Sunday, January 28, 2024

DMitry: Deepmagic Information Gathering Tool


"DMitry (Deepmagic Information Gathering Tool) is a UNIX/(GNU)Linux Command Line Application coded in C. DMitry has the ability to gather as much information as possible about a host. Base functionality is able to gather possible subdomains, email addresses, uptime information, tcp port scan, whois lookups, and more." read more...


Download: http://packetstormsecurity.org/UNIX/misc/DMitry-1.2a.tar.gz

Related news


DirBuster: Brute Force Web Directories


"DirBuster is a multi threaded java application designed to brute force directories and files names on web/application servers. Often is the case now of what looks like a web server in a state of default installation is actually not, and has pages and applications hidden within. DirBuster attempts to find these. However tools of this nature are often as only good as the directory and file list they come with. A different approach was taken to generating this. The list was generated from scratch, by crawling the Internet and collecting the directory and files that are actually used by developers! DirBuster comes a total of 9 different lists (Further information can be found below), this makes DirBuster extremely effective at finding those hidden files and directories. And if that was not enough DirBuster also has the option to perform a pure brute force, which leaves the hidden directories and files nowhere to hide! If you have the time ;) " read more...

Download: https://sourceforge.net/projects/dirbuster

More info
  1. Game Hacking
  2. Hacking Tools Usb
  3. Growth Hacker Tools
  4. Hack Tools
  5. Best Pentesting Tools 2018
  6. Beginner Hacker Tools
  7. Hacker Tools 2020
  8. Hacking Tools Name
  9. Hacker Tool Kit
  10. Hacking Tools
  11. Hacking Tools 2020
  12. Hacking Tools Free Download
  13. Hacking App
  14. Hacker Techniques Tools And Incident Handling
  15. Hack Tool Apk No Root
  16. Pentest Tools For Windows
  17. Best Pentesting Tools 2018
  18. Hacker Tools For Windows
  19. Hacker Tools List
  20. Hacking Tools Hardware
  21. Termux Hacking Tools 2019
  22. Hacker Search Tools
  23. Pentest Tools Open Source
  24. Hacking Tools Download
  25. Hack Tools Online
  26. Pentest Tools Website Vulnerability
  27. Hacking Tools For Mac
  28. Hack Tools For Mac
  29. Hack Apps
  30. Hacker Tools Github
  31. Hacker
  32. New Hacker Tools
  33. Hacker Security Tools
  34. Pentest Tools For Mac
  35. Hacking Tools 2020
  36. Hack Tools Github
  37. Hacking Tools Free Download
  38. Hacking Apps
  39. Usb Pentest Tools
  40. Hacking Apps
  41. Hacking Tools For Games
  42. Hack Tools Mac
  43. Hacker Hardware Tools
  44. Hackrf Tools
  45. Hacking Tools Usb
  46. Hack Tools For Windows
  47. Tools Used For Hacking
  48. Hacking Tools For Windows 7
  49. Hacker Tools For Mac
  50. Pentest Tools Website Vulnerability
  51. Pentest Tools Kali Linux
  52. Pentest Tools List
  53. Hacker Tools For Ios
  54. Hacker Hardware Tools
  55. Hacking Apps
  56. Github Hacking Tools
  57. Pentest Tools
  58. Pentest Recon Tools
  59. Hack Tools Download
  60. Pentest Tools Find Subdomains
  61. Usb Pentest Tools
  62. Hacks And Tools
  63. Hacking Tools And Software
  64. Pentest Tools Linux
  65. Pentest Tools For Windows
  66. Pentest Tools Website Vulnerability
  67. Pentest Tools Linux
  68. Pentest Tools Tcp Port Scanner
  69. How To Hack
  70. Hacker Tools Apk
  71. Nsa Hack Tools
  72. Hacking Tools Hardware
  73. Computer Hacker
  74. Hacking Tools Windows 10
  75. Wifi Hacker Tools For Windows
  76. Hacking Tools Name
  77. Usb Pentest Tools
  78. Hacking Tools Windows 10
  79. Best Pentesting Tools 2018
  80. Tools Used For Hacking
  81. New Hacker Tools
  82. Hack App
  83. Computer Hacker
  84. Hacker Tools 2019
  85. Pentest Tools Linux
  86. Kik Hack Tools
  87. Pentest Tools
  88. Hacking Tools Hardware
  89. Hacking Tools For Kali Linux
  90. Hack Tools Pc
  91. Hacking Tools Software
  92. Pentest Automation Tools
  93. Hack Tools For Games
  94. Hack Rom Tools
  95. Pentest Tools Github

Saturday, January 27, 2024

USE OF CRYPTOGRAPHY IN HACKING

WHAT IS CRYPTOGRAPHY?

The Cryptography is derived from the Greek words "Kryptos". This is the study of secure communication techniques that allow only the sender and recipient of a message to view it's contents of transforming information into nonhuman readable form or vice versa is called cryptography.

As we know that information plays a vital role in running of any business and organizations etc, sensitive details in the wrong hands can leads to loss of business.

Cryptography is the science of ciphering and deciphering messages.To secure communication organizations use cryptology to cipher information .

                            Or

Cryptography is a method of protecting information and communication through the use of codes so that only those whom the information is intended can read and process it.

In Computer Science, Cryptography refers to secure information and communication techniques derived from mathematical concepts , a set of rule based calculations called algorithm to transform message in ways the hard to readable for human.

This is one of the secure way of communications for a hacker with the help of virtual private network(VPN) like Tor Browser which is also very helpful to change the IP Address(Location of the sender ) for illegal purpose to perform crime in cyberspace . I will discuss in brief about the VPN .



How to Encrypt and Decrypt the text in Cryptography?

Open this website with the help of internert surfing for encryption-"http://wwwmd5online.org" 

Open the link for Decrypt the code text-"http://www.md5online.org/md5-decrypt.html"

Type whatever you want for encryption and it will crypt in the code form, copy that code and forward to the intended person whom you want for secure communication and then he/she will Decrypt in the real form.




               
       







Continue reading


$$$ Bug Bounty $$$

What is Bug Bounty ?



A bug bounty program, also called a vulnerability rewards program (VRP), is a crowdsourcing initiative that rewards individuals for discovering and reporting software bugs. Bug bounty programs are often initiated to supplement internal code audits and penetration tests as part of an organization's vulnerability management strategy.




Many software vendors and websites run bug bounty programs, paying out cash rewards to software security researchers and white hat hackers who report software vulnerabilities that have the potential to be exploited. Bug reports must document enough information for for the organization offering the bounty to be able to reproduce the vulnerability. Typically, payment amounts are commensurate with the size of the organization, the difficulty in hacking the system and how much impact on users a bug might have.


Mozilla paid out a $3,000 flat rate bounty for bugs that fit its criteria, while Facebook has given out as much as $20,000 for a single bug report. Google paid Chrome operating system bug reporters a combined $700,000 in 2012 and Microsoft paid UK researcher James Forshaw $100,000 for an attack vulnerability in Windows 8.1.  In 2016, Apple announced rewards that max out at $200,000 for a flaw in the iOS secure boot firmware components and up to $50,000 for execution of arbitrary code with kernel privileges or unauthorized iCloud access.


While the use of ethical hackers to find bugs can be very effective, such programs can also be controversial. To limit potential risk, some organizations are offering closed bug bounty programs that require an invitation. Apple, for example, has limited bug bounty participation to few dozen researchers.

Related articles