Follow by Email

Search This Blog

Youtube Videos

Featured post

How to make kali linux full screen in vmware

Recent PostAll the recent news you need to know

Malware Analysis Books

Malware Analysis Books
Malware Analysis Books

There are a bunch of books on Malware Analysis and over the last couple of years, the number of available options has increased a lot. A quick search on Amazon might show some of the available options that you can start with, and you ‘ll have also a lot of options for learning Assembly, Network Detection and many other tools used for this.
If you’re looking for some specific recommendations check this list:

Setting up your hacking attempt - information gathering

Many beginners, myself included, thought/thought that there was a special, premeditated way to 'hack' everything or 'something'.
The reality is slightly more complicated. There is no 'how should I hack' that is prescribed on forums. You have to figure it out yourself as a hacker, and the tools and skills to figure out yourself how to hack something you can find online. After all, if there was a known Facebook hack, Facebook would have ensured that the leak was closed.
information gathering

One of the most important steps that beginners overlook, because it is not necessarily the most exciting activity ever, is Information Gathering. In short: to learn everything there is to know about your target. This step is perhaps the most important one and includes most of all your time spent in hacking because you never have 'all' information and thus never stop looking up information.

Kali Linux Login Loop [Solved]

Fix Kali Linux Login Loop [Solved]

This video shows how to quickly fix the login screen loop in the Kali Linux. The fix is very easy: While at the login screen press Ctrl+Alt+F1 or Ctrl+Alt+F2 to open terminal after that type the username and password in terminal. Now follow commands as below 1 -sudo apt-get update 2 -sudo apt-get upgrade 3 -dpkg --configure -a 4 -sudo apt-get install cinnamon-control-center-data 5 -gdm3 --version 6 -apt-get --reinstall install gdm3 7 -apt-get --reinstall install gnome 8 -apt-get --reinstall install gnome-shell 9 -dpkg-reconfigure gdm3 10-reboot Fix Kali Linux sources.list Repositories Kali Linux sources.list Repositories

The zodiac cipher is still a mystery

decrypt zodiac cipher

October 20, 1968, Benicia, California, USA. A motorcyclist found the bodies of a young couple in the alley. A few months later, another couple was shot in a park several kilometers away. The killer later reported to the police station in the telephone booth. In addition to acknowledging his own murder, he also claimed responsibility for the first murder.

CeWL - Custom Word List generator

The CeWL application, i.e. the  Custom Word List generator,  deserves attention due to its operation.
CeWL - Custom Word List generator

The generator can create dictionaries based on the expressions found on the website provided in the parameter. The user can define the depth of search on the site, the minimum number of characters from which the password should be composed. In addition, the application as a crawler / spider  tool can also collect e-mail addresses found on the website.

Kali Linux Books 2018

a collection of books released for Kali Linux in 2017
 Kali Linux is one of the best known and most used Linux distributions for security testing, digital investigation and penetration testing. it has grown in popularity so quickly that it's now seen as an essential part of every security expert (and hacker) toolkit.

it's based on Debian GNU / Linux, which is one of the large and famous distributions of the open-source operating system. It is explicitly built with safety engineers in mind - it consists of more than 600 packages for penetration testing. It can easily be executed using a live CD or USB or used in virtual machines. Some security experts even speculate that the growing popularity of Kali Linux can be linked to the many amateur attacks that they oppose. The distribution is very easy to use, even by beginners and the large collection of applications has contributed to the outlaws to an extensive collection of hacking tutorials.

Raspberry Pi equipment and accessories

Raspberry Pi equipment and accessories
Raspberry Pi equipment and accessories
Accessories and equipment are available for Raspberry Pi, no matter which model, such as sand more. As confusing as that is, that's how good it is. The prices are comparatively low and the availability very good. It looks a lot worse on other mini computers.
The only question is, what do you need, what is optional and still useful?
Accessories for Raspberry Pi
The minimum equipment includes a power adapter and a memory card. Even if you might have a power adapter, such as a cell phone charger, you should still get a power adapter that is suitable for Raspberry Pi. Cell phone chargers and overly cheap China bulbs are rarely suitable as a stable power supply of a Raspberry Pi.
Also, you should get at least a second memory card, if you miss a configuration while experimenting. Then you can either make a backup on the second memory card or has a second card for further experimenting in the drawer.

power adapter
Memory Card (MicroSD Card)
Optional accessories for Raspberry Pi
In the further equipment one is relatively free. A housing is not a mistake if you want to avoid damage and short circuits on the board. Unless you already have it in the house, an HDMI and Ethernet cable will not hurt. If you have Wi-Fi, then a wireless adapter for the USB port.
There are whole accessory kits for Raspberry Pi. Whether that makes sense, the spirits are different. In principle, the purchase is a good idea. Then you have everything together. Unfortunately, one has no influence on the quality and composition. It may not be much use afterward. No matter how you do it, you will always have to buy something afterward.
Which model?
Since 2012 there is Raspberry Pi and every year new models have appeared, which has become a bit confusing. This raises the question, which model should it be? There is really only one really meaningful answer: One should always choose the B-model, which is currently the most current.
In principle, the models also go A and A +. However, they are more suitable for projects that should use as little power as possible. The computing module is also intended for special applications.
The right power supply
Choosing the power supply will determine if experimenting and working with Raspberry Pi will be a nuisance or if you can have many successful experiences. Because not every power supply is equally suitable for Raspberry Pi. This is not due to Raspberry Pi, but to the power supplies that are either poor in quality or unsuitable for powering Raspberry Pi.
Memory card (SD card and MicroSD card)
The operating system for Raspberry Pi is started from an SD memory card (SD or MicroSD card) and must first be written to this memory card. The choice of memory cards is enormous.
Generally, it is only recommended to buy MicroSD cards. Even if you work with models A and B. The microSD cards can then be plugged into these two models via an adapter.
It is generally advisable to use memory cards with 8 GB. There is also enough space if you want to install software.
Wireless LAN Adapter
If you want to do without the screen and keyboard on Raspberry Pi, then you need a connection to the local network. Either via Ethernet via RJ45 cable or via WLAN, whereby you need a separate WLAN adapter for the USB. It is recommended that Raspberry Pi in any way has access to the Internet. Then you can easily install software.
Audio Enhancements
The analog audio output of Raspberry Pi is extremely bad. Noise, humming and a miserable sound are simply no fun. If it goes beyond experimentation, then audio extensions for GPIO or USB are recommended.
heatsink
Heatsinks for Raspberry Pi are a popular accessory and are often recommended. Usually three pieces. One for the system-on-chip, one for the interface module and one for the voltage converter. Finally, equivalent building blocks in a full-size computer also have heat sinks.
Now, there is no reason to miss Raspberry Pi heat sink. For one thing, it is not as powerful in its ground state that the chips can get so hot that they are damaged. In addition, the chips are designed so that no problems occur in the narrowest housing under full load.
software
Typically, for the first steps with Raspberry Pi you take the Linux distribution Raspbian. This is not always the preferred distribution. Special tasks always have certain requirements that a Raspbian cannot fulfill. Of course, you can expand any distribution and install all conceivable software packages. But sometimes it is better to choose a different distribution, which brings a special software equipment for the requirements.
Extensions via the GPIO header
Electronic Components
Overview: Accessories for Raspberry Pi

Overclocking Raspberry Pi

Overclocking Raspberry Pi
Raspberry Pi has a CPU clock speed of 600 or 700 MHz depending on the model. If you want you can overclock Raspberry Pi, depending on the model, up to a maximum of 1,000 MHz or 1,200 MHz. An appropriate configuration is provided on the software side.
You have to know that Raspberry Pi overclocks dynamically. That is, if the load is high, then Raspberry Pi will dynamically clock up until it reaches the set clock rate. If overclocking is not necessary, then it does not happen and Raspberry Pi clocks with its basic clock.