Skip to main content

Posts

What is a firewall?How it works?

  Firewalls  are software or hardware that  work  as a filtration system for the data attempting to enter your computer or network.  Firewalls  scan packets for malicious code or attack vectors that have already been identified as established threats.      Firewalls filter network traffic so that you only receive data that you should be getting. No firewall works perfectly, and a lot of a firewall's effectiveness depends on how you configure it. The need of Firewalls for Personal Use For home use, firewalls work much more simply. The main goal of a personal  firewall is to protect  your personal computer and private network from malicious mischief. Malware, malicious software, is the primary threat to your home computer. Viruses are often the first type of malware that comes to mind. A virus can be transmitted to your computer through email or over the Internet and can quickly cause a lot of damage to your files. Other malware inclu...

How to crack Power ISO | Reverse Engineering

p>  You might have heard about Powe ISO software of windows. PowerISO is a powerful CD / DVD / BD image file processing tool, which allows you to open, extract, burn, create, edit, compress, encrypt, split and convert ISO files, and mount ISO files with an internal virtual drive. It can process almost all CD / DVD / BD image files including ISO and BIN files. PowerISO provides an all-in-one solution. You can do everything with your ISO files and disc image files. it is like the WinRAR software. you should check their  website  for once. If you have ever used this, you must know that there are some limitations to demo software. or you can call it some frustrating things. you will see in the demo that you have to wait for some time before using the software. we can remove that too. but we won’t need to do that. we are going to bypass the registration. it means that no matter if we have the right key or not, once we will enter it, the software will get reg...

How to manage hosts of Wi-Fi router/Hotspot

  Do you have a router at your home? if you have one, you must face some problems. such as your brother/sister is streaming on 720p while you are working on something. or someone else has already used the daily limit. well, most problems are related to internet speed. so, what do you do to face such a situation? there are some routers that provide a web-interface to manage devices connected to the router. but what if you are using the mobile hotspot. well, Android doesn’t have so much option to manage the devices. In this article, we are going to use a tool named “Evilimiter”. we will manage devices which are connected to wifi. doesn’t matter if you are on wifi router or mobile hotspot. you will be able to run internet connection very fairly. more fun, if you are at a college hostel. but I won’t recommend this. but still, if you are curious, you will need to change mac address before doing this at the hostel. and try to continuously change the local IP provided by the ro...

How To Get An INVITE code from HTB(hack the box)?

  As you all know that hacking is growing day by day. But some people never get up from hacking their GF facebook account. if they try to move on from there, they are not able to think about what to learn or hack next. the thought of it makes them a weak hacker. There are some people who work hard and make the vulnerable machines, so  that  the hackers may hack it and learn something from it. what is HTB? HTB (hack the box) is a try for hackers to upgrade their hacking skills.there are lots of challenges and machines to penetrate. Makers of HTB provide it free and paid. paid members get extra benefit. HTB has its own discussion on different topics.  H ow to get an invite code from HTB? warning- spoilers ahead if you wanna hack it yourself don’t go down. you might be on this page  https://www.hackthebox.eu/invite and wondering that how will you get an invite code? as you can see that there is something written over input. like this: it means, we have to hack...

How To Share Files between Windows and Linux Over Network | Samba

  No matter how good you are at CTF Challenges, you may not know how to edit a text file in Powershell. In reality, I don’t not a good score in Windows CTF challenges but these days I am learning more about windows. it is another matter that I can’t run Linux in this new Laptop. I mean, I can but with Virtualization. PowerShell is a task automation and configuration management framework from Microsoft, consisting of a command-line shell and the associated scripting language. PowerShell supports aliases to refer to commands by alternate names. Aliasing allows users with experience in other shells to use common command names that they already know for similar operations in PowerShell. basically, it means that you can use  cd  command instead of  Set-Location .  cd  will be read as  Set-Location  by the Powershell. Powershell scripting is mostly related to PHP and Linux shell scripting. all you have to learn new is cmdlets. We are going to use ...

OVERTHEWIRE.ORG NATAS

  Today, we will play a war-game called   Natas . It has a collection of 34 levels. OverTheWire Organization hosts this war-game. Absolute Beginners are the target audience. It teaches the basics of serverside web-security in a fun and challenging way. To play this war-game, go to the Natas website by clicking   here . Objective Find the password to login on to the next level. Table of Content: Introduction Level 0 Level 0 → Level 1 Level 1 → Level 2 Level 2 → Level 3 Level 3 → Level 4 Level 4 → Level 5 Level 5 → Level 6 Level 6 → Level 7 Level 7 → Level 8 Level 8 → Level 9 Level 9 → Level 10 Introduction Natas have levels designed in such a way that each level has a different website. To reach each website we will enter the URL in this format. natasX.natas.labs.overthewire.org, where X is the Level Number. To access a level, we will use the username for that level (e.g. natas0 for level 0) and its password. The password for the next level is hidden on the current ...