Latest Post

Top five books every computer programmer should read at least once of them
Top five Programming books

1) Structure and Interpretation of Computer Programs
2) Introduction to the Theory of Computation
3) Artificial Intelligence: A Modern Approach
4) Types and Programming Languages
5) Introduction to Algorithms

Machine learning
Machine learning is to learn from data repetitively and to find the pattern hidden there. By applying the results of learning to new data, in other word Machine learning  allows computers to analyze past data and predict future data. Machine learning is widely used in familiar places such as product recommendation system and face detection of photos. Also, as cloud machine learning services such as Microsoft's "Azure Machine Learning", Amazon's "Amazon Machine Learning", and Google's "Cloud Machine Learning" are released.
Machine learning Books

a single book wont help you fully master machine learning , simple cause It’s a complicated many topics, purposes and benefits in real-world applications.
This article is written to help novices and experts alike find the best Machine learning books to start with or continue their education. there is so many resources available and it's really confusing where to start
so in this article i will highlight the best machine learning books that you can start with and dive deeper into machine learning !

Best Reverse Engineering Books
Whats is Reverse engineering is the art of extracting information from a given man-made device, it's taking apart an object to see how it works in order to duplicate or enhance the object
The process often involves disassembling something and analyzing its components and workings in detail, You can reverse engineer anything that can be broken apart, and then put back together.
Reverse engineering is now frequently used on computer hardware and software.
Best Reverse Engineering Books

A famous example of reverse-engineering involves San Jose-based Phoenix Technologies Ltd., which in the mid-1980s wanted to produce a BIOS for PCs that would be compatible with the IBM PC's proprietary BIOS. (A BIOS is a program stored in firmware that's run when a PC starts up; see Technology QuickStudy, June 25.)

There is Growing demand for computer experts who can perform ethical hacking work due to the increased use of the Internet. However, it is not easy to become a ethical hacker without the basic knowledge of computer and network security,
Best Hacking Books

it's difficult for beginners to become a hacker, without learning from proper sources, so experts recommend always to start reading book's about networking and hacking to know what you are really doing and how to do it the right way.
hacking is like an art and it's really easy to learn once you start in the right place,
taking your first step into ethical hacking may seem difficult but once you take that step things will become easy and it will feel like you just break a huge wall that was holding you from entering this exciting art,

how to hack wifi password kali linux tutorial 
recently, most "noob" are looking for an easy wireless networks hacking WiFi,
Perhaps now the best wifi cracker for beginners is airgeddon .
Airgeddon in semi-automatic cycle guides you through all the stages: from the translation of the wireless card in monitor mode, through the choice of target and capture of 4 way handshake to crack passwords WiFi crack.
YouTube Video :  how to hack wifi password using airgeddon
how to hack wifi password
airgeddon Installation
Installing airgeddon bash script can be performed in any Linux, but the script itself require other packages (dependence). All of them are already available in distributions like Kali Linux and BlackArch. When you start the script it will check for all the packages and give you result with the missing packages, still it can work fine if some of them are missing …
For example, in Kali Linux 2016.2 those tow packages were missing

Programming language rankings TOP-10 2016 latest comparison
Top Programming Languages to Learn in 2017
top 10 programming languages
One of the most asked question those days is What programming language should I learn?
In fact, this is a very important choice you have to make.
You don’t want to fail that’s why you have to make the right choice
"The choice of programming language will determine your future engineering life"
The failure pattern that is actually:
  • hurdle of the chosen language is too high, that make you give up on the way
  • You are not able to do what you really wanted when you start learning, you are not able to program what you want
  • There is no demand for the language you choose
So this article was written to help you chose the right Programming language to start with
from the viewpoint that it is easy to get started, various application development can be done, and it will be useful for change and independence!
Reading this will not only deepen your knowledge of programming languages, but also you will definitely see the programming language you should learn, so be sure to check it out
"Getting Started with recommended programming language "

Intercepter-NG v2.0 is an Android penetration testing app.
by using Intercepter-NG you will be able to intercept and analyze un-encrypted communications over WiFi network.

Intercepter-NG is a network toolkit for various types of IT specialists and an easy-to-use application to intercept communication.
it's an MiTM attacks tool , you can perform different kinds of MiTM attacks using this android app

  1. Android 2.3.3+
  2. Root
  3. Busybox
Intercepter-NG v2.0 Features:
  • Intercept communications.
  • Analyze data packets.
  • Hijack sessions. ( cookie hijacking )
Session hijacking, also known as TCP session hijacking and cookie hijacking , is a method of taking over a Web user session by surreptitiously obtaining the session ID and masquerading as the authorized user.
  • SSL Strip connections.
SSLStrip is a type of MITM attack that forces a user browser into communicating with an adversary in plain-text over HTTP, it simply watch for HTTPS links and redirects, then map those links into look-alike HTTP
  • Monitor target's web activity
  •  ARP Poisoning
ARP stand for “Address Resolution Protocol” this type of attack sends falsified ARP messages over a local area network to link the attacker MAC address with the IP address of a legitimate computer or server on the network.
  •  Network Discovery with OS Detection
  •  Network Traffic Analysis
  •  Passwords Recovery
  •  Files Recovery

1. Download Intercepter-NG V2.0 from Github
2. Install Busybox from Google Store 
Remember your Android phone must be rooted

2. Install and open the app click on the Radar icon in the upper left corner of IntercepterNG.
IntercepterNG Android
3.After you click on the radar icon It will scan the network and list all the connected  devices 
Intercepter-NG list

4. Now select the Devices you want to spy on from the list  , it will show the operating system next to the IP address 
Intercepter-NG Android hacking app

5. Click the Play icon on the top right then  Select the Settings icon
Now tick the check box of  Save pcap session and change the memory location to SD Card if you want the file to be saved on your SD card.
Intercepter-NG Android
6.Return to main menu and then select the play button
now it will start downloading packs
Android wifi hacking

7. To see graphical capturing of data click the Wireshark icon click the play button 

Android Wireshark
8.  Click the cookies icon and wait for the cookies to load then select any one of the IP shown it will load the web page your victim are in.

Watch YouTube Video to see the app in use

Last update : 26.09.2016 - Intercepter-NG [Android Edition] v2.0
+ Select\Copy packet data in RAW Mode
+ Pcap filter on reading *.pcap
+ Save cookie button
+ Show HTTP Requests
+ HTTP Injects
+ ARP Cage
A lot of improvements and fixes
- Resurrection\Gallery
Tested on 4/5/6/7 Android. Should also work on 2/3.

JSQL injection Tool
JSQL injection Kali linux

SQL injection refers to an injection attack in which the attacker adds malicious SQL statements
to a Web form input box to gain access to resources or make changes to data
SQL Injection is very common with PHP and ASP applications due to the prevalence of older functional interfaces. Due to the nature of programmatic interfaces available, J2EE and ASP.NET applications are less likely to have easily exploited SQL injections.
this vulnerability could possibly affect any website or web application that makes use of an SQL-based database, The risk of SQL injection exploits is on the rise because of automated tools
SQL injection is not being done manually anymore and there is so many tools that do the job automatically which put thousands and thousands of website at the risk of SQL injection
one of the automated tools is jSQL Injection

Diamond 980000N High Power Wireless Adapter USB Wifi lan card

Diamond 980000N High Gain Powerful 38DBI 3800mw is using ralink wireless rtl3070 chips
rtl3070 dose support  inject and monitor mode ... but what about diamond !!!

with this adapter you can get a huge list of Wifi access point, the signal is stronger then many other cards on the market, but it's not the best you can get,
I got this card just to check it and after testing it, no i would never buy it or suggester it to a friend...

It's true  you can get a huge list of WiFi AP and connect to them ( only if you have the WEP/WPA key ! )
but what make me don't suggester it, it's the fake body it use and poor quality
after opening it to have a look inside i find out that the tow antenna on the left and the right are not connected at all
ralink wireless rtl3070

So they are fake and there is no use for those  antenna at all!
but still the adapter can get you a huge list of WiFi access point and that's because of the special antenna in the front and it look like a satellite
High Power Wireless

you can check this video to see the inside of this adapter

i have tried inject and monitor mode with it but it Failed ...
if you want to use Diamond 980000N for packet capturing & Packet Sniffing it wont work the way you want, i couldn't capture the handshake of my own Wifi AP,
So even when it use ralink 3070 still it's not able to capture any packet
check this video  to see the adapter on a Comparison with wifly-city Ralink8187L  using Kali Linux

you can get Wifly-City 56G from here

For Best Quality get Alfa  awus036h  from here

Leave a comment , if you own Diamond 980000N and what is the best WiFi card you have ever you ?  

The most essential Linux commands
Keep this Linux cheat sheet on your desk printed,
it will help you to learn them quick and become a Linux expert very soon.
Click on the image to open at full size
linux commands list

File Commands
1) The ls Linux command lists files and directories within the current working directory.
ls - directory listing ls -al - formatted listing with hidden files
2) The cd Linux command changes the current directory in Linux and can toggle between directories conveniently.
cd dir - change directory to dir cd - change to home
3) The pwd Linux command (print working directory) command displays the name of the current working directory.
pwd - show current directory
4) The mkdir (make directory) command is used to make a new directory.
mkdir dir - create directory dir

This kernel requires an x86-64 CPU, but only detected an i686 CPU.

Trying to install kali linux or ubuntu on Oracle VirtualBox or VMware ?
but when running the virtual machine you got this message  " This kernel requires an x86-64 CPU, but only detected an i686 CPU. Unable to boot – please use a kernel appropriate for your CPU ".
as someone asked on my Youtube Video about Installing Kali linux on VMware
this kernel requires an x86 64 cpu

1) There is many case you are receiving this message for but the most common one can be fixed from your bios settings on intel CPU you have to enable " Intel Virtualization Technology "  and on AMD CPU you have to enable "AMD V" this will simply fix this error

how to enable Virtualization Technology
  1. Power on your computer and open the BIOS by pressing the delete key or F1 key or F2 or Alt and F4 keys it depend on the system you have.
  2. Open the Processor submenu The processor settings menu may be in the Chipset, Advanced CPU Configuration or Northbridge.
  3. Enable Intel Virtualization Technology (also known as Intel VT) or AMD-V depending on the brand of the processor

Author Name

{picture#YOUR_PROFILE_PICTURE_URL} YOUR_PROFILE_DESCRIPTION {facebook#} {twitter#} {google#} {pinterest#} {youtube#}

Contact Form


Email *

Message *

Powered by Blogger.