Kali Linux is loaded with many tools for hacking and exploitation. Discussing here the basic tools which are used generally for network penetration. >>Wireshark : This is sniffer or analyzer application which is used to capture and browse contents of network frames. It can be used to reconstruct TCP/IP streams. >>Kismet : It is an […]

Read More →

First internet connection was established in 1969 which was advancement of computer network by ARPA commissioned in 1968. Different protocols were developed with course of time. Between 1977 and 1979 IPv 0-3 were used. IPv 4 came on front in 1983 and in 1992 work began on IP next generation (IPng) which became IPv6. IPv6 […]

Read More →

Viruses today are not just designed to cause damage to your data and system but also to steal some of your sensitive information, hence it is very important today that you somehow protect your data in a manner, such that if in case it gets stolen, it is still not in a usable format to […]

Read More →

Given an integer N, check if it is a palindrome or not. If it is not a palindrome, print NO. If it is a palindrome, print YES. If it is an even palindrome, print the ratio of first half to second half, up to the precision of 2 decimal places. If it is an odd […]

Read More →

Small is beautiful !! This is not the only reason to prefer Unix over other OS. For developing a real Hacker Attitude there are many things than trying tweaks and tricks . When Linux apps used for exploitation like Zenmap, and Metasploit are developed in Linux and then ported over to Windows, they often lose […]

Read More →

The survival of a virus is based in its ability to reproduce. “How do I make a program reproduce?”, you might ask. Simple, by getting it to copy itself to other files…. The functional logic of a virus is as follows: Search for a file to infect Open the file to see if it is […]

Read More →