Posts

Showing posts from February, 2017

TOR Vs VPN Vs Proxy !!!

Image
TOR: TOR stands for Total  Onion Routing. It is a decentralized  system  that allows users to connect to a system of random  relays, thus  protecting their anonymity. TOR encrypts  the data along with the IP address multiple times before sending it through a virtual circuit comprising of a number of relays. Using TOR  makes it more difficult for the activity to be traced back to the user. Advantages : 1.Free 2.Difficult to trace. Disadvantages : 1.Slow. 2.If the exit node is compromised, then your encrypted data is as good as plain text. 3.Location spoofing is not suitable. 4.Not suitable for  p2p file sharing. VPN: It stands for Virtual Private Network. The computer creates  an encrypted tunnel to a VPN server and all of the browsing appears to come from that VPN server. Advantages : 1.Fast. 2.Location can easily be spoofed. Disadvantages : 1.The internet activity is visible to the VPN provider a...

NMAP FOR RECONNAISSANCE #2

Image
                             Hello this is virtual . In the last tutorial I taught you the basic uses of Nmap . This is a continuation of the previous post concentrating on some advanced uses of Nmap .   1. Zenmap : This is a GUI of Nmap . To access it type ' zenmap ' in the Terminal [in root] . It is much easy for beginners and is interactive . 2 .Scan for an entire subnet :   Let me give an example.If you want to scan for entire Class C subnet with port 80 open type             nmap  <ip>/24 -p 80  Eg. nmap 192.168.0.1/24 -p 80     3 .Evading Intrusion Detection System : Most commercial servers have Intrusion Detecting System which alerts the system administrator in case of malicious activity . The best way to evade them is to slow down the s...

ACTIVE RECONNAISSANCE:USING NMAP FOR INFORMATION GATHERING!!!

Image
                         Open source tool Nmap is a popular choice amongst hackers and security pros. It is the first choice to perform active reconnaissance. WHAT IS RECONNAISSANCE?? The word reconnaissance is borrowed from its military use, where it refers to a mission into enemy territory to obtain information.In computer reconnaissance generally means the act of knowledge gathering by hackers.It involves the act of scanning a machine for open ports and services associated with them. LETS START! Nmap is the most popular tool used by hackers for reconnaissance.It comes inbuilt in Kali linux and Parrot Security OS. If you are using any other Linux based OS like Ubuntu, you can install it by  sudo apt-get install nmap To check if nmap has been installed type  ' nmap ' and press Enter. { Do this in root ( try ' sudo -i ' ) } ...