Skip to main content

Ethical Hacking with Python

       πŸ‘‡πŸ‘‡πŸ‘‡πŸ‘‡πŸ‘‡

         Scroll down

As a Computer Science Engineer who encrypts the world, one should know how Hacking activities are done. And we must stand front in protecting our world from cybercriminals.

Being able to gain access to a system that you’re not supposed to have access to is known as Hacking. For example, login into an email account without authorization is considered hacking that account. Gaining access to a remote computer without authorization is hacking that computer. So you can see that there are a large number of ways to hack into a system and the word hacking can refer to a number of things but the main concept is the same. Gaining access or being able to do things that you’re not supposed to be able to do, is considered hacking.

Ethical hacking: 

To crack passwords or to steal data? No, it is much more than that. Ethical hacking is to scan vulnerabilities and to find potential threats on a computer or networks. An ethical hacker finds the weak points or loopholes in a computer, web applications or network and reports them to the organization. So, let’s explore more about Ethical Hacking step-by-step.

These are various types of hackers

  • Black hat hackers: 
    Here, the organization doesn’t allow the user to test it. They unethically enter inside the website and steal data from the admin panel or manipulate the data. They only focus on themselves and the advantages they will get from the personal data for personal financial gain. They can cause major damage to the company by altering the functions which lead to the loss of the company at a much higher extent. This can even lead you to extreme consequences.
     
  • White hat hackers: 
    Here, we look for bugs and ethically report it to the organization. We are authorized as a user to test for bugs in a website or network and report it to them. White hat hackers generally get all the needed information about the application or network to test for, from the organization itself. They use their skills to test it before the website goes live or attacked by malicious hackers.
     
  • 3.Grey hat hackers: 
    They sometimes access to the data and violates the law. But never have the same intention as Black hat hackers, they often operate for the common good. The main difference is that they exploit vulnerability publicly whereas white hat hackers do it privately for the company. 

Note: To know more about types of hackers click here.

Why Python Programming For Hacking

Python is a widely used general-purpose, high-level programming language. Python is a very simple language yet powerful scripting language, it’s open-source and object-oriented and it has great libraries that can be used for both for hacking and for writing very useful normal programs other than hacking programs. In the future and present era python is very popular and it’s easy to learn, learning to hack with python will be fun and you will learn python programming in the best way. There is a great demand for python developers in the market.
Note: To know more about python click here.
 

How Password Are Hacked

Everyone knows that passwords are not stored a plain text in the website’s database. Now we are going to see how to hack a plain text password when you find a password that is in hashed(md5) format. So we take the input_hash(hashed password in the database) and try to compare it with md5 hash of every plain text password which is in a password file(pass_doc) and when the hashes are matched we simply display the plain text password which is in the password file(pass_doc). If the password is not present in the input password file it will say password is not found, this happens only if buffer overflow doesn’t occur. This type of attack can be considered as a dictionary attack.

Below is the implementation. Let’s suppose the text file containing list of password is password.txt.

              πŸ‘‡Go to courses πŸ‘‡

                       click here

Comments

Popular posts from this blog

Termux Socal-Box command

termux 1st lstep Apt update 2nd step Pkg install git 3rd step git clone https://github.com/samsesh/SocialBox-Termux.git 4th step cd SocialBox-Termux 5th step chmod +x SocialBox.sh 6th step chmod +x install-sb.sh 7th step ./install-sb.sh 8th step ./SocialBox.sh

HOW to install darkfly

Sharma hacking What is DarkFly-Tool? DarkFly is an index of tool that will allow you to install any tool in single Click. This Tool will give you a list of the types of tools and after selecting any type, you will see all the available tools to perform that type of attack. for example: if you want to perform SMS Flooding attack, you can select the Spam category and you will get a list of all tools that will help you to perform SMS Flooding attacks . The advantage of installing this tool is that you don't have to search for a tool manually every time you wanna perform a different type of attack you can just use darkfly tool to suggest you the tools that are suitable for you. Now when you have found your tool you just have to select the tool by typing its Tool number and the Tool will be automatically installed in your Termux and you will instantly able to use it. NOTE: This post is only for educational purposes. I an...

TBomb in termux

FOR MOBILES ⚠️WARNING ! DON'T USE IT FOR ANY ILLEGAL PURPOSE WE SHARE THIS ONLY FOR EDUCATION PURPOSE 🌟 How to message bombing anonymously with the help of termux 🌟  πŸ”Ί Step 1 :- type ; apt update && apt upgrade  πŸ”Ί Step 2 :- type ; termux setup storage  ( give permission allow ) πŸ”Ί Step 3 :- type ; pkg install git    πŸ”Ί Step 4 :- type ; pkg install python  πŸ”Ί Step 5 :- type ; pkg install python2  πŸ”Ί Step 6 :- type ; git clone https://github.com/TheSpeedX/TBomb πŸ”Ί Step 7 :- type ; ls πŸ”Ί Step 8 :-  type ; cd TBomb πŸ”Ί Step 9 :- type ; ls πŸ”Ί Step 10 :- type ; chmod +x TBomb.sh πŸ”Ί Step 11 :- type ; ls πŸ”Ί Step 12 :- type ; bash TBomb.sh  πŸ”“ Boom one page unlock then press "Enter" the choose 1 for message bombing , choose 2 for call bombing now press code number of your country like India +91  Press enter  Then type target's number without +91 like 8**1*****910 Then press number of bombing message or calls then press...