Let’s back to the topic. There are various kinds of attacks available in cybersecurity. Before jumping on attacking first of all we will go through the types.
Various types of attacks in the cyber world :
When an hacker decides what to attack, it can be a LAN, PC, Network, drones, etc. After that what hacker needs is a very big question. Hacker needs either an unauthenticated access or database or anything else.
Why ? How and what are the consequences and alternatives for it. We’ll see all one by one.
As already declared, and Google already announced that every user who encounter’s search through the search engine “encrypted.google.com” he/she will be redirected to the official Google Search engine named “www.google.com“
Why is this happened ?
Currently no reason was revealed by the official Google center’s, So it has no clue to get to the actual reason.
What will be the Alternatives ?
Hereby we are glad to say that, we already had a session on private & safe browsing by keeping your searches encrypted. So that whenever anyone tries to decrypt he/she will be encountered by the officials and you & your privacy will never be compromised.
If you didn’t checked our last blog regarding to your privacy please visit and check about encrypted.google.com. But currently this service has been stopped by the official Google on its platform. No worry about this. Because we have a great browser called as SearchEncrypt(searchencrypt.com) this is still opens a door to your privacy. This search engine do not keeps track of what you are surfing on the net.
You must visit the links followed in the list. https://bit.ly/2rgbHae Here is the discussion of user’s of search encrypt search engine.
Hi,welcome to KnowledgeSuttra. As you all knows Kali linux importans. Kali plays major role in The world of Hacking . As a beginner everyone has problem with IP configuration in Kali.
Mostly asked questions that
1) To be safe while surfing via internet what to do for safety ?
2) How to configure the static IP address ?
3) How to configure Static IP address on Kali Virtual Machine ?
All questions are get answered after you read this.
Setting up mask while doing illegitimate things is as necessary as our clothes during the bad situations. If you wish to know more about the IP,VPN,etc click here. Kali Linux as obviously works as command processing. And it is hard to configure it via commands processing.
Let’s Go !
Open the virtual machine :
1. Click on terminal or try key Ctrl+Alt+T
2.Now Check whether you are in the root or not, if not type
⇒ su root
3. Now check the total directories & files present there by typing ls(LS).
The only need to configure is IP by the single & important file interfaces.
Hi,Welcome to KnowledgeSuttra. As we are in the way of learning Cyber Security, many thing’s still need to know. Yes,its true that we are learning Cyber security because we love to . But another question is Where should you these all knowledge .
Today i am going to quote some of the leading sector where you can show your skill and get huge payout . Lets get started
1. Bug Bounty: Web Hacking
Programmers breaking a framework or system of an organization could wind up in prison, however lawfully hacking and capably revealing it to the particular organization could enable you to win a decent sum.
Indeed, even Google and Facebook paid out $6 Million and $5 Million individually a year ago to programmers and bug seekers for finding and detailing vulnerabilities in their web benefits as a major aspect of their bug abundance programs.
This course will enable you to investigate kinds of vulnerabilities, for example, SQL, XSS, and CSRF infusion and how you can utilize them to legitimately hack real brands like Facebook, Google, and PayPal and get paid.
2. CompTIA Security + Exam Preparation
On the off chance that you are an amateur and you need to attempt your hands and make a profession in the digital world, at that point you require a decent accreditation.
Starting with essential security basics, dangers and vulnerabilities, this course will enable you to stroll through further developed points, furnishing you with the information you have to pass the all around perceived CompTIA Security+ affirmation exam in one go.
3. Moral Hacking Using Kali Linux From a to z
Kali Linux is constantly a standout amongst the most current moral hacking devices and a most loved instrument of programmers and digital security experts.
This course offers you with the learning about Kali Linux – one of the mainstream working frameworks that accompany more than 300 devices for entrance testing, criminology, hacking and figuring out – and rehearsing distinctive sorts of assaults utilizing its hacking capacities.
4. Take in Social Engineering From Scratch
Social designing has been the essential driver of most prominent digital assaults as of late. Its effect on an association could bring about financial misfortune, loss of Privacy, impermanent or lasting Closure, loss of generosity and Lawsuits and Arbitration.
This course will enable you to figure out how to hack into all major working frameworks, including Windows, macOS, and Linux, utilize social designing to convey Trojans to an objective, and communicate with the traded off frameworks, and also shield your organization from such assaults.
5. Moral Hacking From Scratch to Advanced Techniques
Since each and every day an organization is getting hacked and having its site close down or clients’ information bargained, moral programmers are sought after. On the off chance that you need to make strides more like another profession in moral hacking, this course is for you.
This course will enable you to figure out how to sidestep distinctive security layers, break into systems, trade off PCs, split passwords, crash frameworks, and bargain applications, messages, online networking records, and after that assess their security, and propose arrangements.
6. Learn Website Hacking and Penetration Testing From Scratch
To shield your sites and framework from getting hacked by programmers, you first need to take on a similar mindset as a programmer.
This course will enable you to figure out how to hack sites and applications via doing diverse digital assaults against it as a dark cap programmer however settle those openings that enabled you to hack them like a white cap.
7. Finish WiFi and Network Ethical Hacking Course 2017
WiFi hacking is a record-breaking interesting issue among programmers and also infiltration analyzers.
This online Wi-Fi and Network Ethical Hacking course are organized in an approach to furnish you with a top to bottom, hands-on, complete data on Wi-Fi hacking and its security to shield it from any digital assault.
Before the finish of this course, paying little respect to involvement, you will have the capacity to break a wide range of WiFi encryption techniques and prepared to begin seeking after your vocation in arrange security.
8. Hands on, Interactive Penetration Testing and Ethical Hacking
This course will show you, continuously, each phase of an infiltration testing condition with the goal that you can change and test your aptitudes.
You will likewise figure out how to utilize Rapid 7’s Metasploit to abuse targets and run post misuse procedures, use PowerShell with Empire, and sidestep hostile to infection programming from real merchants.
9. Digital Security Volume I: Hackers Exposed
Web security has never been as essential as it is today with more data than any time in recent memory being dealt with carefully around the world, government directing mass observation, and programmers taking touchy information from the badly prepared systems, sites, and PCs.
This course will walk you through rudiments of hacking to a comprehension of the danger and weakness scene, manufacture an establishment to extend your security learning, and ensure yourself as well as other people.
Hi,welcome to KnowledgeSuttra. Lets talk about private data theft. today’s blog specially for Those who
visits porn sites(video, images, etc),
uses private browsing for transaction
are damn confident that they are secured by their trusted incognito mode/private browsing of particular browser. But the worst thing is you was caught.
What your incognito mode/privacy mode actually do is “do not record the browsing history in browser’s cache memory”. As well as everything doesn’t get recalled & not shown in browser’s history we feel’s more relief as we are safe.
Well…every time we are cheated by the incognito mode, sometimes cheated by the porn sites, as well very compromising time cheated by the transaction sites.
Here one thing which must be cleared is sites not cheats you, you are cheated by the hackers who unauthentially steals your session
The topmost porn sites which are visited and while watching online porn videos, the malware’s, Trojan’s, viruses are installed from the backend of your browser.
The big question you got is How ?
When you are watching video your window of browser shows you only video, but the thing is your net connection is on which leads the hacker to install malware’s.
Porn sites caught you ! Now the illusion get cleared.
Don’t visit porn sites.
Now we come back to the privacy & incognito mode.
Your every private/incognito mode activate session recording in System32 named folder.
Yes ! Everything you surf, search, visits, even your downloads during incognito mode is completely saved in System32 folder. As everyone knows “If your data present online it is tough to detect you, but if you are victim of an hacker he can easily track your System32 folder and you are in the hell”
So what is the safe way to keep yourself away from victimization ?
19 April was set by the WHO as a world liver day. As stated by the WHO, liver is the biggest body part of the human body. And hence it should be healthy for healthy body. For that some nutritious foods/fruits are listed down
Espresso (Coffee) :-
Espresso is a standout amongst other refreshments you can drink to advance liver wellbeing. Studies have demonstrated that drinking espresso shields the liver from ailment, even in the individuals who as of now have issues with this organ. For instance, ponders have over and again demonstrated that drinking espresso brings down the danger of cirrhosis, or perpetual liver harm, in individuals with constant liver malady.
Tea is generally thought to be helpful for wellbeing, however prove has demonstrated that it might have specific advantages for the liver. One expansive Japanese investigation found that drinking 5– some green tea for every day was related with enhanced blood markers of liver well being. A littler report in non-alcoholic greasy liver sickness patients discovered drinking green tea high in cancer prevention agents for 12 weeks enhanced liver compound levels and may likewise diminish oxidative pressure and fat stores in the liver.
Grapefruit contains cancer prevention agents that normally ensure the liver. The two primary cancer prevention agents found in grapefruit are naringenin and naringin. A few creature examines have discovered that both help shield the liver from damage. Additionally, in mice that were nourished a high-fat eating routine, naringenin diminished the measure of fat in the liver and expanded the quantity of chemicals fundamental for consuming fat, which can help keep abundance fat from amassing.
Blueberries and Cranberries:-
Blueberries and cranberries both contain anthocyanins, cancer prevention agents that give berries their unmistakable hues. They’ve additionally been associated with numerous medical advantages.A few creature examines have exhibited that entire cranberries and blueberries, and in addition their concentrates or squeezes, can help keep the liver sound. Expending these organic products for 3– a month shielded the liver from harm. Blueberries helped increment resistant cell reaction and cancer prevention agent compounds.
Grapes, particularly red and purple grapes, contain an assortment of useful plant mixes. The most acclaimed one is resveratrol, which has various medical advantages. Numerous creature contemplates have demonstrated that grapes and grape juice can profit the liver. Studies have discovered that they can have different advantages, including bringing down aggravation, avoiding harm and expanding cancer prevention agent levels.
Thorny pear, referred to experimentally as Opuntia ficus-indica , is a mainstream kind of consumable desert flora. Its products of the soil are most regularly expended. A recent report in 55 individuals found that the concentrate of this plant decreased indications of a headache.
Beetroot juice is a wellspring of nitrates and cancer prevention agents called betalains, which may profit heart well being and lessen oxidative harm and irritation.It’s sensible to accept that eating beets themselves would have comparative well being impacts. Notwithstanding, most examinations utilize beetroot juice. Also eat much more nuts and olive oil as well.
On the serious note. I would like to share the liver donation.
Nowadays due to the air pollution there are several injury causes the liver. If u become a liver donar your soul will be always grateful and prayed by your name.
Do it while you are living and donate after the death.
Working of DNS :- It do the biggest work of resolving the server name through their IP address. IP address are used to access particular server. User can access any website, any internet service. But it is unable to remind each and every address of a services. In order to access those server’s the address resolution service provided to each internet user, in order to make rich internet service.
Domain Name System accepts the input in the text format like www.KnowledgeSuttra.com and resolve it in the IP address format which is unknown to the client at the end.
DNS is various for every internet user. Specific client gets the particular DNS I’d.
Whereas to make a richer internet service cloudfare launched its own DNS.
Yes ! It happened. To resolve the URL in IP address to access the server, some amount of time has been spent over internet. In order to reduce the time required in DNS resolving, cloudflare launched 18.104.22.168 is universal DNS.
How it will help you ?
This is the biggest way to increase overall internet speed. The time spent during surfing internet sometimes lot much amount of time spent in DNS resolving will be reduced and these was successfully implemented.
Hahahahhhh ! Don’t you trust ?
As above mentioned try changing your DNS address via
Chrome -> Setting -> Advanced option
Firefox -> Setting -> Advanced option -> Network
Enter the DNS 22.214.171.124 and restart the browser.
Hi, Welcome to KnowledgeSuttra. Many of you are trying to use hacking tools already available in the hacking environment including Operating Systems like Kali Linux, Backtrack, or Parrot. But sometimes we needs some features which are expected to come with the Kali Linux and other OS as built-in feature. To fulfill that expectation we are allowed to do something more with our hacking environment on Virtual Machine.
Virtual machine is just a secondary machine on our primary operating system like, windows on Kali Linux, Ubuntu on Windows, as well hackers/Cyber Security Experts prefers to do Linux as a base Operating System And the Kali Linux as a Virtual machine
Let’s have a look at how to do explosion of any machine.
Before proceeding to the exploitation, there is need of a setup and well configuration.
Setup and configurations must be done to be the expert of exploitation.
Kali Linux provide Metasploit but there is another one which is Metasploitable 2. Metasploitable 2 is another VMware machine. Which needs to be configured before proceeding to explosion.
Advantages of Metasploitable 2 :-
Kali Linux users have well known about the features of Metasploitable 2 over the built-in Metasploit of Kali Linux.
This is only a Virtual Machine compatible with VMware virtual machine.
It is a Linux based system. And hence to configure it there’s a need of command based configuration. This is the advantage to which you can get sophisticated environment.
Disadvantage of Metasploitable 2:-
Not easy to configure.
We are here to overcome the disadvantage and hence the disadvantage of Metasploitable 2 gets overcome. As well as in the upcoming lecture we’ll guide you towards the explosion. But let’s configure your Expert tool.
Guiding via step by step is not a sophisticated way to do the installation and configuration. It must need a practical.