Friday, May 27, 2022

Kali Linux Tools 2

 Kali linux Tool




  • Aircrack-ng:
    • It is an all in one packet sniffer, Hash capturing and Analyzing tool.
    • It can be used for wifi hacking,It requires a tool called wifi adapter(with monitor mode).
    • Using above the we can capture the pakages and possible to crack those hashes.
    • It support almost all the latest wireless interfaces.
  • John the Ripper:
    • It is a Open source password cracking tool.
    • It support hundreds of hash and cipher types includes,
      • groupware
      • database servers
      • Network traffic captures
      • Encrypt private key
      • File System
      • Disks
    • It can also be used to crack hashes for zipped or compressed files.


  • sqlmap:
    • Sqlmap is one of the best tool used to perform SQL Injection.
    • Used to automates the process of exploitation of vulnerable parameter.
    • It is even use the requested file to check for post parameter.



  • Autopsy:
    • It is a digital forensics tool.
    • It is used to gather informations.
    • It can also used as a recovery tool to recover files from external memory storages.



  • Social Engineering Toolkit:
    • The Social Enginnering toolkit is a  collection of tools used to perform Social Engineering attacks.
    • It manipulate human behaviour for information gathering.
    • It is used as a tool to perform phishing attack.




Thursday, May 26, 2022

Kali Linux Tools 1

 5 tools in kali linux 


  • Nmap:
    • This tool is very useful for scanning network.
    • It is known as Network Scanner.
    • It can be automated.It is possible to write script to make it possible.
    • It is very much used by penetration tester.

  • Burp Suite:
    • It is a most popular web application testing software.
    • It is used to check proxy passes through.
    • It is possible to make changes to the request.

  • Wireshark:
    • It is a tool used to analyze or work with data sent over a network.
    • The packets that are sent via a network can be analyze with this tool.
    • It has various options to check for a particular packet and more methods to make it efficient.

  • Metasploit Framework:
    • It is open source tool designed by Rapid7 technologies.
    • It contains lot of exploits to exploit the vulnerabilities over a network or operating system.
    • It is basically a CLI based tool but it also has a GUI pakage known as armtiage.

  • Netcat:
    • It is also a network scanning tool used to perform opertions like,
      • Port Scanning
      • Port listening
      • Port redirection
      • Network debugging
      • Network deamon testing
    • It is used to perform operations on TCP,UDP,..


Tuesday, May 24, 2022

Bash Scripting 10



 BASH SCRIPTING EXAMPLES:


  • We have already saw some basic syntax and method to implement those syntax.
  • Today lets see some basic program that uses the basic logic to solve some problems.
  • Some problems are:
    • Finding whether the given year is leap year or not.
      • This program will accept a year as a input.
      • Check whether it solve a given condition : (( year%4==0 && year%100!=0 )|| year%400==0)
    • Finding whether the given number is prime or not.
      • A number is prime if it is divisible by only one and itself .
      • If the number is divisible by other than the two number then the given number is not prime.


    • Creating a guessing game .
      • This will generate a random number for every run.
      • We are given three attempt to guess the number.



Note :
The above programs are uploaded in github.
It is possible to download these code from github.
I'll provide the link to github below.

Monday, May 23, 2022

Bash Scripting 9

 Loops in Bash






Uses of Loop:
  • In programming,We need to repeat certain steps for number of times.
  • We can't repeat the statement or copy paste the code.
  • To do such thing loops where used.
  • It is used to repeat certain steps for number of times until the condition given gets failed.
  • There are three loop statement in bash:
    • while loop
    • until loop
    • for loop
While loop :
  • Syntax:

  • The loop start execute once the condition is true,else the loop end.
  • Example:


Until loop :
  • The until loop work in the reverse principle of while loop.
  • It execute the statement in the loop until the statement is false.
  • Once it reaches true,the loop terminates.
  • Syntax:

  • Example:


For loop:
  • There are various method to execute for loop.
    • One is by mentioning the range of value that are to be printed using some format
    • Example:
       


    • Another method is similar to c, c++,java,...
    • Example:


Sunday, May 22, 2022

Bash Scripting 8

Notations to check conditions 



  • The comparison of string or numeric is the main decision taken to check for certain condition.
  • The comparison like equal to, not equal, less than, greater than, less than or equal, greater than or equal, etc
  • These can also be represented in bash as 
    • equal to             :  -eq
    • not equal           :  -ne
    • greater than       :  -gt
    • less than            :  - lt
    • greater or equal :  -ge
    • less or equal      :  -le 
  • These will help greatly when using loops.
  • The way of using these format in conditional statement are similar to https://cybercheck123.blogspot.com/2022/05/bash-scripting-6.html
  • The only change is to replace these notation instead of symbols.
  • Examples :





  • Here if we use -eq the output will change because this is string comparison.The Notations will help to compare arithmetics.




  • Lets see with numeric examples:





  • Example to check greater of three number:








Project Week 1

 Malware model using python



What is a Malware?
  • Malware is a intrusive software that is used to destroy or damage the computer system or files in the computer.
  • This kind of software uses some encryption keys and use those key to encrypt files in the computer.
  • For retrieving those original contents ,the one who injected the malware can took advantage of us.
  • Some of the common malwares are,
    • Viruses
    • Worms
    • Trojan viruses
    • Spyware
    • Ransomware
    • Adware
  • These can be avoided by using good Anti-virus software and constant network scanning.

What is in this Project?
  • This project can give a idea about how certain malware work.
  • In this project there are three important files are there.
    • encrypter.py
    • decrypter.py
    • thekey.key (This will be created once the encrypter file run.The value changes for every execution of encrypter file )
  • Warnings:
    • Once the encrypter file executed .The files in the particular folder get encrypted with the particular key.
    • If that encryption file is run again,then the already encrypted file will be encrypted again and the previous key will be lost .So that the Original data can't be retrieved.
    • The file name of this three files should not be changed.
    • The encryption file should not be used on the folder with valuable information.
    • This files is applicable to all file formats.
    • Don't ever use this to harm anyone.Doing by mistake can also led to losing of data.
    • Don't directly run this script open the script try to understand the working.Then make fun of it.
    • Have complete idea and play.
  • The file has been uploaded in my github account.
  • The link for the github page is https://github.com/prasad-1808/Malware_using_python.git
Warning: Improper usage can let to losing of file.

How to use the link?
  • Procedure to clone a git file is available here,
  • Installing git file
  • Once the file is downloaded.Move into the directory called Malware_using_python.
  • Read the README file clearly.
  • Go through the code and execute.
  • Please don't blindly execute the code.





    Use Virtual Machine for better protection.

Friday, May 20, 2022

Bash Scripting 7

 Bash Scripting 





Comments:

  • Comments are the normal language text that will be written inside code to give idea about the code if we take a look at it after a period of time.
  • If we see a big code which we done previous after a long time.The first question arise in mind is        "Whether I have done it or With what idea i wroteπŸ€” , May be sometimes what language is thisπŸ˜…".
  • But if these line don't match the syntax of a particular language or made someother meaning to code.It will completely mess up the code.
  • Every language has there own way of writing comment.
  • The only thing is ,the statement we write should not disturb the original code.
  • It should be a piece of line ,which should be read only by the human and not by the compiler.
  • In bash ,we have two ways of commenting,
    • Single line comment
      • This will comment only one line.
      • The command format should be repeated for everyline we wrote.
      • The "#" is used to make single line comment.
      • For Example,
        •  <# This line is a comment.>

        • The red marked are comment.The yellow box is the general code of bash.
    • Multi line comment
      • This can be used to comment certain number of comment.
      • If in a code we had more than one continuous comment line we can use multiline comment instead of repeating single line comment for multiple times.
      • The " : ' .....Comments (can be multiline)   '
      • For Example:
        • <: ' 
        • Comment1
        • Comment2
        • Comment3 '>



Thursday, May 19, 2022

Bash Scripting 6

 Conditional Statement in Bash




Conditional statement :
  • Conditional statement plays a vital role in programming.
  • Every decision making part can be done with conditional statement.
  • Conditional statement in bash is similar to python .But the coding style differ.
  • Common conditional Statements are:
    • if statement
    • if-else statement
    • if-elif-else statement
    • switch cases
  • These are the common conditional statement.
  • Most of the popular programming language use these in the same format with slight modifications.

If else statement:
  • Syntax:

  • The if condition should be terminated with "fi" which is nothing but the reverse of "if".
  • Lets see a example,


If-elif-else statement:
  • Syntax:
  • Example : find the largest of three number:


Case statement similar to switch statements:
  • Syntax:

  • Printing the numbers in letter format:




  • In python we use break after each condition similarly here we use ";;"
  • The case condition statement should end with "esac" which is the reverse of case.


Google Cybersecurity Professional Certificate

    Google Cybersecurity Professional Certification πŸ”’ Google Cybersecurity Professional Certification: A Journey Unveiled! πŸ”’ Hey Folks! 🌟...