing it better than anyone, since the dawn of the industry.) reason two is that it helps you reduce a network downtime once in a year ur organization got ...

Top Five Tools you most use in kali.

Image
If you reading this it means u are interested in hacking, are already a hacker or looking to safeguard your system/network from attackers. the tools am about to show you, are tools u need to know in other to be a good hacker  also apart from these tools you can check the free ebooks sections on this site to download them and read. first is  Nessus this tool on it own is very good and a powerful scanning tool, it can scan multiple a site at a time and has a lovey reporting system. NMAP Nmap as we know today is one of the most powerful tool use for assessment when u want to scan a system, it allows you to find open ports and service and  version number  Wireshark Wireshark is one of my own favorite tools that I use to analyze networks. mostly it is used to scan packets that are passing through the network. for u as a network administrator, u can use these tools to troubleshoot your network. Burtpsuite is an integrated platform for performing security testing of web app...

Ruhr University Shut down It IT System due to A Cyber attack

Image
Ruhr University A University in Germany called RUB has recently been attacked with ransomware that causes the university to shut down it It Systems the attack occurs on the 6th may 2020 and lasted for two days, most of it system has been inaccessible due to the hack. the university clam that attackers have no access to its external servers. but its online learning system remains accessible to students and teachers. but the university email remains unacceptable due to the hack. no hacking group has taken responsibility for the hack according to the school's website the management gives instructions to student and teachers  Due to the cyber attack on our univeristy,  all users with a RUB login ID must set a new password immediately. This also applies to so-called combined services that are used to run functional email addresses. Changing the password is a security measure. Instructions and detailed information for students and members of the teaching and administration staff ...

Human Behavior in Social Engineering

Every Social Engineer targets specific behavioral traits in the victim so as to extract maximum information out of him. These behavioral traits include but are not limited to:    The excitement of Victory Mr. X gets an e-mail stating, “You have won 1 Million Dollars and to claim the winning amount, fill in the attached document and forward it to the email id: email.xyz.com. Switch off your antivirus as it may block the download due to highly encrypted Digital Signature of the documents”. Out of Excitement he switches off his Antivirus and proceeds as ordered and downloads the document and opens it but finds it corrupted. Little does he know that he has just downloaded malware on his machine which allows the email sender to gain remote access to his machine.   Fear of Authority Many people are apprehensive in the presence of someone they perceive as an authority figure, it is not that person they are apprehensive about but most likely the position and power of the per...

Social Engineering Life Cycle

Every Social Engineering attack is unique, but with a little understanding of the situations encountered, we can draft a rough the cycle of all the activities that a Social  The engineering project goes through leading to a successful outcome. The below figure shows a general representation of the Social Engineering Life Cycle in four main stages:  FootPriniting>>>>Establishinh Trust>>>>>Psychological Manipulation>>>>EXIT 1. Footprinting: It is the technique of accumulating information regarding the target(s) and the surrounding environment. Footprinting can reveal the individuals related to the target with whom the attacker has to establish a relationship, so as to improve the chances of a successful attack.  The information-gathering during the Footprinting phase includes but is not limited to:  List of employee names and phone numbers  Organization Chart  Department Information  Location information Footprinting generally refe...

BLIND SQL INJECTIONS

SQL injection is a well know and exploited technique that mainly exploited in web enviroment.sql injections allows an attacker to reach the database. which ask the database true or false questions and determine the answer based on the system's response. examples of SQL injections http://victim/listproducts.asp?cat=books SELECT * from PRODUCTS WHERE category=‘books’ http://victim/listproducts.asp?cat=books’ or ‘1’=‘1 SELECT * from PRODUCTS WHERE category=‘books’ or ‘1’=‘1’ Basically, on SQL injection the attacker gets results. Blind sql injections Same vulnerability as SQL injection *Very* common vulnerability Sometimes (wrongly) ignored during tests as unexploitable or not detected The attacker can not retrieve results The attacker can only retrieve a True/False condition example. of blind sql injections http://victim/showproduct.asp?id=238 SELECT * from PRODUCTS WHERE id=238 Sometimes, due to the code surrounding the SQL query (grouped or sorted) the attacker can’t UNION and no ‘g...

Popular posts from this blog

INSTALLING VISUAL PARADIGM ON KALI LINUX

installing WordPress on Kali linux

Things you need to Know About Nigeria’s Cybercrime Act 2015