Follow by Email

Search This Blog

Youtube Videos

Recent PostAll the recent news you need to know

Malware Analysis Books

Malware Analysis Books
Malware Analysis Books

There are a bunch of books on Malware Analysis and over the last couple of years, the number of available options has increased a lot. A quick search on Amazon might show some of the available options that you can start with, and you ‘ll have also a lot of options for learning Assembly, Network Detection and many other tools used for this.
If you’re looking for some specific recommendations check this list:

Setting up your hacking attempt - information gathering

Many beginners, myself included, thought/thought that there was a special, premeditated way to 'hack' everything or 'something'.
The reality is slightly more complicated. There is no 'how should I hack' that is prescribed on forums. You have to figure it out yourself as a hacker, and the tools and skills to figure out yourself how to hack something you can find online. After all, if there was a known Facebook hack, Facebook would have ensured that the leak was closed.
information gathering

One of the most important steps that beginners overlook, because it is not necessarily the most exciting activity ever, is Information Gathering. In short: to learn everything there is to know about your target. This step is perhaps the most important one and includes most of all your time spent in hacking because you never have 'all' information and thus never stop looking up information.

Kali Linux Login Loop [Solved]

Fix Kali Linux Login Loop [Solved]

This video shows how to quickly fix the login screen loop in the Kali Linux. The fix is very easy: While at the login screen press Ctrl+Alt+F1 or Ctrl+Alt+F2 to open terminal after that type the username and password in terminal. Now follow commands as below 1 -sudo apt-get update 2 -sudo apt-get upgrade 3 -dpkg --configure -a 4 -sudo apt-get install cinnamon-control-center-data 5 -gdm3 --version 6 -apt-get --reinstall install gdm3 7 -apt-get --reinstall install gnome 8 -apt-get --reinstall install gnome-shell 9 -dpkg-reconfigure gdm3 10-reboot Fix Kali Linux sources.list Repositories Kali Linux sources.list Repositories

The zodiac cipher is still a mystery

decrypt zodiac cipher

October 20, 1968, Benicia, California, USA. A motorcyclist found the bodies of a young couple in the alley. A few months later, another couple was shot in a park several kilometers away. The killer later reported to the police station in the telephone booth. In addition to acknowledging his own murder, he also claimed responsibility for the first murder.

CeWL - Custom Word List generator

The CeWL application, i.e. the  Custom Word List generator,  deserves attention due to its operation.
CeWL - Custom Word List generator

The generator can create dictionaries based on the expressions found on the website provided in the parameter. The user can define the depth of search on the site, the minimum number of characters from which the password should be composed. In addition, the application as a crawler / spider  tool can also collect e-mail addresses found on the website.

Kali Linux Books 2018

a collection of books released for Kali Linux in 2017
 Kali Linux is one of the best known and most used Linux distributions for security testing, digital investigation and penetration testing. it has grown in popularity so quickly that it's now seen as an essential part of every security expert (and hacker) toolkit.

it's based on Debian GNU / Linux, which is one of the large and famous distributions of the open-source operating system. It is explicitly built with safety engineers in mind - it consists of more than 600 packages for penetration testing. It can easily be executed using a live CD or USB or used in virtual machines. Some security experts even speculate that the growing popularity of Kali Linux can be linked to the many amateur attacks that they oppose. The distribution is very easy to use, even by beginners and the large collection of applications has contributed to the outlaws to an extensive collection of hacking tutorials.