The Onion Router or the well known TOR is the most popular platform for being anonymous by freed from clearnet. For years it had well recognition for anonymity, but lately there was some bad news regarding the security of the TOR network, revealing TOR users and some of security breaches. Some of these has been exposed, but some of them are in a blackhole inside this network. As a result there is a trend to use a VPN with TOR browser. There are lots of guides to configure TOR with a VPN. Some of these solutions has raised because of the miss concepts. Therefore before getting into correct or wrong of these news and solutions, it must have to take a look into what happens inside TOR.
Saturday, October 13, 2018
Friday, July 20, 2018
VPN setup for kali
VPN is a essential part in using kali. Here is a simple setup of vpn for kali.
- Go to https://www.vpnbook.com/freevpn and download ovpn config files to kali.
- Place them in an accessible place.
- Install ovpn
Tuesday, February 20, 2018
Link shortner for bypass phishing detection bitly
Recently there was a huge video link scam based on facebook users for hack their fb accounts. It is a phishing attack which is prompting for user name and password for fb login.
Message actually comes as a video which claims that victim was there. As its comes from user's friend and he/she was in the video most of victims open the link with the panic situation. Then it will goes to fb login page which user needs to put there user name and password. Finally the hacker will take the control of victim's fb account. Then hacker will send the same message to victim's friends also.
Important thing in here it has used bitly for short and mask phishing site's url.as it is shorten fb phishing site detection could be bypassed by the hacker. Therefore bitly.com is a good site for short your phishing site's link and bypass the phishing site detection
Message actually comes as a video which claims that victim was there. As its comes from user's friend and he/she was in the video most of victims open the link with the panic situation. Then it will goes to fb login page which user needs to put there user name and password. Finally the hacker will take the control of victim's fb account. Then hacker will send the same message to victim's friends also.
Important thing in here it has used bitly for short and mask phishing site's url.as it is shorten fb phishing site detection could be bypassed by the hacker. Therefore bitly.com is a good site for short your phishing site's link and bypass the phishing site detection
Friday, February 16, 2018
Wiper malware steps
- Steal credentials from browser and system.
- Spread to other systems using psexec and WMI tools.
- First delete all shadow copies of files and windows backup catalogs.
- Turn off recovery mode.
- Delete system logs.
This will cover tracks and making difficult to recover
Sunday, November 5, 2017
Facebook search people by number
Facebook has a good database of phone numbers of people who has been signed up. Any person who is going to create an FB account should have a phone number. Facebook allows to search people through this number. Normally if you typed phone number on the find friend bar on facebook it normally search for the person with that number. But it wont works sometimes. Following is a trick for getting around this.
http://m.facebook.com/search/?query=123456789
Here is the magic link for check a person from his number. In this link instead of 123456789 put the phone number with area code.
http://m.facebook.com/search/?query=123456789
Here is the magic link for check a person from his number. In this link instead of 123456789 put the phone number with area code.
Thursday, October 5, 2017
9 books for ethical hackers
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography [Kindle Edition]
Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker [Kindle Edition]
Rtfm: Red Team Field Manual
CISSP All-in-One Exam Guide, 6th Edition
Wednesday, August 2, 2017
Softether VPN
VPN or Virtual Private Networks are leading technology in networking for purposes from connecting to office PC in home to connecting two or more WANs for secure communication. Companies and organizations use VPNs for secure their communication while some computer users use VPNs for easy to connect to a remote networks. Hackers use VPNs for get annonymous. So VPNs are used for different purposes in different ways.
Subscribe to:
Posts (Atom)