Posts

How to Crack FTP Server using Metasploit.

Image
File Transfer Protocol (FTP) is the commonly used protocol for exchanging files over the Internet. FTP uses the Internet's TCP/IP protocols to enable data transfer. FTP uses a client-server architecture, often secured with SSL/TLS. FTP promotes sharing of files via remote computers with reliable and efficient data transfer.     The two default ports that are used in FTP are port 20 and port 21. Now the question arrises, What is Metasploit...      Metasploit Framework, the Metasploit Project's best-known creation, is a software platform for developing, testing, and executing exploits. It can be used to create security testing tools and exploit modules and also as a penetration testing system. Now i am going to show you how to crack FTP Server using metasploit framework in my Youtube Channel BREAK THE SECURITY   So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media p...

Features you must Know about upcoming WiFi security Protocol: WPA3

Image
Now a days internet is used by most of the people, so using internet through WiFi has become common . Now the question matter is it secure using the WiFi connection. People basically use WPA2-PSK and WPA  security protocols. The problem with this type of protocols is that they are more vulnerable to hackers. The data which is transmitted with these type of protocols are not encrypted so not secured.   Suppose i give you a situation you are using a public WiFi network in a restaurant or a cafe and hundred other people are also using it involving some hackers who have wrong intention of stealing your data so. Imagine you are opening a website suppose facebook.com   and the hackers are in the same WiFi network in which you are using . So they can host a fake webpage of  facebook.com   and as you enter your email-id and password both id and password will be send to the hackers.      But after coming this WPA3 WiFi security protocol this pro...

Why People are getting scared of using Artificial Intelligence.?

Image
When people see machines that respond like humans, or computers that perform feats of strategy and cognition mimicking human ingenuity, they sometimes joke about a future in which humanity will need to accept robot overlords. But buried in the joke is a seed of unease. Science-fiction writing and popular movies, from "2001: A Space Odyssey" (1968) to "Avengers: Age of Ultron" (2015), have speculated about artificial intelligence (AI) that exceeds the expectations of its creators and escapes their control, eventually outcompeting and enslaving humans or targeting them for extinction. Conflict between humans and AI is front and center in AMC's sci-fi series "Humans," which returned for its third season on Tuesday (June 5). In the new episodes, conscious synthetic humans face hostile people who treat them with suspicion, fear and hatred. Violence roils as Synths find themselves fighting for not only basic rights but their very survival, against th...

What is Encryption ?

Image
Encryption is the mathematical science of codes, ciphers, and secret messages. Throughout history, people have used encryption to send messages to each other that (hopefully) couldn't be read by anyone besides the intended recipient. Today, we have computers that are capable of performing encryption for us. Digital encryption technology has expanded beyond simple secret messages; today, encryption can be used for more elaborate purposes, for example to verify the author of messages or to browse the Web anonymously with Tor. Under some circumstances, encryption can be fairly automatic and simple. But there are ways encryption can go wrong, and the more you understand it, the safer you will be against such situations. Three Concepts to Understand in Encryption  Private and Public Keys One of the most important concepts to understand in encryption is a key. Common types of encryption include a private key, which is kept secret on your computer and lets you read messages...

Tips on how can you avoid Phishing Attacks .

Image
On your path to improving your digital security, you may encounter bad actors who attempt to undermine your security goals. We call these bad actors adversaries, or attackers. When an attacker sends an email or link that looks innocent, but is actually malicious it’s called phishing. A phishing attack usually comes in the form of a message meant to convince you to:     click on a link;     open a document;     install software on your device; or     enter your username and password into a website that’s made to look legitimate. Phishing attacks can trick you into giving up your passwords or trick you into installing malware on your device. Attackers can use malware to remotely control your device, steal information, or spy on you. This guide will help you to identify phishing attacks when you see them and outline some practical ways to help defend against them. Types of Phishing Attacks :- Phishing for Passwords (aka Credenti...

How to protect your device from Hackers.

Image
Malicious attackers can take over your device—whether it's a laptop computer, a desktop PC, a smartphone or tablet—and use it to find out more about you, spy on you, or plant evidence. This animation explains a few of the ways computers get taken over (or “pwned," “0wned,” etc.), and how you can protect yourself. 1. An email attachment that contains malware: You can get tricked into running a program by clicking on an email attachment that appears innocent, but is actually infected with malware. Malware can turn on your computer’s microphones and broadcast your conversations, record your screen, watch what you type on your keyboard, copy files, or even insert false records. Be very careful opening strange email attachments and double check with the person who sent it before you open it if you’re unsure. 2. A malicious weblink: It’s possible to infect a computer with malware remotely just by visiting a webpage (sometimes called a “drive-by download”). If a link prompt...

An Overview about End-to-End Encryption

Image
In todays fast growing world, security of his/her datat is the first priority of every user. So today we are going to give a brief introduction on End-to-End Encryption. End-to-End Encryption is a way of encrypting and decrypting data using the concept of cryptography.       So as the name says End-to-End Encryption refers to encrypting and decrypting of data on both the ends. Suppose a data is going to travel on the internet from a mobile phone, so first it will gen:erate two key , first is Pubic key and second is Private key.     The private key always remains in the phone, but the public key remains at the server.When a data is requested from the server the public key gets activated for that particular mobile phone from which it is generated.  The Public key encrypts the data that come from the server in that way that only private key of that particular phone can only decrypts it. Getting little bit confused ...!! Lets take an example to clari...