How To Spoof IP Address?

IP Spoofing refers to changing source IP Adresses so that the attack appears to be come from someone else. When the victim replies to the address, it goes back to the spoofed address and not to the attacker’s real address. IP Spoofing using Hping2: Hping2 www.example.com -a xx.xx.xx.xx “You will not be able to complete the three-way handshake and open a successful TCP Connection with spoofed IP Address”. IP Spoofing Detection Techniques : Direct TTL Probes Send Packet to host of suspect spoofed packet that triggers reply and compare TTL…

Read More

What is Input Validation Attacks?

Input validation attacks occur in much the same way buffer overflows do. Effectively, a programmer has not sufficiently reviewed the input from a user (or attacker, remember!) before passing it onto the application code. In other words, the program will choke on the input or, worse, allow something through that shouldn’t get through. The results can be devastating, including denial of service, identity spoofing, and outright compromise of the system, as is the case with buffer overruns. In this section, we take a look at a few input validation attacks…

Read More

What is Windows Powershell?

The Linux operating system has long offered more power and flexibility to its administrators through shell scripting. However, Microsoft Windows lacked this flexibility, because of the limited capabilities of the command prompt. To overcome this limitation, Microsoft introduced PowerShell to efficiently automate tasks and manage configurations. It is built on top of the .NET Framework and provides complete access to COM and WMI. What is its application in hacking? If you are able to compromise a target system running Windows operating system, then using PowerShell, you can do many useful…

Read More

What Is Wireshark?

Wireshark, as discussed earlier, is the most popular packet analyzer, and there is a reason behind its huge fan following. It hosts tons of features, supports a huge list of common and uncommon protocols with an easy-to-navigate GUI, and can be easily installed and used on popular operating systems, such as Windows, Linux, and Mac OS X for absolutely no cost at all. Wireshark can be downloaded and installed from the official website ( http://www.wireshark.org ). The installation setup is comparatively simple, and within a few clicks, you will be…

Read More

What is Worm?

Computer worm are malicious program that replicate, execute, and spread across the network connections independently without human interaction. Most of the worms are created only to replicate and spread across a network, consuming available computing resources; however, some worms carry a payload to damage the host system. Attackers use worm payload to install backdoors in infected computers, which turns them into zombies and creates botnet; these botnets can be used to carry further cyber attacks. How Computer Worm Work? Worms can be transmitted via software vulnerabilities. Or computer worms could…

Read More

What is TLS?

Transport Layer Security(TLS) is a protocol used to establish a secure connection between a client and a server and ensure privacy and integrity of information during transmission. It uses symmetric key for bulk Encryption, asymmetric key for authentication and key exchange, and message authentication codes for message integrity. It uses the RSA algorithm with 1024-bit and 2048-bit strengths. with the help of TLS, one can reduce security risks such as message tampering, message forgery, and message interception. An advantage of TLS is that it is application-protocol independent. Higher-level protocols can…

Read More

What is SSL ?

Secure Sockets Layer (SSL) The Secure Sockets Layer (SSL) is an application layer protocol developed by Netscape for managing the security of a message transmission on the Internet. It is a protocol used to provide a secure authentication mechanism between two communicating applications, such as a client and a server. The SSL requires a reliable transport protocol, such as TCP, for data transmission and reception. It use RSA asymmetric (public key) Encryption to encrypt data transferred over SSL connections. Any application-layer protocol that is higher than SSL, such as HTTP,…

Read More

What Is Encryption?

Encryption is the process of converting readable plain text into an unreadable cipher text by applying a set of complex algorithms that transform that the data into blocks or streams of random alphanumeric characters. This section deals with ciphers and various encryption algorithms such DES, AES, RC4, RC5, RC6, DSA, RSA, MD5, and SHA. Type of Encryption Cipher In cryptography, a cipher is an algorithm for performing encyption and decryption. Encipherment is the process of converting plain text into a cipher or code; the reverse process is call decipherment. A…

Read More

What is Spoofing?

Spoofing is a malicious practice employed by cyber scammers and hackers to deceive systems, individuals, and organizations into perceiving something to be what it is not. Communication is initiated by the spoofer to the victim or system from an unknown source but disguised to present itself as an authentic and safe sender. If you have ever received an email from a seemingly familiar source asking you to update your profile details because some funny system upgrade was necessary, then you have experienced spoofing. Spoofing is the act of disguising a…

Read More

Best Wifi Hacking Tool 2020

Wifi Hacking Tool In the field of Computer Science & cyber security world , hacking is now the most discussing matter as the number of hacking or to breaking of the cyber security illegally is increasing day by day. Hacking is now even so easy if you do not know programming properly. It becomes easy due to the Cyber tech apps or tools which are helping even common people to hack the victim’s computer or its wi-fi or their online accounts. These tools or apps are now available in the…

Read More