Posts

hacking padding oracle

Image
Padding oracle is a vulnerable machine which can be downloaded from "vulnhub.com".The main aim of this machine is to log in as admin. step 1 : Run the "ifconfig" command in terminal in kali linux to know the ip address of the machine from which you will be attcking on the Padding oracle machine.And the "route -n" command will show the default gateway.     step 2:  Run the "nmap -sV -O -sS -T4 Ip address of gateway/24" command to get the ip address of all the machine that are present on the same network.         step 3:  After identifying the target ip address run the uniscan command to get the details of all the directories and of all the files.     step 4 : copy and paste all the urls in the browser to gather information about the machine.on copying and the pasting the url "http://target ip/login.php".     step 5 : On searching the url "http://target ip/index.php"     The message directly tells that the logi

Information gathering using nmap

Image
             NMAP|PENETRATION TESTING TOOL INTRODUCTION Nmap (Network mapper) is a free and open source tool used for network discovery and security auditing. Nmap is a CLI(command line interface) based tool originally written by "Gordon Lyon". NmapFE is the GUI(Graphical user interface) based tool originally written by "Zach Smith" which was later replaced with Zenmap which is also a GUI based on UMIT, developed by "Adriano Monteiro Marques".To accomplish its goal, Nmap sends specially crafted packets to the target host(s) and then analyses the responses that it receives from the hosts(s). FEATURES  All the hosts present in the network along with their IP addresses can be discovered. Scans all the ports and give information about all the open and closed ports along with the port numbers. Determines the operating system of the hosts. Determines the application name and version number of remote devices. Finding and exploiting vulnera

Next generation cars

Image
With the rapid evolution in the technology.Vehicles are also rapidly evolving from old technology to the new with the hope of creating more safe environment and providing more comfort to its owners.Keeping this in view vehicles vendors have shifted the technology in which all the systems of the car is autocontrolled in other word we can say that the vendors are replacing the mechanical system with the electrical system leading to highly computerized vehicles.                                                     As the vehicles are getting computerized the major threat to them is from the hackers.A expert in hacking can easily gain access of the car and can control them which sometimes can cause unwanted activity and also the persons life is at risk who is sitting inside a hacked car. Blackberry has taken a step towards the automotive security system with it's 'QNX Hypervisor 2.0'.  QNX Hypervisor 2.0      “ There is no safety without security “, says John Wall, head

New attraction for Hackers -GSTN(Goods and Service tax network)

Image
                                    GSTN (Goods and Services Tax Network) is a non-profit entity.The main aim for establishing GSTN is to provide IT(Information technology) infrastructure for the implementation of the GST(Goods and Services Tax) law.when GSTN opened it's portal for taxpayers to register it faced a DDOS(Distributed Denial of Service) Attack. GST GST(Goods and Services Tax) is an indirect tax throughout India amalgamating several Central and State taxes into a single tax.The simplicity of the tax would lead to easier administration and enforcement for the consumer the biggest advantages is reduction in the overall tax burden on goods and the free movement of the goods from one state to the other. The following taxes will be bound together by the GST: Central Exercise Duty Service Tax Corruption Tax Value Added Tax (VAT) Food Tax Central Sales Tax (CST) Octroi Entertainment Tax Entry Tax Purchase Tax Luxury Tax Advertisement taxes Tax

Hats off to you ISRO

Image
            ISRO(Indian space research organisation) once again created history and made India proud with the successful launch of GSLV Mk  III nicknamed as 'Fatboy' on Monday at 5.28pm from the Sriharikota launch pad, by firing a high thrust indigenous Cryogenic engine and placing the country's heaviest satellite in orbit. ISRO 'Fatboy' ended all the phases of uncertainties after it placed the advanced communication satellite GSAT-19 into orbit after 16minutes of launching.With this successful launch India entered the global market of heavy payload launches.                                       In this Era where each country wants to show its supremacy over the other India on the other hand going far away from this boosted its "neighbourhood first policy" by gifting the satellite to its neighbour countries which means that all its neighbour countries can take benefits like  mapping natural resources, telemedicine, IT connectivity and people-to-peo

Is your email account safe?

Image
                                              Electronic mail or email is the is a method of exchanging messages or data between people using electronics devices.Today mostly all email service are free and anyone can can make use of this services just by creating a account with the service provider.Email operates accross computer networks,which is primarily called as Internet,without the Internet no one can make use of this service. How email works?                        User first composes the email by writting all the content and giving any attachments if required by the help of email client on their computer. After the email is ready the composer of the email will have to provide the emai-id(It is like a persons phone number which provides unique identity to the person for his recognition) of the person whom he wants to send the email. When the email sender clicks on the send button the email is uploaded to the SMTP(simple mail transfer protocol)server as outgoing mai

Big Blow to Android lovers-Judy malware

Image
In India more than 90% of the smartphones run on the open Android operating system.India is big market for Google in terms of downloads from Google play store.Smartphones lover downloads a number of application from the Google play store.India have surpassed the US in 2016,with over 6 billion apps download from the play store in this scenario the"Judy malware" a malware that hit over 36.5 million users in the world was a big blow to all the android lovers in India as well as in the world.                     What is Judy?     Judy is a malware that is embedded in some of the apps available in Google play store almost all malicious app were developed by South Korean company called Kiniwini, but they registered themselves on the Google play store as  ENISTUDIO corp,  But  it is still unclear if the company added the malicious code itself, or its servers were compromised and the code were added by a third-party. This malware generated fake click on an ad and each clic