Showing posts with label hackers. Show all posts
Showing posts with label hackers. Show all posts

Donald Trump: ‘Full Report’ On Hacking In First 90 Days

President-elect Donald Trump said his administration would produce a full report on hacking within the first 90 days of his presidency and accused “my political opponents and a failed spy” of making “phony allegations” against him.
“Totally made up facts by sleazebag political operatives, both Democrats and Republicans,” Trump said in a Twitter post Friday, adding in a later tweet, “My people will have a full report on hacking within 90 days!’’
In a flurry of early morning messages, the president-elect also suggested that the intelligence community had leaked damaging information about his alleged ties to Russia, after news reports published information about a dossier claiming the Kremlin had compromised him.
“Russia says nothing exists,’’ Trump said on Twitter. “Probably released by ‘Intelligence’ even knowing there is no proof, and never will be.’’
In messages sent before many Americans reported to work, Trump took to social media to share with the public his thoughts on a range of issues Friday, including congressional moves to repeal Obamacare — calling it the “‘Unaffordable’ Care Act” — and the testimony of his cabinet nominees which has sometimes differed from his stated views.
Trump also commented on the Justice Department’s internal probe into the FBI’s handling of Hillary Clinton’s use of a private e-mail server Friday, denouncing the reaction by Clinton aides who said again Thursday that Comey cost her the election.
Trump said investigators had been “nice’’ to Clinton and that the former secretary of state’s loss in the presidential race could not be attributed to actions by the Federal Bureau of Investigation in the final days of the campaign.
“What are Hillary Clinton’s people complaining about with respect to the F.B.I.,’’ Trump said on Twitter. “Based on the information they had she should never have been allowed to run – guilty as hell. They were VERY nice to her. She lost because she campaigned in the wrong states – no enthusiasm!’’

How to become an ethical hacker | Padsa Information

An essential guide to becoming an ethical hacker

I often get a number of people ask for guidance  about how they can become an ethical hacker. I also receive even more requests about how to become a black hat hacker. The latter requests are ignored. below is a definition of an ethical hacker

Ethical hacker

  1. A person who hacks into a computer network in order to test or evaluate its security, rather than with malicious or criminal intent.
So if you want to be an ethical hacker the truth is there is no easy method to become a skilled hacker…… it’s easy to be a script kiddie and load up Armitage or Fast-track and fire every exploit known to man at a target. But what’s the point at firing Linux exploits at a Windows box!.

You need essential prerequisite knowledge

If you want to get into the IT  security world as a white hat you must be competent in the following areas:
  • Networking
  • Programming
  • Databases
  • Operating systems (Linux and Windows)
Once you have a fairly good knowledge of the above points THEN it would a good idea to learn about hacking. So now you have a good understanding of the fundamentals of IT, you can now understand how to break some of the underlying vulnerabilities within computer architecture. The following activities should help you with this:

What areas to concentrate on in order to build a foundation

Networking – Cisco courses seem to be really good. I undertook all the CCNA courses available.
Programming – Focus on learning C++, Python/Ruby and PHP.
Databases – Play around with MySQL and MSSQL and make your own database to understand how it works.
Operating systems – Most flavours of Linux are the similar to one another, I use Debian on a lot of servers and of course Kali. Additionally it is worth understanding the more obscure areas of Windows such as the registry.

Read books about hacking (Here are some good examples of some)

  • The Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws
  • Hacking: The Art of Exploitation, 2nd Edition
  • The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy
  • Metasploit: The Penetration Tester’s Guide
  • CEH Certified Ethical Hacker All-in-One Exam Guide
  • Google Hacking for Penetration Testers

Undertake FREE ethical hacking courses.

These are very good for learning but won’t give you an industry recognised qualification, however they will teach you a lot about different areas of ethical hacking which will help towards recognised qualifications.
You can register for a free Cibrary account to do a free ethical hacking course at the following link –

Undertake Recognised Online courses

These course are all paid for, however they are industry recognised and will help you find a job in the IT security sector.
  • CEH
  • OSCP
  • CISSP

Communicate and follow other fellow IT security enthusiasts through the following mediums

  • Facebook (https://www.facebook.com/pages/Hacking-News-Tutorials/252350961471136 )
  • Google+
  • Twitter

Self learn by watching online tutorials

  • www.securitytube.net
  • www.youtube.com

Download practice environments to practice and hone newly learned skills

  • DVWA (Dam Vulnerable Web Application)
  • Metasploitable2
  • Samurai WTF

Final note: Hacking is something that takes A LOT of your time!, be prepared to sacrifice friendships, relationships and that awesome social life you used to have!

10 Reasons : Why should we use Linux? | Padsa Information


Bored using windows or any other server in your computing experience? Linux has been designed to offer you smooth and effective experience. Whether you want to use it for business or any other home operations, Linux offers the most reliable system to adopt. Linux has become one of the most adopted systems by many users in and around the world. Most of the world’s largest data centers across the globe use Linux. There are various reasons that answer why should we use Linux, keep on reading.

Why Should we use Linux?

1. Linux is free of charge and in case you still doubt, then know that it is.
In case you want to get rid of all the restrictions in terms of patents of any other form of restriction, then this would be the best switch for you. Linux can be edited in terms of the source code by most of the innovative business owners. It is, therefore, the best system to be adopted by a large number of business owners who want to simplify their business operations.
2. Linux is more secure than any other server
Linux is a dependable server that offers excellent security to the user. Linux community offers the security fixes for any technical or security threat that encounters. Moreover, Linux users also offer regular kernel updates and regular security patches. In this regard, it is not mandatory for you to have an anti-virus program for your system. With Linux, you can save a lot of dollars you could have spent buying an antivirus program.
3. It has a wide compatibility to several hardware
Most of the other servers do constraint you with a lot of features. Take for instance windows 7 and 8 do require at least 1GB RAM for your system to operate well. However, Linux is such a lightweight operating system and hence does not constrain you in terms of a memory capacity of your system. It can thus be used by any of your systems. It is designed for everyone and can be used by anyone.
4. Easy to Operate
Ideally, one does not have to go for intensive training for them to know how to operate Linux operating system. Besides, it comes with all the necessary functionality that is included in windows OS. If you are looking for a system that is reliable and can be used by anyone in your business, then this could be the best system to adopt.
5. It comes inclusive of drivers
Ever experienced some difficulties when using windows only to be told that some of the drivers are missing in your system? Linux saves you a time you have to spend moving from one shop to another for drivers. It saves you money as well. Most of the drivers are included in Linux operating system. No need to hassle and stress for drivers.
6. Smooth and easy Updating Process
Updating windows can be very challenging and stressful. Linux updates both the OS and the applications that are installed in your system. Besides, when compared to windows that need your system to shut down Linux updates are just a matter of click.
7. Linux is speedy
Since Linux is lightweight, it is therefore far much speedy compared to any other operating system. Windows has a bloated software and therefore huge to operate. In any business operation or gaming experience, time is the most crucial factor. Linux is the best system to adopt as windows get slower days after days.
8. Linux has a community support
One of the best things about Linux is the fact that you have a sense of belonging. You have a platform where you can share everything with fellow users. You get to know more through the frequently asked questions. Moreover, any question that you have can be dropped and get the answers that you need.
9. Linux features a powerful word processing program
Libre Office is a powerful word processing program that comes with Linux. You can use it for free in editing, opening and send Microsoft documents. You, therefore, save more and more dollars you could spend buying such a program.
10. Linux offers you a chance to download a lot of free tools
By just a click of a button, you can get access to thousands of tools and programs. This is a big added advantage over the windows operating system. It is the best way to transform your serving experience.
Don't forget to comment below if you have any question .

Linux Basic Commands

The below commands are important and often used. For more checkout the image at the bottom of the article
  • mkdir – make directories
    Usage: mkdir [OPTION] DIRECTORY…
    eg. mkdir lhn
  • ls – list directory contents
    Usage: ls [OPTION]… [FILE]…
    eg. ls, ls ­l, ls lhn
  • cd – changes directories
    Usage: cd [DIRECTORY]
    eg. cd lhn
  • pwd ­-  print name of current working directory
    Usage: pwd
  • vim – Vi Improved, a programmers text editor
    Usage: vim [OPTION] [file]…
    eg. vim lhn.txt
  • cp – copy files and directories
    Usage: cp [OPTION]… SOURCE DEST
    eg. cp sample.txt sample_copy.txt
    cp sample_copy.txt target_dir
  • mv – move (rename) files
    Usage: mv [OPTION]… SOURCE DEST
    eg. mv source.txt target_dir
    mv old.txt new.txt
  • rm ­ remove files or directories
    Usage: rm [OPTION]… FILE…
    eg. rm file1.txt , rm ­rf some_dir
  • find – search for files in a directory hierarchy
    Usage: find [OPTION] [path] [pattern]
    eg. find file1.txt, find ­name file1.txt
  • history – prints recently used commands
    Usage: history
  • cat – concatenate files and print on the standard output
    Usage: cat [OPTION] [FILE]…
    eg. cat file1.txt file2.txt
    cat ­n file1.txt
  • echo – display a line of text
    Usage: echo [OPTION] [string] …
    eg. echo I love India
    echo $HOME
  • grep ­- print lines matching a pattern
    Usage: grep [OPTION] PATTERN [FILE]…
    eg. grep ­i apple sample.txt
  •  wc ­- print the number of newlines, words, and bytes in files
    Usage: wc [OPTION]… [FILE]…
    eg.  wc file1.txt
    wc ­L file1.txt
  • sort – sort lines of text files
    Usage: sort [OPTION]… [FILE]…
    eg. sort file1.txt
    sort ­r file1.txt
  • tar – to archive a file
    Usage: tar [OPTION] DEST SOURCE
    eg. tar ­cvf /home/archive.tar /home/original
    tar ­xvf /home/archive.tar
  • kill – to kill a process(using signal mechanism)
    Usage: kill [OPTION] pid
    eg. kill ­9 2275
  • ps – report a snapshot of the current processes
    Usage: ps [OPTION]
    eg. ps,  ps ­el
  • who – show who is logged on
    Usage: who [OPTION]
    eg. who , who ­b , who ­q
  • passwd – update  a user’s authentication tokens(s)
    Usage: passwd [OPTION]
    eg. passwd
  •  su –  change user ID or become super­user
    Usage: su [OPTION] [LOGIN]
    eg. su remo, su
  • chown – change file owner and group
    Usage: chown [OPTION]… OWNER[:[GROUP]] FILE…
    eg. chown remo myfile.txt
  • chmod – change file access permissions
    Usage: chmod [OPTION] [MODE] [FILE]
    eg. chmod 744 calculate.sh
  • zip – package and compress (archive) files
    Usage: zip [OPTION] DEST SOURSE
    eg. zip original.zip original
  • unzip – list, test and extract compressed files in a ZIP archive
    Usage: unzip filename
    eg. unzip original.zi
  • ssh – SSH client (remote login program)
    “ssh is a program for logging into a remote machine and for
    executing commands on a remote machine”
    Usage: ssh [options] [user]@hostname
    eg. ssh ­X guest@10.105.11.20
  • scp – secure copy (remote file copy program)
    “scp copies files between hosts on a network”
    Usage: scp [options] [[user]@host1:file1] [[user]@host2:file2]
    eg. scp file1.txt guest@10.105.11.20:~/Desktop/
  • fdisk – partition manipulator
    eg. sudo fdisk ­l
  • mount – mount a file system
    Usage: mount ­t type device dir
    eg. mount /dev/sda5 /media/target
  • umount – unmount file systems
    Usage: umount [OPTIONS] dir | device…
    eg.  umount /media/target
  • du – estimate file space usage
    Usage:  du [OPTION]… [FILE]…
    eg. du
  • df – report filesystem disk space usage
    Usage: df [OPTION]… [FILE]…
    eg. df
  • quota – display disk usage and limits
    Usage: quota [OPTION]
    eg. quota ­v
  • reboot – reboot the system
    Usage: reboot [OPTION]
    eg. reboot
  • poweroff – power off the system
    Usage: poweroff [OPTION]
    eg. poweroff
  • kate – KDE Advanced Text Editor
    Usage:  kate [options][file(s)]
    eg. kate file1.txt file2.txt
  • vim – Vi Improved, a programmers text editor
    Usage: vim [OPTION] [file]…
    eg. vi hello.c
  • gedit ­ A text Editor. Used to create and edit files.
    Usage: gedit [OPTION] [FILE]…
    eg. gedit
  • bg – make a foreground process to run in background
    Usage: type ‘ctrl+z’  and then ‘bg ‘
  • fg – to make background process as foreground process
    Usage: fg [jobid]
  • jobs – displays the names and ids of background jobs
    Usage: jobs
  • sed ­  stream editor for filtering and transforming text
    Usage: sed [OPTION] [input­file]…
    eg. sed ‘s/love/hate/g’ loveletter.txt
  • awk ­ pattern scanning and processing language
    eg.  awk ­F: ‘{ print $1 }’ sample_awk.txt
  • find ­ search for files in a directory hierarchy
    Usage: find [OPTION] [path] [pattern]
    eg. find ­name file1.txt
  • locate – find or locate a file
    Usage: locate [OPTION]… FILE…
    eg. locate file1.txt
Linux File Permissions
  • 3 types of file permissions – read, write, execute
  • 10 bit format from ‘ls ­l’ command
    1             2 3 4      5 6 7     8 9 10
    file type    owner     group    others
    eg. drwxrw­r­­   means owner has all three permissions,
    group has read and write, others have only read
    permission
  • read permission – 4, write – 2, execute ­1
    eg. rwxrw­r­­   = 764
    673    =   rw­rwx­wx