Thursday, April 5, 2018

// // Leave a Comment

HACKING TUTORIAL #2

HACKING TUTORIAL #2



Everything about Tor


Where it came from?


Tor is based on the principle of ‘onion routing’ which was developed by Paul Syverson, Michael G. Reed and David Goldschlag at the United States Naval Research Laboratory in the 1990’s. The alpha version of Tor named ‘The Onion Routing Project’ or simply TOR Project was developed by Roger Dingledine and Nick Mathewson, launched on September 20, 2002. Further development was carried under the financial roof of Electronic Frontier Foundation (EFF).
The Tor Project Inc. is a non-profit organisation that currently maintains Tor and is responsible for its development. It is mainly funded by the United States Government, further aid is provided by Swedish Government and different NGOs & individual sponsors.

How it Works?

Tor works on the concept of ‘onion routing’ method in which the user data is first encrypted, and then transferred through different relays present in the Tor network, thus creating a multi-layered encryption (layers like an onion), thereby keeping the identity of the user safe. At each relay, one layer is decrypted and the remaining data is forwarded to any random relay until it reaches its destination server. For the destination server, the last Tor node/exit relay appears as the origin of the data. It is thus very difficult to trace the identity of user or the server by any surveillance systems acting in the mid-way.

Other than providing anonymity to standalone users, Tor can also provide anonymity to websites and servers this comes under the category of hidden services. Also, P2P applications like Bittorrent can be configured to use tor network and download torrent files.

Controversies and Influence:

Tor has been eulogized for the anonymity and privacy it provides to the users who want to bypass censorship, who are abused and traumatized by stalkers and social activists who are afraid of being arrested by the authorities. It has been used by different security agencies to share confidential information.
The NSA whistle-blower Edward Snowden used Tor to leak information about PRISM to The Guardian and The Washington Post.

Tor has been criticized for the reason that it acts as a medium for different illegal activities like data breaching, drug dealing, gambling etc. Tor is also used by malevolent people to communicate over the internet while keeping their identity hidden which makes it difficult for the security agencies to trace them.

The U.S. National Security Agency (NSA) has called Tor “the king of high-secure, low-latency Internet anonymity” and similar comments by BusinessWeek magazine, “perhaps the most effective means of defeating the online surveillance efforts of intelligence agencies around the world”.

Another speculation made is that Tor takes its funding from the U.S. Government which may lead to the assumption that NSA may have compromised the identities of individual Tor users, but the executive director Andrew Lewman has disclaimed any confederations with NSA.



Can it be Compromised?

Various claims have been made to compromise Tor’s anonymity and security from time to time. The most famous is the Bad Apple Attack in which the researchers claimed to have identified around 10k IP addresses of active Bittorrent users who were connected via Tor.

Another famous compromise was done by the Heartbleed bug in April 2014 which halted Tor network for several days.

Traffic Fingerprinting is a method used to analyse web traffic by analysing the patterns, responses and packets in a particular direction. This can be used to attack the Tor network by making the attacker’s computer act as the guard.
The main vulnerability found is at its exit points where the level of security is very low as compared to the rest of the Tor network.


Products based on Tor:

The Tor Project Inc. has released Tor Browser which is a modification of an Extended Support Release version of Mozilla Firefox browser. The browser is made portable so that it be used from an external media and reduces the hazel of installation. It removes the user history after every use, thus reducing the risk of any kind of cookie tracking.

Other products like Orbot – an android version of Tor, Orfox – a mobile version of Tor Browser are developed by The Guardian Project which is a global developer community founded by Nathan Freitas.

We can set-up SOCKS (Socket Secure) based applications to use the Tor network by configuring them with loop-back address.



Tor Alternatives:


 Hornet is a new anonymity network that provides higher network speeds compared to Tor. I2P, Tails, SubgraphOS, Freenet and Freepto are other top alternatives that can be used.



Winding Up:


Tor has proved to be a great medium for safe, secure and anonymous web presence that can be provided to a user at no cost. Although it is available for a positive intention, but is also used by malignant people in fulfilling their needs. The Tor project has led to an optimistic approach towards censorship and surveillance free internet.

So i hope you love this Information or you learned about Tor. basically tor is not a Good or not Bad.It is just software it's Depend's on your how you use this software.
Read More

Saturday, March 31, 2018

// // Leave a Comment

HACKING TUTORIAL #1

HACKING TUTORIAL #1



WHAT'S HACK,HACKING AND HACKER ?

 HACKING is unauthorized use of computer and network resources.(The term "hacker" orginally meant a very gifted programmer. in recent years through, with easier access to multiple systems, it now has negative implications.)Computer Hackers have been around for so many years.Since the internet became widely used  in the world , we have started to hear more and more about hacking.Only a few hackers, such as Kevin Mitnick,are wll known.in a world of Black and White,it's easy to describe the typical Hacker.

    A general ouutline of a typical hacker is an Antisocial,Pimple-Faced teeenage boy.(Just for fun).


>>HACKERS.

 Hackers are human like the rest of us and are therefore, unique individuals, so an exact profile is hard to outline.
The best broad description of hackers is that all hackers aren't equal.

 Each Hacker has  motives, Method and skills .

  But some general characteristics can help you understand them.

  Hackers are curious about Knowing new things, Brave to take steps and They are often very Sharp Minded.

Hacker is word that has two meanings:

  1. Traditionally, a Hackers is someone who likes to play with software or electronic.system.Hackers enjoy Exploring and Learning How Computer Systems operate.They love discovering  new ways to work electronically.
  2. Recently Hacker has taken on a new meaning-someone who maliciously breaks into system for personal gain.

Read More

Saturday, March 17, 2018

// // Leave a Comment

GAMES FOR ANDROID USER

looking for free Android game? Don't want to spend more money buying full versions of the best Android apks? We can help you! At red barrls.com you can find thousands of new games. Apk files are very easy to install, just a few seconds and you will enjoy the game for Android. All content is ordered in categories: gambling, arcade, action, rpg and many more. Just select model of your tablet or phone (e.g. Samsung Galaxy Note, Motorola Droid, HTC Desire etc.) in the right panel, and our system will select you the most appropriate files. If you are searching for best Android tablet games, it will be more convenient to sort files by OS version. And remember, totally free mobile content is only at red barrels.com

Need for speed most wanted:
cick below the image to download
Buckle up, hit the gas and hold on tight; you’re in for the ride of your life. Outrun cops, outsmart rivals – and outdrive your friends – in the most dangerous Need for Speed yet. Do you dare to be the Most Wanted?
**Need for Speed Most Wanted is an immersive, high-quality game. Please note that it requires a 550MB+ download and roughly 1,900MB+ free space on your device. To speed things up, we recommend connecting to WiFi.**
MAKE TROUBLE, GET WANTED
Evade a relentless police force while you clash with street racers. Race and chase hot cars like the SRT Viper GTS, Porsche 911 Carrera S, Hummer H1 Alpha, and many more. Feel the intensity of no-brakes-allowed street racing with realistic full-car damage for the first time on mobile.
LEAVE YOUR MARK
Log into Origin to check the Wanted List and find out who is the Most Wanted across platforms and among your friends. Then, challenge your friends and prove your racing skills in nonstop competition.
GO FROM ZERO TO MOST WANTED…
  • Drive and customize over 40 of the world’s most exciting cars
  • Race the way you want! By popular demand, you can now touch or tilt to steer
  • Use Mods to enhance your car and get ahead of the pack in style
  • Experience the action with mind-blowing graphics and intense full-car damage
  • Earn Speed Points to unlock new cars
  • Trick out your phone with an exclusive Most Wanted live wallpaper
Your rivals will do everything they can to stop you from getting to the top – but in this world, there can only be one Most Wanted.
Read More

Saturday, February 24, 2018

// // Leave a Comment

DISADVANTAGES OF KALI LINUX (PART-3)


Disadvantages of Linux

1)  MANY WINDOWS PROGRAMS WILL NOT RUN IN LINUX:-
iTunes, Microsoft Office, Internet Explorer and many other Windows programs will not run natively in Linux. The good news is that there are decent ways around most of these problems. For example, music libraries can be managed with an iPod using programs such as Amarok, Banshee, or Rhythm box in Linux. Mozilla Firefox and Google Chrome are outstanding Internet browsers which can be used in the place of Internet Explorer. It is also possible to run iTunes in Linux using Wine, Virtual Box, or Parallels, though it is difficult to have good results. Libre Office and Open Office are excellent office suites which can be used in the place of Microsoft Office, but while overall compatibility in both suites is good with Microsoft Office formats, it is not perfect.

2) THERE IS A SMALLER SELECTION OF PERIPHERAL HARDWARE DRIVERS FOR LINUX:-

There is a smaller selection of peripheral hardware drivers (for printers, scanners, and other devices) in Linux as compared to Windows, though many new Linux hardware drivers are constantly being added. Closely related to this issue is the fact that not all Linux distros work with all sets of computer hardware, so a person may need to try more than one distro to find one which works well with his/her computer. When it comes to printers, some manufacturers offer better Linux support than others; for example, HP offers excellent printer support for Linux.

3) THERE IS A LEARNING CURVE FOR PEOPLE WHO ARE NEW TO LINUX:-
Despite this, most Linux distros, especially the major ones, are very intuitive and user-friendly. Also, the desktop environments in Linux are in many ways similar to Windows in their appearance. One thing which should be emphasized is that there is also a learning curve for Windows XP users who switch to a newer version of Windows.

Read More
// // Leave a Comment

Advantages of Linux(part 2)

 Advantages of Linux:

FREEDOM!
Most Linux distros are free….. users do not need to pay for a copy, but this is only one aspect of freedom enjoyed by Linux users! In addition, Linux distros can be freely downloaded and legally installed on as many computers as you want and freely (and legally) given to other people. Because most distros are open source, you have access to the source code and can customize Linux to be whatever you want it to be; you can even create your own distro if you like!Linux is easy to install!  In many instances, it is actually easier to install Linux to your computer than Windows. Click here to learn more about how to download and install Linux to your computer [1].

LINUX IS VERY STABLE!
Linux systems rarely crash, and when they do, the whole system normally does not go down. The “blue screen of death” familiar to Windows users is not a worry for Linux users.


LINUX IS LESS VULNERABLE TO COMPUTER MALWARE!
Because most computer malware are designed to attack Windows (often through Active X which is not typically found in Linux) the odds are considerably less for Linux to be infected with a virus than Windows

[2]. The same holds true with spyware, trojans, and worms. While Linux malware does exist, they are relatively few in number and none have become widespread so far

[3]. While Linux is very secure by its nature, users should still employ good sense while surfing the Internet; click here to learn more

[4]. As long as Linux users download and install only from their distro’s official software repository, then security is greatly increased. One nice security feature In Linux is that files must be made to be executable by someone with administrator privileges, which requires a password. So even if a Linux virus is loaded on a Linux computer, it will not be able to run without the user who has administrator privileges intentionally making it executable. Another important aspect of Linux security is the fact that it is open source. Because the programming code is available for anyone to view, there are many eyes constantly examining it, which makes it highly difficult for malware to be hidden within the code

[5]. Also, security patches normally come much quicker to Linux than other operating systems because so many people are contributing to it. Here are some resources with more information about Linux security and why Linux computers are much less likely than Windows to ever become infected with a virus.

LINUX TYPICALLY DOES NOT SLOW DOWN OVER TIME!
Unlike Windows, Linux does not easily become bogged down with spyware, viruses, trojans, etc., which can greatly reduce a computer’s performance. Also, because Linux does not have a registry like Windows, it is not plagued with registry errors which can slow down a computer over time. Finally, the hard drives on Windows (especially Windows XP and older) computers need to be defragmented on a regular basis in order to maintain faster performance, due to being formatted in NTFS. On the other hand, because Linux is normally formatted in a different way using ext4 among others, there is no need to defragment a Linux hard drive.


LINUX CAN BREATHE NEW LIFE INTO OLD COMPUTERS!
If you have an older computer (especially Pentium III or later) laying around, you can install Linux and in essence have a new computer. In many cases Linux will run faster and you can do all of the basics such as browse the Internet, email, play games, and create and edit documents, spreadsheets, and PowerPoint presentations. It should also be mentioned that Linux runs great on newer computers as well.


WITH LINUX, YOU HAVE SO MANY CHOICES IN A WIDE VARIETY OF DISTROS!
Linux comes in all sizes and flavors, which offers a wide variety from which to choose the distro which will best suit your needs. Another advantage of this variety is the innovation that is taking place in the Linux world because it is open source. You can learn more about different Linux distros by going to distrowatch.com.

WITH MANY LINUX DISTROS, YOU HAVE ACCESS TO FREE SOFTWARE WHICH NUMBERS IN THE THOUSANDS!
Popular distros such as Ubuntu, PCLinuxOS, andOpenSUSE offer excellent software repositories within their package managers where virtually any type of software can be downloaded and installed to your Linux system for free. This includes just about anything you can imagine, such as games, educational software, office suites, and much more! Some smaller distros, such as Peppermint OS, Lubuntu, Bodhi Linux, and Puppy Linux are based on Ubuntu and as a result have access to Ubuntu’s software repositories. One very nice aspect of these repositories is that the software found in them has already been tested for compatibility and safety. For example, the thousands of free and open source software found in the Ubuntu Software Center has been tested and examined by Ubuntu, so a user can be confident that the software will be compatible with Ubuntu and will not include malware.

A SUPERIOR METHOD OF UPDATING SOFTWARE!
With Linux distros such as Ubuntu, OpenSUSE, PCLinuxOS, Fedora and many others, the majority of any software needed can be downloaded, installed, and updated from a central package management system provided by the distro. The result is a very smooth and seamless software updating process for Linux users.

Read More
// // Leave a Comment

What is kali linux and it's facts


KALI LINUX (part 1)

We know that kali linux is a operating system for pc . But first I wll give you some short information about kali linux. and advantages
or what is future of kali linux. I will give you information in parts.


What is Kali Linux ?
Kali Linux is a Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing. Kali contains several hundred tools which are geared towards various information security tasks, such as Penetration Testing, Security research, Computer Forensics and Reverse Engineering. Kali Linux is developed, funded and maintained by Offensive Security, a leading information security training company.
Kali Linux was released on the 13th March, 2013 as a complete, top-to-bottom rebuild of BackTrack Linux, adhering completely to Debian development standards.


  • More than 600 penetration testing tools included: After reviewing every tool that was included in BackTrack, we eliminated a great number of tools that either simply did not work or which duplicated other tools that provided the same or similar functionality. Details on what’s included are on the Kali Tools site.
  • Free (as in beer) and always will be: Kali Linux, like BackTrack, is completely free of charge and always will be. You will never, ever have to pay for Kali Linux.
  • Open source Git tree: We are committed to the open source development model and our development tree is available for all to see. All of the source code which goes into Kali Linux is available for anyone who wants to tweak or rebuild packages to suit their specific needs.
  • FHS compliant: Kali adheres to the Filesystem Hierarchy Standard, allowing Linux users to easily locate binaries, support files, libraries, etc.
  • Wide-ranging wireless device support: A regular sticking point with Linux distributions has been supported for wireless interfaces. We have built Kali Linux to support as many wireless devices as we possibly can, allowing it to run properly on a wide variety of hardware and making it compatible with numerous USB and other wireless devices.
  • Custom kernel, patched for injection: As penetration testers, the development team often needs to do wireless assessments, so our kernel has the latest injection patches included.
  • Developed in a secure environment: The Kali Linux team is made up of a small group of individuals who are the only ones trusted to commit packages and interact with the repositories, all of which is done using multiple secure protocols.
  • GPG signed packages and repositories: Every package in Kali Linux is signed by each individual developer who built and committed it, and the repositories subsequently sign the packages as well.
  • Multi-language support: Although penetration tools tend to be written in English, we have ensured that Kali includes true multilingual support, allowing more users to operate in their native language and locate the tools they need for the job.
  • Completely customizable: We thoroughly understand that not everyone will agree with our design decisions, so we have made it as easy as possible for our more adventurous users to customize Kali Linux to their liking, all the way down to the kernel.
  • ARMEL and ARMHF support: Since ARM-based single-board systems like the Raspberry Pi and BeagleBone Black, among others, are becoming more and more prevalent and inexpensive, we knew that Kali’s ARM support would need to be as robust as we could manage, with fully working installations for both ARMEL and ARMHFsystems. Kali Linux is available on a wide range of ARM devices and has ARM repositories integrated with the mainline distribution so tools for ARM are updated in conjunction with the rest of the distribution.
Kali Linux is specifically tailored to the needs of penetration testing professionals, and therefore all documentation on this site assumes prior knowledge of, and familiarity with, the Linux operating system in general.

Read More
// // Leave a Comment

INTERESTING FACTS ABOUT ANDROID PART 2

INTERESTING FACTS ABOUT ANDROID (PART 2)


  •  Google has statues outside its HQ for each version of the Android OS
  •  Apart from Android 1.0 and 1.1, all other Android versions have been named after sweet treats or desserts 
  •  Android versions are named in Alphabetical order

Below are the names of various Android versions:
    • Cupcake – Android 1.5
    • Donut – Android 1.6
    • Eclair – Android 2.0
    • Froyo – Android 2.2
    • Gingerbread – Android 2.3
    • Honeycomb – Android 3.0
    • Ice Cream Sandwich – Android 4.0
    • Jelly Bean – Android 4.1 – 4.3.1
    • KitKat – Android 4.4 – 4.4.4
    • Lollipop – Android 5.0 – 5.1.1
    • Marshmallow – Android 6.0 – 6.0.1
    • Nougat – Android 7.0 – 7.1
    • Oreo-Android 8.0-8.1

  • The very first Android phone from 2008 had no headphone jack and required an adapter
  • In 2010, Anssi Vanjoki, CEO of Nokia, said that using Android is like a Finnish boy peeing his pants to stay warm 
  •  Google Maps calculates traffic by tracking how fast Android devices are moving on the road
  • Android Logging System has a method called wtf() which stands for “What a Terrible Failure” 
  •  Android devices sell more than Microsoft Windows, iOS, and Mac OS X devices combined
  • In each Android version, an Easter egg can be revealed by continuously clicking the version number in the “About” screen.
  • In late 2008, many critics thought Android would fail miserably 

Here is some interesting facts of android . I hope you like this.
Read More