Posts

Showing posts from September, 2017

How to do a Dictionary Attack using kali Linux

Image
I want to find out login password for Ubuntu operating System.  I'm using Kali Linux. Assume that you have a word List and the username to that operating system. Black Boxed - Kali Linux  Red Boxed - Ubuntu operating system that I want to log in. 1.       Find the mac of the VM.         Right click on the VM you want to log in =>  Click Settings =>  Click Network => Expand 'Advanced'. You can Find the Mac address of the VM there. Open Kali Linux and run the following commands. 2.        Find the IP address of the  VM.      By looking at the mac address we can find out the IP address.       In here it is 3rd IP address which matches the Mac address we have found earlier.      IP - 192.168.8.102 3.        Find the open ports        In here ssh and http ports are opened. 4.        Run ‘hydra’ command and obtain the password       hydra -V -l segreto -P /root/Desktop/word_list.txt 192.168.8.102 ssh

How does Bitcoin work?

Image
The basics for a new user As a new user, you can get started with Bitcoin without understanding the technical details. Once you have installed a Bitcoin wallet on your computer or mobile phone, it will generate your first Bitcoin address and you can create more whenever you need one. You can disclose your addresses to your friends so that they can pay you or vice versa. In fact, this is pretty similar to how email works, except that Bitcoin addresses should only be used once. Balances - Block chain The block chain is a shared public ledger on which the entire Bitcoin network relies. All confirmed transactions are included in the block chain. This way, Bitcoin wallets can calculate their spendable balance and new transactions can be verified to be spending bitcoins that are actually owned by the spender. The integrity and the chronological order of the block chain are enforced with cryptography. Transactions - private keys A transaction is a transfer of value between

Bitcoins

Image
What is Bitcoin? Bitcoin is a new currency that was created in 2009 by an unknown person using the alias Satoshi Nakamoto. Transactions are made with no middle men – meaning, no banks! There are no transaction fees and no need to give your real name. More merchants are beginning to accept them: You can buy webhosting services, pizza or even manicures. Why Bitcoins? Bitcoins can be used to buy merchandise anonymously. In addition, international payments are easy and cheap because bitcoins are not tied to any country or subject to regulation. Small businesses may like them because there are no credit card fees. Some people just buy bitcoins as an investment, hoping that they’ll go up in value. Acquiring Bitcoins Buy on an Exchange Several marketplaces called “bitcoin exchanges” allow people to buy or sell bitcoins using different currencies. Mt. Gox is the largest bitcoin exchange. Transfers People can send bitcoins to each other using mobile apps or t

Cloud Security

Characteristics of cloud computing The essential characteristics of the cloud computing model were defined by the National Institute of Standards and technology (NIST) and have since been redefined by number of architects and experts.  A.      On-demand self-service Users are capable to providing cloud computing resources, such as server time and network storage without requiring human communication, mostly done through a web-based self-service portal. You can access to your services and you have the capability to change cloud services through an online control panel or directly with the provider. You can add or delete users and change storage networks and software as wanted. B.      Broad network access In this, capabilities are available through the network and accessed through standard tools that promote use by heterogeneous thin and thick client platform such as mobile services and workstations. They can use these devices wherever they are placed with a simple onlin