Posts

Showing posts from 2017

AN OVERVIEW OF INTERNET SECURITY

Image
1.0 INTRODUCTION Internet security is an essential part of information technology or rather computer security to be more direct. It is quite related to the internet. It always involves the browser security which is the application that views HTML files over the internet. It always involves the browser security and also network security on a general level as applied to operating systems which are a part of the application layer system. The goal of internet security is to establish rules and procedures which are used to check against attacks over the internet. The internet being a network of many different networks, it is an unsecure channel for information exchange. Hence, there is a high risk of intrusion and fraud. Methods have been developed mitigate all these threats to the data over the transmission channels. Such methods as encryption have been taken to check the threats of sniffing packets, hacking and phishing. 1.1 EVOLUTION Data is the key item in business tra...

WIFITE

Wifite Package Description To attack multiple WEP, WPA, and WPS encrypted networks in a row. This tool is customizable to be automated with only a few arguments. Wifite aims to be the “set it and forget it” wireless auditing tool. Features: sorts targets by signal strength (in dB); cracks closest access points first automatically de-authenticates clients of hidden networks to reveal SSIDs numerous filters to specify exactly what to attack (wep/wpa/both, above certain signal strengths, channels, etc) customizable settings (timeouts, packets/sec, etc) “anonymous” feature; changes MAC to a random address before attacking, then changes back when attacks are complete all captured WPA handshakes are backed up to wifite.py’s current directory smart WPA de-authentication; cycles between all clients and broadcast deauths stop any attack with Ctrl+C, with options to continue, move onto next target, skip to cracking, or exit displays session summary at exit; shows any cracked keys all p...

BREAKTHROUGH with CAIN & ABEL

Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols. The program does not exploit any software vulnerabilities or bugs that could not be fixed with little effort. It covers some security aspects/weakness present in protocol's standards, authentication methods and caching mechanisms; its main purpose is the simplified recovery of passwords and credentials from various sources, however it also ships some "non standard" utilities for Microsoft Windows users. Cain & Abel has been developed in the hope that it will be useful for network administrators, teachers, security consultants/professionals, forensic st...

Most common vulnerability – Stupidity!

Image
If you received a message from your boss saying he/she loved you – might be cause for suspicion? Many PC users consider malware, viruses, spyware, adware, worms, Trojans, Hoax, etc. as the same thing. While all these infections harm our computers, they are not the same. They are all types of malicious software that each behave differently.                                                            The word malware is a combination of two words “malicious” and “software”. It is a generic term used to describe all of the hostile and intrusive program codes including viruses, spyware, worms, Trojans, or anything that is designed to perform malicious operations on a computer. The meanings of many of these words have changed over time. Some refer to how the malware infects your system while other words are used to describe wha...

Ten Computer Hacks & Tricks

Image
 1. Learn How to Use the Command Line The bitter truth is that using the CLI (command line interface) is not as exciting as using the GUI(Graphic User Interface) contrary to what we see in most Hollywood high Tech movies. it takes a lot of passion and dedication to be able to properly master the art of using the CLI. Nonetheless, the CLI is the best option for power user as it allows you to complete the most complex tasks with less keystrokes on the keyboard.    2. Find Additional Uses for Programs you Already Have Computer nerds will always think out of the box, especially when it comes to finding new uses for the tools and programs they already use. Most programs can be used for more purposes, in addition to their original one. For instance, the file-syncing program, Dropbox, can be used to monitor your home computer, download torrents or even print files from afar. You can also use Gmail to find out if someone has stolen your phone.  3. Understand When To...