Posts

Showing posts from August, 2017

Side Channel attack

What is Side Channel Attacks do? In cryptography, a side-channel attack is any attack based on information gained from the physical implementation of a cryptosystem, rather than brute force or theoretical weaknesses in the algorithms (compare cryptanalysis). For example, timing information, power consumption, electromagnetic leaks or even sound can provide an extra source of information, which can be exploited to break the system. Some side-channel attacks require technical knowledge of the internal operation of the system on which the cryptography is implemented, although others such as differential power analysis are effective as black-box attacks. How does side-channel analysis work? All attacks take advantage of the changes in processing behavior that will be exhibited at different times during algorithm execution. There are two broad classes of side-channel analysis: simple and differential. Within those classes, attackers can use a range of side-channel properties, such

Securing Your Linux System Bit by Bit

As daunting as securing your Linux system might seem, one thing to remember is that every extra step makes a difference. It's almost always better to make a modest stride than let uncertainty keep you from starting. Fortunately, there are a few basic techniques that greatly benefit users at all levels, and knowing how to securely wipe your hard drive in Linux is one of them. Because I adopted Linux primarily with security in mind, this is one of the first things I learned. Once you have absorbed this lesson, you will be able to part with your hard drives safely. As you might have deduced, the usual way of deleting doesn't always cut it. The most often-used processes for deleting files -- clicking "delete" in the operating system or using the "rm" command -- are not secure. When you use one of these methods, all your hard drive does is mark the area where the deleted file used to be as available for new data to be written there. In other words, the ori

Bandit Wargame

Image
Hello, guys !!! Today I'm bringing some interesting topic to you. That is Bandit(War game). Let's talk about the Active Directory. What is war game? Wargame is a concept where you can learn about some commands and train your self. your mind can improve your knowledge on hacking as well as to learn and practice your knowledge of Linux commands. Mainly these include the concepts of capture the flag logic behind it.You can also improve your password cracking skills, pen testing skills and much more other hacking techniques. I have provided a walkthrough on a game called Bandit. Here you can proceed from one level to another. Login to  http://overthewire.org/wargames/   Here you will be able to select the wargame you want to play. Select Bandit. In this war game, there are 27 levels in which you have to complete one by one to proceed to the next level. Let's start with level zero. I'm going to play  Level 0 The goal of this level is for you to log

Active Directory

Image
Hello, guys !!! Today I'm bringing some interesting topic to you. That is Ransomware. Let's talk about the Active Directory. AD is a directory service that Microsoft developed for Windows domain networks. It is included in most Windows server operating systems as a set of processes and services. Active Directory was only in charge of centralized domain management. How does the active directory work? It provides authentication and authorization mechanisms as well as a framework within which other related services can be deployed (AD certificate services, AD Federated Services) In the security field, most important thing is active directory because backup maintenance is very easy. In security and privileges can be provided. Why Organizations need active directory security auditing and recovery Keeping up with changes to Active Directory is an extremely time consuming and complex process. Delays and discovering and addressing changes can cause bu

Ransomware

Image
Ransomware Application Hello guys !!! Today I'm bring some interesting topic to you. That is Ransomware. Lets talk about the Ransomware. What is Ransomware ? Definition 01 :- Ransomware is computer malware that installs covertly on a victim’s device (Eg :- computer, smartphone, wearable device) and that either mounts the cryptovirl extortion attack from cryptovirollogy that holds the victim’s data hostage, or mounts a cryptovirology leak ware attack that threatens to publish the victim’s. Definition 02 :- Ransomware is a type of malware that prevents or limits users from accessing their system, either by locking the system’s screen or by locking the user’s files unless a ransom is paid. More modern ransomware families, collectively categorized as Crypto-ransomware, encrypt certain file types on infected system and focus users to pay the ransom through certain online payment methods to get a decrypt key. Ransom Prices and Payment  Ransom prices vary d

Footprinting and Reconnaissance

Image
Hello Peeps!!! Today I’m going to talk about the Footprinting and Reconnaissance Footprinting known as Reconnaissance, it is most important part in the hacking. Reconnaissance is the first step before an attack on a network, application or a system.   What Footprinting is? Footprinting is the process of collecting information as possible about a target network or a system, for identifying various ways to intrude into an organization’s network system. In here gathers all publically available sensitive data, using several types of tools and methodologies. Footprinting allows attackers to know the external security posture and flaw of the target organization. It reduces attacker’s focus area to specific range of IP address, networks, domain names and etc.  It allows attacker to identify the vulnerabilities and understand the outline the target organization’s network infrastructure. Objectives of Footprinting Collect network information (Domain name, I