Posts

Showing posts from May, 2016

Stay Secured By IP Spoofing In Kali Linux or Ubuntu Using Torsocks

Image
Stay Secured By IP Spoofing In Kali Linux or Ubuntu Using Torsocks torsocks  allows you to use most applications in a safe way with TOR. It ensures that DNS requests are handled safely and explicitly rejects any traffic other than TCP from the application you’re using. In this post we will cover IP spoofing in Kali Linux with torsocks which will allow users to connect to certain services that is banned to them.  torsocks  is an ELF shared library that is loaded before all others. The library overrides every needed Internet communication libc function calls such as connect() or gethostbyname(). This process is transparent to the user and if  torsocks  detects any communication that can’t go through the Tor network such as UDP traffic, for instance, the connection is denied. If, for any reason, there is no way for  torsocks  to provide the Tor anonymity guarantee to your application,  torsocks  will force the application to quit and stop everything.  In this article I will guide

6 Ways To Protect Your Data From Hackers - 2016 (Updated)

Image
6 Ways To Protect Your Data From Hackers - 2016 (Updated) The year 2016, is turning out to be the year of data breaches. Hackers have become particularly active and just today, we are hearing about two big data breaches: Millions of Gmail IDs and password almost went on sale and there is a suspect data breach in the IRCTC website that is used by crores of Indians. With hackers on the march, how can you be safe? If you think who would want to hack my account and steal my data, you couldn't be more wrong. According to a recent report, a hacker was sitting over 272 million email accounts and passwords, and he was ready to trade them, wait, not for money, but just for a good name in hacker forums. Any inconspicuous user could be a target. You as well. Unfortunately, most people keep only one password for different accounts, for example, same password for Gmail, Facebook, Twitter, or even online banking. Even a simple brute force attack can reveal thousands of email cre

13 Best Tools For Hacking Wireless Networks

Image
13 Best Tools For Hacking Wireless Networks Wireless networks are based on IEEE 802.11 standards defined by IEEE(Institute of Electrical and Electronics Engineers) for ad hoc networks or infrastructure networks. Infrastructure networks have one or more access points which coordinate the traffic between the nodes. But in ad hoc networks, there is no access point; each node connects in a peer-to-peer way. Basically there are two types of vulnerabilities which can be found in the Wireless LAN. One is poor configuration and the other is poor encryption. Poor configuration is caused by the network admin who manages the network. It may include the weak password, no security settings, use of default configurations, and other user related things. Poor encryption is related to security keys used to protect the wireless network. It is there because of issues in WEP or WPA. WEP and WPA WEP and WPA are the two main security protocols used in Wi-Fi LAN. WEP is known as Wired Equivale

Top 6 Password Cracking Techniques

Image
Top 6 Password Cracking Techniques Well I guess you allfind the 6 best password cracking techniques. Putting up a good and long password is advised by cyber security however cyber security does n’t teach us how to identify the hacker hacking into your computer. It does n’t matter how strong you are creating passwords, there is always be an option for hackers to crack your passwords. The hackers Nowadays have been creating well-developed algorithms, which can speed up the processes to discover your password codes. So if you are one of them who thought that putting up a tough password is a secure way to stay away from hacker then this article is just for you. Today we will discuss some password Cracking techniques used by hackers to hack into our account. 1. Dictionary Attack Dictionary Attack is a technique used by most of the regular hackers to determine the passphrase by trying their luck many times. Unlike its name, it works like a dictionary it is just a simple file wh