Introducing Cepstrum's new initiative "How To'" series to solve all your how to queries you face related to our campus! Here's the first one, "How To access IITG LAN?"
What we’ll attempt to do in this article is similar to testing a nuclear bomb (okay, not really). But still, there’s no way to tell exactly what will happen, other than to blast the damn thing because more often than not that’s just the way it is with DDOSing.
Most of us use Amazon, Facebook, and Gmail almost on an everyday basis but what if you get to know that even those platforms are not safe and secure in terms of personal data like password and other information it is a great threat for all of us.
While DDoS has historically been just an annoyance, there is usually a financial impact, such as lost sales or a spike in bandwidth costs.<<<
Now that we’ve got a good understanding on the what DDoS is, let’s take a look at how it’s practically done. Although I won’t get into the technical details, here is an example of a fairly popular DOS tool - HULK
A distributed denial of service (DDoS) attack is one in which a large number of compromised systems connect to a single target (like a website), thereby causing denial of service for genuine users of the targeted system
Cheat Engine is an open source tool designed primarily to help you to tweak stuff in a running game. This allows us to make the game harder or easier or get free coins etc. It’s mainly about hacking games, but we’ll see there’s quite a bit more to it
Steganography is the art of hiding messages in such a way that no one, apart from the sender and receiver, suspects the existence of the hidden data. In this tutorial, you’ll learn a neat trick using which you can hide
Every security system has a flaw and what we’re going to discuss here is just that. Most people, with their eyes on the clock and not a second to spare just tick “Remember Me” on various websites without a second thought
A zip bomb, also known as a decompression bomb (or the ‘Zip of Death’ for the overly dramatic ones), is a malicious archive file designed to crash or render useless the program trying to access it. It could also be employed to disable anti-virus software in order to create an opening for other typical viruses.
By now you should have a pretty good grip on working with batch files. The time has come for you to fly out of the nest. Presented below are a few ideas for things that you can make your viruses do.
What is happening around us? In the ongoing pandemic, we are already facing a large economical crisis. Our government is trying its best to help the needed! At least that is what is portrayed by the media and news channel. Is it really true? Such a topic is always controversial and tends to have a lot of political influence.
In this guide, I assume you are familiar with @sebac brunch, Crouton, Chroot, and obviously Virtualbox. If you are not familiar with anyone of these first go through the following links and get a brief idea for conceptual clearance in your head.
So now we’ve got a bunch of batch file viruses under our belt. Now it’s time to further solidify your understanding of batch scripting, so that you can start making your own useful batch files (malicious or not).
The commands we use to make batch files are actually the same commands first implemented in MS-DOS (An ancient microsoft OS). These DOS(Disk Operating System) commands can also be used in the command prompt window. Whatever your batch file does, you can do it through the command line interface (CLI).
Now that we’ve learned how to overloaded the computer’s memory, in this tutorial we’re going to wipe it all off. This is a short and easy one. This is different than the other batch file viruses we’ve seen yet. This can do real damage. Make sure you only run this inside a VM.
This virus combines the best of the fork bomb and the application flooder. It creates a new batch file in the same directory and then copies itself onto this new file. It then starts this new virus and then both of them create another copy of themselves which are then run and the process repeats over and over
Application Flooder is one of the most simplest and oldest viruses out there and unlike the fork bomb we just saw, the “Application flooder” although technically harmless, is a really annoying virus.
The fork bomb is the equivalent of a DDoS attack on your own system. It aims to deprive the system of memory (RAM), leaving nothing for other applications or the operating system’s vital operations required to keep the systems running, hence crashing it
In the following few tutorials, we’ll be learning about batch file viruses. We’ll look at various techniques to bring down a computer using small and simple scripts. Even if you have no background in programming, you’ll find it very easy to follow along.
Due to the (ahem) sensitive nature of our field of work, I recommend you use a virtual machine and not your personal native OS for doing anything you’re not familiar with. Virtual machines are perfect for practicing hacking
The following article assumes that you are a complete beginner and will likely help you every step of the way in becoming a hacker. This article is for anyone who wishes to communicate their troubles efficiently and getting their questions answered without uncalled-for rudeness
In computer networking, hacking is any technical effort to manipulate the normal behavior of network connections and connected systems. A hacker is any person engaged in hacking. The term “hacking” historically referred to constructive, clever technical work that was not necessarily related to computer systems.
So we know what hacking is, now let’s talk about hackers. There are a lot of things that distinguish different kinds of hackers. Most importantly, skill and motivations. That is, what are you trying to accomplish and how far are you willing to go?
A person who is able to discover a weakness in a system and manages to exploit it is called a hacker and this process is known as Hacking.
Hacking is an art, and it takes years of practice to master it. Having no idea about hacking is okay and when I say beginner, I mean someone who has no experience with programming and with hacking methodologies.
The life cycle of any star, from birth to death, and all the stages in between, will span millions or even billions of years. This is why stars don’t seem to change at all, because a human lifetime is a snippet of a fraction of a blink of an eye to these behemoths.
This contains all the files related to maths optional course by prof. Vinita Devi
In a speech to the nation tonight, Prime Minister Narendra Modi enlightened us with the 5 Pillars and announced an economic package to tackle the downside of the coronavirus crisis.
What we're starting to see now in the southern hemisphere in southern Africa and in the southern hemisphere countries is that we're having cases that are appearing as they go into their winter season.
In December 2019 the Chinese authorities notified the world that a virus was spreading through their communities. In the following months, it spread to other countries, with cases doubling within days.
What beginners want is magic. A tool which is easy to use, works on Windows, can be download by searching on Google and clicking on the first link we see, and will do all the hacking itself on the push of a button. Sadly, no such tool exists
We’ll be installing Linux on our Windows machine, by using the WSL feature(no VM or dual boot). WSL is a Windows 10 feature that provides you with a Bash shell, which you can use to execute Linux commands
You may have noticed my blog is running Ghost, one of the best blog platforms in the world. But what if I told you that I can hosted this Ghost blog for free. Follow along and even you can find fews ways to launch your ghost blog for free.
Offensive Security, maintainers of the popular Kali Linux open source project, released Kali Linux 2019.4, the latest iteration of the Kali Linux penetration testing platform. The new release includes several new features.
There are some typical images that the media use to portray the way mobile technologies are transforming lives in developing countries. The weight of chronic poverty seems lifted with the intervention of a mobile phone. These images have become so repetitive that the media has lost interest in them.
Many of you are familiar with the term Internet. Yeah, we all know about it. We can stay a night without sleep or a day without food, but can't even stay for a while when there is this distraction in our network due to traffic or unpaid bill.
Vikram kapoor, an Indian Police Service (IPS) officer and Deputy commissioner of Police (DCP) of NIT faridabad, allegedly shot himself with his service revolver
Now that we’ve learned the language of security professionals, it’s time to familiarize ourselves with the tools of trade. We’re going to take a look at some of the popular tools used by security professionals.
We just saw the most common abbreviations used by hackers. Now let us demystify some of the jargon and terminologies that you’ll find in the field of digital security.
Below are some frequently used abbreviations and acronyms that all hackers should know about. The abbreviations we’re about to take a look at are used by programmers
A newly-discovered lake in Nepal is likely to set a new record of being the world's highest lake replacing Tilicho, which is situated at an altitude of
Maharaja Hari Singh, who was the King of J&K. Initially he did not want to merge J&K with Pakistan or with India. But Pakistan unfairly attacked J&K.
Jiny is building India’s first mobile adoption assistant which is easy to use. It enables a user to complete an entire transaction in his/her very first try
We have the largest workforce in the world - close to 500 million strong - more than the population of every major country except China.
A simple demo post to show all kinds of different elements.