Skip to main content

Posts

NSA Releases GHIDRA 9.0 — Free, Powerful Reverse Engineering Tool

The United States' National Security Agency (NSA) today finally released GHIDRA version 9.0 for free, the agency’s home-grown classified software reverse engineering tool that agency experts have been using internally for over a decade to hunt down security bugs in software and applications. GHIDRA is a Java-based reverse engineering framework that features a graphical user interface (GUI) and has been designed to run on a variety of platforms including Windows, macOS, and Linux. Reverse engineering a program or software involves disassembling, i.e. converting binary instructions into assembly code when its source code is unavailable, helping software engineers, especially malware analysts, understand the functionality of the code and actual design and implementation information. Download  GHIDRA 9.0 — software package, slides, and exercises Adapted from  thehackernews.com

5 Benefits only Linux Users can Enjoy

Have you ever used Linux before? If yes, you might find it too hard to use rather than Windows or Mac. If no, you may be thinking about why people use Linux. But the truth is, Linux is not that what you are thinking. Not only for developers, Linux is also a very good operating system for regular computer users. After using any Linux distribution for 5 to 6 months you will find it really useful. As a regular user, you can get a lot of benefits that other major operating systems can’t provide. In this article I will discuss about top 5 benefits that only Linux users can enjoy. Faster performance: Can you imagine a budget Windows PC for everyday use that provides you a smooth and fast computing experience everyday? The answer is obviously a big “NO” for most of you. Linux is a pretty lite OS and it’s compatible with any hardware. If you install any popular Linux distribution like Ubuntu , Debian or Mint , you can do your everyday job like browsing, email, youtubing,

How does Kon Boot Works

Have you ever asked yourself about HOW KON-BOOT WORKS ?? What is KON-BOOT: Kon Boot  is an application which will bypass the authentication process of Windows based operating systems.  Kon Boot  can work on a USB flash drive, CD, or floppy diskette. watch the video down below to see it in action Now how does it works ?? The source code of Kon-boot has not been published by its author so it is not known  what it does exactly to hack the operating system. However some hypothesis can be made based on known technologies to determine how it works. In general, bootkits basically hook the 0x13 interruption routine that is usually provided by the BIOS of the computer. The role of this routine is to read sectors from the hard disk and to load them into a given location in RAM memory. By hooking this routine, bootkits such as Kon-boot or Vbootkit modify directly the code of the operating system when it is copied into main memory, just before its execution.

Add Perfect Meta tag in Blogger

Hey bloggers, you may know that how important is <meta> tag in SEO. Here is the way you can ad the perfect meta tag in you Blogger or Blogspot blogs.  Read here Step by Step to add Different Meta tags description For Each Post in your blogspot blog. Step 1 Install title tags optimized <b:include data='blog' name='all-head-content'/> <b:if cond='data:blog.pageType == &quot;index&quot;'> <title><data:blog.pageName/> | <data:blog.title/></title> <b:else/> <title><data:blog.pageTitle/></title> </b:if> <b:skin> Step 2 Add Meta tag Description and Meta Keywords <b:if cond='data:blog.url == data:blog.homepageUrl'> <meta content=' Your home page description ' name='description'/> <meta content=' your keywords, keywords1, keyword2 ' name='keywords'/> </b:if> <b:if cond='data:blog.pageType ==

Make Money from Hacked Website (Without Selling or Bug Bounty)

People want to make huge amount of money by their skills. But often they think, are skills really suitable for making money? I don’t know about other skills but hacking is a crazy skill that can turn a poor guy into a millioner!! If you’ve searched about making money from hacking, you may got some bullshit articles about “Bug Bounty” programs. But its not for everyone. It is very difficult to find security vulnerabilities is popular websites. But you can find a lot of vulnerable websites on the internet having a good amount of traffic and their admins don’t offer bug bounties (they don’t care about security, let alone Bug bounty). Many hackers exploit their vulnerability and try to make money by selling shell or user information including Credit Card data. But it’s risky and often you may not want to do that for various reason. If you are searching a way to make money from hacking a website without selling shell or selling its database or even a bug bounty this post f

How to Setup an FTP Server in Windows 7

Hey guys,    Assalamu Alaikum...  This is Tom ... ✌✌ *************************    now i will show you how to setup an #FTP server in Janala 7 (Windows 7) 😂 *************************   I will show you how you can install an FTP Web server along with your IIS in Windows 7.......  first,  1. Go to Programs, Control Panel, Pro grams and Features, Then click on “Turn Windows features On or Off”.... .   2. Now from the list that opens, locate the option for Internet Information Services and select FTP Server. Click on OK. Installation will take some time.....    3. After your FTP server is installed, you can check the installation using an ftp client by entering localhost as the hostname and 21 as the port number.....   ***  some additional steps for configuring the FTP sites and servers to work: *. Open the IIS Manager *.  In the tree view (on the far right), right-click “Server (ServerUser)” and select “Add FTP Site…” *.  The Wizard window will n

How To Gain Access MsSQL using Metasploit

Nowadays companies runs more SQL Server databases inhouse than any other database platform, according to Embarcadero Technologies’ Database Survey Report, 83 percent of respondents are running SQL Server in their database environment. Database administrators use simple passwords to facilitate their access to databases. In these two cases, many companies are endangered.   DB Usage of World You can gain access the server systems of many enterprise companies using only the Metasploit Framework and a simple password list. Today I will show you how to get MSSQL passwords and what you can do with this valuable information. We use the “MsSQL Login Module” to detect MsSQL passwords. You can use the following command to select the module. Syntax example: use auxiliary/scanner/mssql/mssql_login We can list the parameters with “options” command. MsSQL Login Module Options All required parameters must be set before the “Mssql Login Module” i