Posts

HOW TO BECOME A HACKER (part-3)

Image
Another important and essential step to become a hacker is to be good at networking concepts and understanding how the networks are created and it worked. You need to know the differences between different types of networks and must have a clear understanding of TCP/IP and UDP to exploit vulnerabilities (loop holes) in system. I have to know about IP version. Understanding what LAN, WAN, VPN, Firewall is also important. You should know detail about VPN to hide yourself. You must have a clear understanding and use of network tools such as Wireshark, NMAP for packet analyzing, network scanning etc. got it. It is essential for a hacker to learn more than one operating system. There are many other Operating systems apart from Windows, UNIX/LINUX etc. Every system has a loop hole, hacker needs it to exploit it. To become a successful hacker you need to master the art of cryptography. Encryption and Decryption are important skills in hacking. Encryption is widely done in ...

HOW TO BECOME A HACKER (part-2)

Image
Learn to code in more than one language C programming is the base of learning UNIX/LINUX as this operating system is coded in C programming which makes it the most powerful language as compared to other programming languages. C language was developed by Dennis in late 1970’s. To become a hacker you should master C language. Akk of the computer programmer learn C as a starting language. It is the most common computer language all over the world. Is C language is enough to become a hacker. the answer is "no". It is important for a person in the hacking field to learn more than one programming. There are many programming languages to learn such as Python, JAVA, C++. Free eBooks, tutorials are easily available online. I prefer python as a second language. 

HOW TO BECOME A HACKER (part-1)

Image
Learn Unix/ Linux UNIX/LINUX is an open source operating system which provides better security to computer systems more than windows. It was first developed by AT&T in Bell labs and contributed a lot in the world of security. A lot of computer programmer are contributing for upgrading this operating system. You should install LINUX freely available open source versions on your desktops as without learning UNIX/LINUX, it is not possible to become a hacker. even you can install Kali Linux. Through Kali, you can easily do website injection, wifi hacking and you can find other computer network vulnurabilty.

Goldmember's Digimon

Image
Bandai Namco has released new screenshots and details for  Digimon Story Cyber Sleuth: Hacker's Memory , covering new characters, the new "Domination Battle" system, and the Digital Monster 20th Anniversary Digimon Zubamon. We are very happy for that. In  Hacker's Memory , a conflict between hackers has erupted in the digital world in an attempt to claim the ultimate power. Players will meet Yuugo, leader of the biggest hacker group called Zaxon, who are fighting for their rights; Arata Sanada, a former jacker that is the leader of the legendary hacker team known as Jude that Zaxon is fighting against; and Ryuji Mishima, leader of the Hudie faction that players will join. In that way you have to play with your team mate. A new feature called Domination Battle will also make its debut. Two teams battle each other in a neutral network area, which will change colour according to the allegiance of the character that steps on it. The goal is to fight for these area...

WHAT IS ARMITAGE

Image
Arimtage is actually a graphical cyber attack management tool for the metasploit project   that visualizes targets and recommends exploits. It is a free network security tool notable for its contributions to red team collaboration allowing for, shared sessions, data, and communication through a single metasploit instance. Armitage organizes Metasploit's capabilities for the hacking process. There are many features for discovery, access, post-exploitation. Armitage's dynamic workspaces let you define and switch between target criteria fastly. Use this to segment thousands of hosts into target sets. Armitage also launches scans and imports data from security scanners. Armitage visualizes your current targets so you'll know actually the hosts you're working with and where you have sessions. Armitage recommends exploits and will run active checks to tell you which exploits will work in the field. If these options fail. Once you're in, Armitage exposes ...

KALI LINUX TOOLS LIST

Image
Kali linux is a debian-derived linux distribution. It is designed for digital forensics and penetration testing.   The operating system has preinstalled approximately 300 penetration-testing programs. Few of the name given below. 1)       Namp:   The software provides a number of features for probing computer networks, including host discovery and service. These features are extensible by scripts that provide more advanced service detection, vulnerability detection,   and other features. Nmap is also capable of adapting to network conditions including latency and congestion during a scan. Nmap is under development and refinement by its user community. 2)       Armitage: it’s actually a graphical cyber attack management tool for the metasploit project   that visualizes targets and recommends exploits. It is a free network security tool notable for its contributions to red team collaboration allowing for, s...

TOP 5 REASON. WHY SHOULD WE USE LINUX?

Image
1)       Linux is a complete dependable server that offers excellent security to the user. Linux community helps you to fix any kind of technical problem. Even linux user get regular kernel updates and regular security patches. So don’t have to use anti-virus in your system. Moreover, it is totally free of charges. 2)       It has wide compatibility t several hardware. For example, windows 7 and 8 do require at least 1GB RAM for your system to operate perfectly. Sometimes u can feel that, it is not enough indeed. But linux is a lightweight operating system, It can be used by any of your systems. It is designed for everyone and can be used by anyone. 3)       You don’t have to go for training to learn how to operate linux operation system. It has all the necessary functionality that is included in windows OS.  4)       It has smooth and easyupdating process. In w...