Wednesday, 16 December 2015

Command Prompt Tricks, Hacks & Unknown Codes

Command Prompt, better known as cmd.exe or just cmd (after its executable file name), is the command-line interpreter on OS/2 and eComStation, Windows CE and Windows NT operating systems. It is the counterpart of COMMAND.COM in DOS and Windows 9x systems (where it is also called “MS-DOS Prompt”), or some of the Unix shells used on Unix-like systems. (More advanced Unix shells must be compared with Windows PowerShell, another command-line interpreter of Windows.) The initial version of Command Prompt for Windows NT was developed by Therese Stowell.
star-wars
As the GUI operating systems keep on advancing, computing through commands prompts felt boring to many. This in turn resulted in the command prompts taking a backseat. These tricks and hacks will help you discover the command prompt.
Knowing about your internet connection details :
Well its always fun watching how the online hackers and thefts are caught by use of details like IP address and other information? What if you could decode yours too? Just type ipconfig/ all in the command prompt and press enter.
Along with your IP address and DNS servers, command prompt will provide you a list if other information too.
Wifi theft : Everyone is up for free wi-fi. Isn’t it? Command prompt will help you know if anyone is stealing your wi-fi.
Just follow the steps:-
1) Open your browser and visit the Gateway address of your router (find out by typing ipconfig in cmd).
2) Find the tab that mentions “Attached Devices” or something similar.
3) Find the computer name, IP address and MAC Address (sometimes called Physical Address or Hardware Address) of your computer using the previous trick.
4 )Compare it with those displayed by your router in Step 2. If you notice some strange devices, then someone may be using your internet connection.
Trace the hacker :  Want to make sure your computer is safe from hackers? Well command prompt helps you keep a check on that as well. Just execute netstat -a and you shall get the list of computers that your computer is connected to.
Now you know how much of a use command prompt can be from keeping your WiFi safe, to watching star wars.

Thursday, 24 September 2015

Learn it Faster: The Entire Python Language in a Single Image

 What if you had to study one single page to get the complete idea of a programming language? In this article, I’m sharing an infographic to help you learn Python faster than ever.
This is the follow up of my article The Entire JavaScript Language in a Single Image. Today, we are sharing The Entire Python Language in a Single Image infographic with our fossBytes readers.
A China-based developer Yusheng has created this brilliant infographic that encapsulates the entire Python 3 programming language in a single image. Python is one of the most popular programming languages and it’s a skill every programmer must possess.
Yusheng’s mind map is here for you in easily understandable format that will help you to brush up your memory.
You can find the image online on GitHub, or save it directly from below.
You can also grab your Python Hacker Bundle here.
python 3 in one pic

TOP 10 Operating Systems For Hackers

Today we are discussing about top 15 advanced operating systems which has great penetration testing or ethical hacking tools. the top Os on this list is my favorite Linux distro Kali Linux because it is very popular in pentesting and it is developed by the same team of BackTrack (Offensive security). i am not including BackTrack on this list because it is no more available officially on their website and the next version of BackTrack is Kali Linux. the listed operating systems are here based on Linux kernel so it is all free operating system

1. Kali Linux


kali-wallpaper-2015-v1.1.0
Kali Linux is a Debian-derivedLinux distribution designed for digital forensics and penetration testing. It is maintained and funded by Offensive Security Ltd. Mati Aharoni and Devon Kearns of Offensive Security developed it by rewriting BackTrack. Kali Linux is the most versatile and advanced penetration testing distro. Kali updates its tools and it is available for many different platforms like VMware and ARM. if you want to know more about Kali Linux then i recommend you read my previous article: An Introduction To Hacker’s OS Kali Linux And Setup Tutorial.

2. BackBox 

It includes some of the most used security and analysis Linux tools, aiming to a wide spread of goals, ranging from web application analysis to network analysis, from stress tests to sniffing, including also vulnerability assessment, computer forensic analysis and exploitation.
The power of this distribution is given by its Launchpad repository core constantly updated to the last stable version of the most known and used ethical hacking tools. The integration and development of new tools inside the distribution follows the commencement of open source community and particularly the Debian Free Software Guidelines criteria.

3. Parrot-sec forensic os

Parrot Security is an operating system based on Debian GNU/Linux mixed with Frozenbox OS and Kali linux in order to provide the best penetration and security testing experience. it is an operating system for IT security and penetration testing developed by the Frozenbox Dev Team. It is a GNU/Linux distribution based on Debian and mixed with Kali.
Parrot uses Kali repositories in order to take latest updats for almost all the tools, but it also has its own dedicated repository where all the custom packets are kept. This is why this distro is not just a simple Kali “mod” but entire new concept which relies on Kali’s tool repositories. As such, it introduces a lot of new features and different developing choices.Parrot uses MATE as a Desktop Environment. Lightweight and powerful interface is derived from famous Gnome 2, and thanks to FrozenBox highly customizable with captivating icons, ad-hoc themes and wallpapers. System look is proposed and designed by the community members and also members of Frozenbox Network, who are closely following the development of this project.

4. DEFT

Deft is Ubuntu customization with a collection of computer forensic programs and documents created by thousands of individuals, teams and companies. Each of these works might come under a different licence. There Licence Policy describe the process that we follow in determining which software we will ship and by default on the deft install CD.

5. Live Hacking OS

As i am said before Live Hacking OS is also based on linux which has big package of hacking tools useful for ethical hacking or penetration testing. It includes the graphical user interface GNOME inbuilt. There is a second variation available which has command line only, and it requires very less hardware requirements.

6. Samurai Web Security Framework

The Samurai Web Testing Framework is a live linux environment that has been pre-configured to function as a web pen-testing environment. The CD contains the best of the open source and free tools that focus on testing and attacking websites. In developing this environment, we have based our tool selection on the tools we use in our security practice. We have included the tools used in all four steps of a web pen-test.

7. NodeZero

It is said the necessity is the mother of all invention, and NodeZero Linux is no different. There team is built of testers and developers, who have come to the census that live systems do not offer what they need in their security audits. Penetration Testing distributions tend to have historically utilized the “Live” system concept of linux, which really means that they try not to make any permanent effects to a system. Ergo all changes are gone after reboot, and run from media such as discs and USB’s drives. However all that this maybe very handy for occasional testing, its usefulness can be depleted when your testing regularly. Its there believe that “Live System’s” just don’t scale well in a robust testing environment.
All though NodeZero Linux can be used as a “Live System” for occasional testing, its real strength comes from the understanding that a tester requires a strong and efficient system. This is achieved in our belief by working at a distribution that is a permanent installation, that benefits from a strong selection of tools, integrated with a stable linux environment.

8. Pentoo

Pentoo is a Live CD and Live USB designed for penetration testing and security assessment. Based on Gentoo Linux, Pentoo is provided both as 32 and 64 bit installable live cd. Pentoo is also available as an overlay for an existing Gentoo installation. It features packet injection patched wifi drivers, GPGPU cracking software, and lots of tools for penetration testing and security assessment. The Pentoo kernel includes grsecurity and PAX hardening and extra patches – with binaries compiled from a hardened toolchain with the latest nightly versions of some tools available.

9. Knoppix STD

Knoppix STD (Security Tools Distribution) is a Live CD Linux distribution based on Knoppix that focused on computer security tools. It included GPL licensed tools in the following categories: authentication, password cracking, encryption, forensics, firewalls, honeypots, intrusion detection system, network utilities, penetration, packet sniffers, assemblers, vulnerability assessment and wireless networking. Knoppix STD version 0.1 was published January 24, 2004, on Knoppix 3.2. Thereafter, the project stagnated, lacking updated drivers and packages. A release date for version 0.2 has not yet been announced. A list of tools is available on the official website.

10. Blackbuntu

Blackbuntu is distribution for penetration testing which was specially designed for security training students and practitioners of information security. Blackbuntu is penetration testing distribution with GNOME Desktop Environment. It’s currently being built using the Ubuntu 10.10 and work on reference Back|Track.

Saturday, 19 September 2015

How to Crash Google Chrome With These 16 Characters in 2 Seconds


 Do you want to crash someone’s Google Chrome just for the heck of it? Here’s how to do it with 16 simple characters.

Due to a bug in Chromium engine, you can crash someone’s Google Chrome browser just by adding a NULL char in the URL string. The bug was discovered by Andris Atteka and he has explained in his blog.
He demonstrated the bug using 26 characters length string, but you crash Google Chrome using just 16 characters.

How to crash Google Chrome with these 16 characters?

Just copy and paste the following string in your Google Chrome (Chrome 45 or older) address bar, hit Enter and watch your Chrome tab or the whole Chrome browser will crash:

http://b/%%30%30

Be careful, this step will crash your browser instantly!!
The browser crashes even if you hover over the hyperlink given ahead using your mouse pointer: http://b/%%30%30

Why does Chrome browser crash?

“It seems to be crashing in some very old code. In the Debug build, it’s hitting a DCHECK on an invalid URL in GURL, deep in some History code. Given that it’s hitting a CHECK in the Release build, I don’t think this is actually a security bug, but I’m going to leave it as such.”

In my tests, the code affects both Windows and Mac. The bug also affects Opera and Vivaldi browsers, as both are build over the Chromium engine. However, it didn’t affect Chrome for Android.

This bug was only a local DoS issue, so Mr. Atteka didn’t get cover into the company’s bug bounty program.

Such bugs have been observed in the past and were quickly fixed.

Friday, 18 September 2015

Best Android Hacking Tools 2015

Download Best Android Hacking Tools 2015
As we all know hacking and pen testing is only can be done on computers. But now the world is changing now your mobile is small hacking toolkit using these apps. Must try all these best hacking apps or hacking tools.

Download Best Android Hacking Tools 2015.

#1 The Android Network Hacking Toolkit

In the last Defcon conference a new tool has been released by a security researcher and the tool is called “The Android network toolkit”. The has been developed for penetration tester and ethical hackers to test any network and vulnerabilities by using their mobile phones. This toolkit contain different apps that will help any hacker to find vulnerabilities and possibly exploit it. The company behind the app is an Israeli security firm called Zimperium.

#2 Nmap for Android

Nmap (network mapper) is one the best among different network scanner (port finder) tool, Nmap mainly developed for Unix OS but now it is available on Windows and Android as well. Nmap for android is a Nmap apps for your phone! Once your scan finishes you can e-mail the results. This application is not a official apps but it looks good.

#3 FaceNiff 2.4 final- Session Hijacker for Android

Your Facebook account is at risk, just like a Firesheep (for firefox hacking) there is a FaceNiff for hijacking the session of famous social networking websites includes facebook and twitter. FaceNiff is developed by Bartosz Ponurkiewicz who created Firesheep before but faceniff is for android OS.

#4 AnDOSid- DOS Tool for Android

DOS or denial of service attack is very dangerous attack because it takes down the server
(computer).AnDOSid allows security professionals to simulate a DOS attack (A http post flood attack to be exact) and of course a dDOS on a web server, from mobile phones.AnDOSid is designed for security professionals only!

#5 SSHDroid- Android Secure Shell

Secure shell or SSH is the best protocol that provides an extra layer of security while you are connecting with your remote machine.SSHDroid is a SSH server implementation for Android.
This application will let you to connect to your device from a PC and execute commands (like “terminal” and “adb shell”).

How To Download And Install iOS 9 For iPhone And iPad


How To Download And Install iOS 9 For iPhone And iPad
How To Download And Install iOS 9 For iPhone And iPad
After much waiting, the iOS 9 has finally arrived to mobile devices of Apple. The new OS version brings a number of new features for consumers who can now count on changes in apps, a Siri remodeled and more changes with the new version of the operating system.

Download And Install iOS 9 For iPhone And iPad Also Must Follow The Procedure Before Doing This Workout.

From Wednesday September 16th, all consumers with compatible devices will acquire the updates of iOS 9. Check now how to perform the process on your device and enjoy to see some tips to ensure that your device is fully prepared for the news.
#1 Make sure your device is compatible
As with all operating system generations, older devices do not have sufficient hardware to run all features. So Apple can not extend the updates for all portable devices and limits the novelty to the latest electronics. Check out the list of all that can go through the update:
  • iPhone 4S
  • Iphone 5
  • Iphone 5s
  • iPhone 5C
  • iPhone 6
  • iPhone 6 Plus
  • iPod Touch (fifth generation)
  • iPad 2
  • iPad 3
  • iPad 4
  • iPad Air
  • iPad Air 2
  • IPAD MINI
  • iPad Mini 2
  • iPad Mini 3
#2 Should Take Backup!
You are already more than used to hearing this advice before major updates, does not it? For iOS to take 9 to your smartphone or tablet to tip is valid again. Make a backup of your photos and applications enjoy iCloud to do this without external drives – and do not worry about the safety of your data.
#3 Clean up disk space
Before downloading and installing iOS 9, it is essential that you free up space on your laptop. If you already have iOS 8 installed on your device, it will take only 1.3 GB of space for the download and installation of the new system. On the other hand, who is still with older versions it will have to release at least 6 GB. Remember that have fewer files on the device may cause the whole process is faster and more stable.
#4 Don’t Forget To Make a Full Recharge
The update process is very time consuming in some cases, why iOS requires that your device is with the battery charged before starting the update.
#5 Now Just Download and install iOS 9
If you have chosen to make an “update on top,” can perform the entire upgrade process of the OS by the device itself. On the other hand, if you want to install the new system making a device formatting, the most appropriate is to conduct the process through iTunes and this is even more important to remember to backup your data.
On Phone: to update the device, you will have to access the Settings menuGeneral>Software Update. Then just accept the terms of Apple’s contract and wait for the download which may take more than an hour, according to the speed of your internet.
On the computer: if you prefer to download via iTunes, you will have to open the application and connect your device via USB cable in iTunes itself, select the device. Then look for the “Summary” pane and click “Check for Update“. Finally, you only have to click on “Download and update“.

Microsoft has developed its own Linux-based OS for cloud-based services


Finally Microsoft goes Linux, develops it’s in-house software-defined networking OS, ACS

Currently, Microsoft is working on a Linux-based operating system that is aimed at driving the networking hardware in the enterprise space. Until now, the diverse set of networking hardware available was run on different software platforms, which made managing them a nightmare.
Microsoft is working on building Azure Cloud Switch (ACS), which is the company’s first foray into switch hardware and it has Linux under the hood. The ACS will make it simple to control the hardware that powers cloud-based services.
The company calls it “a cross-platform modular operating system for data networking built on Linux.” The Linux-based ACS is a software to debug, fix and test software bugs much faster.
“We believe this approach of disaggregating the switch software from the switch hardware will continue to be a growing trend in the networking industry and we would like to contribute our insights and experiences of this journey starting here,” said Kamala Subramanian, Redmond’s principal architect for Azure Networking.
She also pointed out that, “It also allows us the flexibility to scale down the software and develop features that are required for our datacenter and our networking needs.”
Though Microsoft did not tell why it needed to develop its own Linux distribution, Subramanian said that ACS believes in the power of Open Networking and aims for easier configuration and management by integrating with Microsoft’s monitoring and diagnostics system. By moving away from the traditional enterprise interactive model of command line interfaces, it allows for switches to be managed just as servers are with weekly software rollouts and roll backs, thus ensuring a mature configuration and deployment model. Using Linux, ACS is also able to use the vibrant Linux ecosystem and support the Open Source and Third Party applications.
Subramanian says, “We’re talking about ACS publicly as we believe this approach of disaggregating the switch software from the switch hardware will continue to be a growing trend in the networking industry and we would like to contribute our insights and experiences of this journey starting here.”
The company writes, “At Microsoft, we believe there are many excellent switch hardware platforms available on the market, with healthy competition between many vendors driving innovation, speed increases, and cost reductions.”
The new Microsoft under Satya Nadella shows that it is not afraid to adopt open source technologies while implementing solutions, as long as it gets the job done. In this case, even Linux.