Latest Post

How to Scan for Rootkits, backdoors and Exploits Using ‘Rootkit Hunter’ in Linux
rkhunter linux
What Is Rkhunter?
Rkhunter (Rootkit Hunter) is an open source Unix/Linux based scanner tool for Linux systems released under GPL that scans backdoors, rootkits and local exploits on your systems.
It scans hidden files, wrong permissions set on binaries, suspicious strings in kernel backdoors and possible local exploits. It does this by comparing SHA-1 hashes of important files with known good ones in online databases.
A rootkit is a malicious software designed to obtain root-level access to a computer while hiding its presence or identity from antivirus software. Common ways for rootkits to get installed on your system are through trojan horses contained in drive-by downloads, known system vulnerabilities, suspicious email attachments, web surfing, or simply by password cracking.
there are several rootkit scanner tools for Linux, One such rootkit detection tool is called Rootkit Hunter (rkhunter).

Install Rootkit Hunter Scanner in Linux
If you are running Kali Linux you can install it by this terminal command
[success title="Install rkhunter in kali linux" icon="check-circle"] apt-get install rkhunter [/success]
To install rkhunter on Fedora execute the following command:
[success title="install rkhunter in Fedora" icon="check-circle"] sudo dnf install rkhunter-1.4.2-11.fc24.noarch [/success]
if you are not using kali linux Download Rkhunter by this terminal command
[success title="Terminal command" icon="check-circle"] wget [/success]
Once you have downloaded Rkhunter, run the following commands as a root user
[success title="Terminal command" icon="check-circle"] tar -xvf rkhunter-1.4.2.tar.gz
 cd rkhunter-1.4.2
 ./ --layout default --install [/success]
To update Rkhunter
[success title="update Rkhunter" icon="check-circle"] rkhunter --update [/success]
rkhunter update

To scan your system using rkhunter, run the following.
[success title="Terminal command" icon="check-circle"]sudo rkhunter -c  [/success]

Once rkhunter is initiated, it will run a series of tests as follows.
  • Compare SHA-1 hashes of system binaries against known good values maintained in the database.
  • Check for known rootkit files and directories, as well as rootkit strings.
  • Perform malware detection, including checking for login backdoors, sniffer log files, and other suspicious directories.
  • Perform trojan specific checks such as examining enabled xinetd services.
  • Perform checks on network ports and interfaces.
  • Perform system boot checks.
  • Perform group and account checks.
  • Perform system configuration file checks.
  • Perform filesystem checks.

Top 7 Best HTML5 Books For Beginners To Learn Web Design

HTML5 is the latest evolution of the standard that defines HTML. The term represents two different concepts: It is a new version of the language HTML, with new elements, attributes, and behaviors, and a larger set of technologies that allows more diverse and powerful Web sites and applications
It helps audio and video playback without the usage of plug-ins.
It offers better and clearer code to developers and engineers.
it helps in saving cost and time of the developer. The new options of HTML also present great assist for mobile devices.
A List of good and helpful sources for learning HTML5:

1- HTML5: Up and Running: Dive into the Future of Web Development
 HTML5 Up and Running: Dive into the Future of Web Development

The book offers encoding information related to audio and video integration to web pages.
it has way too much information about video and audio compression. Inside of the Video and Audio tag explanations, Pilgrim goes on to talk about video and audio containers, how codecs work, what bit-rates mean, how copyright licensing affects supported file types,.
It factors to the usage of Modernizr JavaScript library for detecting HTML5 options that are supported in the user browser.
There are many code examples, and in all cases they’re very relevant, easy to digest, and easy to understand in their context. And again, in all cases, the code examples seem to be very accurate and usable.
For more details check out HTML5: Up and Running: Dive into the Future of Web Development book review.

2- Head First HTML5 Programming
Head First HTML5 Programming

What can HTML5 do for you? If you’re a web developer looking to use HTML5, you might be wondering how much has really changed. Head First HTML5 Programming introduces the key features including local storage, audio and video tags, geolocation, and the canvas drawing surface and uses concrete examples and exercises to apply and reinforce these concepts
The initial chapters present large information on JavaScript, which includes the introduction on the use of DOM via JavaScript. It supplies quite a lot of information on the usage of canvas, web workers, web storage, video, and geolocation.
There are numerous examples, photos, puzzles, diagrams and games to explain the strategies. In a nutshell, the book offers clear pictures, illustrations, concepts and is ideally fitted to newcomers.
•  Get the low-down on changes to basic HTML
•  Understand JavaScript’s relationship to HTML5
•  Bring out your inner artist with Canvas
•  Use the technology to add audio and video
•  Take advantage of local storage
•  Put your browser to work with Web workers
•  Learn how HTML5 deals with geolocation, and more
Buy This Book
For more details check out Head First HTML5 Programming book review.

3- HTML5 for Masterminds, 2nd Edition: 
HTML5 for Masterminds, 2nd Edition

How to take advantage of HTML5 to create amazing websites and revolutionary applications
This book is not an introduction of HTML5 but instead a complete course that will teach you how to build compelling websites and amazing web applications from scratch. Every chapter explores basic as well as complicated concepts of HTML5, CSS3 and Javascript. Information is supported by fully functional examples to guide beginners and experts through every single tag, style and function included in the specifications.
This Book Includes:  447 examples explained
Learn how to:
  1.     Create HTML documents
  2.     Create CSS style sheets
  3.     Program in Javascript
  4.     Create 2D and 3D Graphics
  5.     Create 2D and 3D Animations
  6.     Create 2D and 3D Video Games
  7.     Take your Applications Full Screen
  8.     Generate Audio for your Video Games
  9.     Create Audio Effects in 3D
  10.     Take Pictures from the WebCam
  11.     Create a System to make Video Calls
  12.     Transfer Data Peer-to-Peer
  13.     Process Audio Files
  14.     Closed Captioning your Videos
  15.     Create CSS3 Animations
For more details check out HTML5 for Masterminds, 2nd Edition book review.

4. HTML5: The Missing Manual
HTML5: The Missing Manual

HTML5 is greater than a markup language it’s a collection of several independent web standards. Fortunately, this expanded guide covers everything you need in one convenient place, you will learn how to construct web apps that include video tools, dynamic drawings, offline web apps, geolocation, drag-and-drop, and lots of different features. HTML5 is the future of the Web, and with this book, you will reach it shortly.
For more details check out HTML5: The Missing Manual book review.

5- The Definitive Guide to HTML5
The Definitive Guide to HTML5

The Definitive Guide to HTML5 begins by tackling the fundamentals of HTML5, guaranteeing that you understand best practices and key uses of all the essential components, together with those new to HTML5. This section additionally covers utilization of JavaScript, CSS2 and CSS3, and DOM manipulation, making you proficient in all the core aspects of modern website creation.

The next a part of the book covers the related W3C APIs that surround the HTML5 specification. You’ll obtain a thorough working knowledge of the geolocation API, the communications API, web storage, and the new drag and drop functionality.

The Definitive Guide to HTML5 then dives into the key media enhancements of HTML5 and its surrounding technologies: SVG, Canvas, audio, and video. The book rounds off with high-stage coverage of concurrent programming, offline applications, security, and testing and debugging HTML5.
For more details check out The Definitive Guide to HTML5 book review.

6- Responsive Web Design with HTML5 and CSS3
Responsive Web Design with HTML5 and CSS3

The author of Responsive Web Design with HTML5 and CSS3 illustrates that responsive web design is not a huge single monolithic thing but a series of existing technologies (HTML5, CSS3) and design techniques (flexible grid layout, flexible images and media and media queries) instead. The majority of the book mainly focuses on HTML5 and CSS3 and the powerful enhancements these technologies bring about. In addition to their application in Responsive web design the author explores new HTML5 elements and the vast improvements in CSS3 aesthetics.
The book contains:
    Many examples of modern techniques available for building a responsive website nowadays.
    Details on the 'Responsive Web Design' concept
    Comprehensive explanations of fluid grid layout,  flexible images and media query
    Many websites that are highly useful tools for a web developer
For more details check out Responsive Web Design with HTML5 and CSS3 book review.

7- HTML5 Games: Creating Fun with HTML5, CSS3 and WebGL

HTML5 Gamesshows you how to combine HTML5, CSS3 and JavaScript to make games for the web and mobiles - games that were previously only possible with plugin technologies like Flash. Using the latest open web technologies, you are guided through the process of creating a game from scratch using Canvas, HTML5 Audio, WebGL and WebSockets.
For more details check out HTML5 Games: Creating Fun with HTML5, CSS3 and WebGL book review.

Best Kali linux books
Kali is very popular among penetration testers because of its environment, it has hundreds of hacking, pentesting and forensics tools which allows you to gather information, find vulnerabilities and create exploits.
It’s one of the most used penetration testing distro It’s used by black hat hacker, grey hat hacker, and White Hat Hackers,
It always depends on you and how you use it, but to perform such actions you need to have great hacking and pentesting skills.
To become an expert penetration tester's you must strive to improve your pentesting skills with Kali by learning new things daily and believe me books has the potential to make you master despite being a newbie.

Best Java Programming Books If you’re searching for some good books to learn Java, you’ve come to the right place.
These books contain exercises and tutorials to improve your practical skills, at all levels!
If you are a beginner or even a professional Java Programmer those are the best Java books to refresh and strengthen your programming skills

Top five books every computer programmer should read at least once of them
Top five Programming books

1) Structure and Interpretation of Computer Programs
2) Introduction to the Theory of Computation
3) Artificial Intelligence: A Modern Approach
4) Types and Programming Languages
5) Introduction to Algorithms

Machine learning
Machine learning is to learn from data repetitively and to find the pattern hidden there. By applying the results of learning to new data, in other word Machine learning  allows computers to analyze past data and predict future data. Machine learning is widely used in familiar places such as product recommendation system and face detection of photos. Also, as cloud machine learning services such as Microsoft's "Azure Machine Learning", Amazon's "Amazon Machine Learning", and Google's "Cloud Machine Learning" are released.
Machine learning Books

a single book wont help you fully master machine learning , simple cause It’s a complicated many topics, purposes and benefits in real-world applications.
This article is written to help novices and experts alike find the best Machine learning books to start with or continue their education. there is so many resources available and it's really confusing where to start
so in this article i will highlight the best machine learning books that you can start with and dive deeper into machine learning !

Best Reverse Engineering Books
Whats is Reverse engineering is the art of extracting information from a given man-made device, it's taking apart an object to see how it works in order to duplicate or enhance the object
The process often involves disassembling something and analyzing its components and workings in detail, You can reverse engineer anything that can be broken apart, and then put back together.
Reverse engineering is now frequently used on computer hardware and software.
Best Reverse Engineering Books

A famous example of reverse-engineering involves San Jose-based Phoenix Technologies Ltd., which in the mid-1980s wanted to produce a BIOS for PCs that would be compatible with the IBM PC's proprietary BIOS. (A BIOS is a program stored in firmware that's run when a PC starts up; see Technology QuickStudy, June 25.)

There is Growing demand for computer experts who can perform ethical hacking work due to the increased use of the Internet. However, it is not easy to become a ethical hacker without the basic knowledge of computer and network security,
Best Hacking Books

it's difficult for beginners to become a hacker, without learning from proper sources, so experts recommend always to start reading book's about networking and hacking to know what you are really doing and how to do it the right way.
hacking is like an art and it's really easy to learn once you start in the right place,
taking your first step into ethical hacking may seem difficult but once you take that step things will become easy and it will feel like you just break a huge wall that was holding you from entering this exciting art,

how to hack wifi password kali linux tutorial 
recently, most "noob" are looking for an easy wireless networks hacking WiFi,
Perhaps now the best wifi cracker for beginners is airgeddon .
Airgeddon in semi-automatic cycle guides you through all the stages: from the translation of the wireless card in monitor mode, through the choice of target and capture of 4 way handshake to crack passwords WiFi crack.
YouTube Video :  how to hack wifi password using airgeddon
how to hack wifi password
airgeddon Installation
Installing airgeddon bash script can be performed in any Linux, but the script itself require other packages (dependence). All of them are already available in distributions like Kali Linux and BlackArch. When you start the script it will check for all the packages and give you result with the missing packages, still it can work fine if some of them are missing …
For example, in Kali Linux 2016.2 those tow packages were missing

Programming language rankings TOP-10 2016 latest comparison
Top Programming Languages to Learn in 2017
top 10 programming languages
One of the most asked question those days is What programming language should I learn?
In fact, this is a very important choice you have to make.
You don’t want to fail that’s why you have to make the right choice
"The choice of programming language will determine your future engineering life"
The failure pattern that is actually:
  • hurdle of the chosen language is too high, that make you give up on the way
  • You are not able to do what you really wanted when you start learning, you are not able to program what you want
  • There is no demand for the language you choose
So this article was written to help you chose the right Programming language to start with
from the viewpoint that it is easy to get started, various application development can be done, and it will be useful for change and independence!
Reading this will not only deepen your knowledge of programming languages, but also you will definitely see the programming language you should learn, so be sure to check it out
"Getting Started with recommended programming language "

Intercepter-NG v2.0 is an Android penetration testing app.
by using Intercepter-NG you will be able to intercept and analyze un-encrypted communications over WiFi network.

Intercepter-NG is a network toolkit for various types of IT specialists and an easy-to-use application to intercept communication.
it's an MiTM attacks tool , you can perform different kinds of MiTM attacks using this android app

  1. Android 2.3.3+
  2. Root
  3. Busybox
Intercepter-NG v2.0 Features:
  • Intercept communications.
  • Analyze data packets.
  • Hijack sessions. ( cookie hijacking )
Session hijacking, also known as TCP session hijacking and cookie hijacking , is a method of taking over a Web user session by surreptitiously obtaining the session ID and masquerading as the authorized user.
  • SSL Strip connections.
SSLStrip is a type of MITM attack that forces a user browser into communicating with an adversary in plain-text over HTTP, it simply watch for HTTPS links and redirects, then map those links into look-alike HTTP
  • Monitor target's web activity
  •  ARP Poisoning
ARP stand for “Address Resolution Protocol” this type of attack sends falsified ARP messages over a local area network to link the attacker MAC address with the IP address of a legitimate computer or server on the network.
  •  Network Discovery with OS Detection
  •  Network Traffic Analysis
  •  Passwords Recovery
  •  Files Recovery

1. Download Intercepter-NG V2.0 from Github
2. Install Busybox from Google Store 
Remember your Android phone must be rooted

2. Install and open the app click on the Radar icon in the upper left corner of IntercepterNG.
IntercepterNG Android
3.After you click on the radar icon It will scan the network and list all the connected  devices 
Intercepter-NG list

4. Now select the Devices you want to spy on from the list  , it will show the operating system next to the IP address 
Intercepter-NG Android hacking app

5. Click the Play icon on the top right then  Select the Settings icon
Now tick the check box of  Save pcap session and change the memory location to SD Card if you want the file to be saved on your SD card.
Intercepter-NG Android
6.Return to main menu and then select the play button
now it will start downloading packs
Android wifi hacking

7. To see graphical capturing of data click the Wireshark icon click the play button 

Android Wireshark
8.  Click the cookies icon and wait for the cookies to load then select any one of the IP shown it will load the web page your victim are in.

Watch YouTube Video to see the app in use

Last update : 26.09.2016 - Intercepter-NG [Android Edition] v2.0
+ Select\Copy packet data in RAW Mode
+ Pcap filter on reading *.pcap
+ Save cookie button
+ Show HTTP Requests
+ HTTP Injects
+ ARP Cage
A lot of improvements and fixes
- Resurrection\Gallery
Tested on 4/5/6/7 Android. Should also work on 2/3.

Author Name

{picture#YOUR_PROFILE_PICTURE_URL} YOUR_PROFILE_DESCRIPTION {facebook#} {twitter#} {google#} {pinterest#} {youtube#}

Contact Form


Email *

Message *

Powered by Blogger.