Thursday 8 June 2017

Most Valuable Windows CMD Commands While Hacking

When a person starts carrier in hacking, he/she gets furious to know more about the vast field of hacking and for all of the beginners CMD comes as a boon which let them do anything with PC/Laptop. Some of the really useful commands that can prove handy are:

Firstly we need to enable Netbios and for that go to Network Connection>>Properties>>TCP/IP>>Properties>>Advanced>>WINS>>Select Default for NetBios. Now press start key and in run type cmd and an interface will open to try some really good commands that are:

1. Ping: This command which give you the information if the targeted host is alive. Type ping x.x.x.x or ping www.google.com (Or the website you want to ping).

2. Nslookup: It can resolve DNS into IP address easily. Though, it can do several other functions too. You can even send a spoofed email to your friend using IP address of mail server. The steps to find IP address of mail server are:
Nslookup(enter)
Set type=mx(enter)
Gmail.com

3. Tracert: This command is beneficial when someone want to trace the route a packet follow to reach the destination.
Command:
tracert x.x.x.x or www.google.com

4. ARP: It stands for Address Resolution Protocol. You can check if someone has done ARP poisioning on your LAN network. The command to find this is:

Command:

Arp-a

5. Ipconfig: This command gives a lot of information like IP address, Gateway, DNS etc. The command to use are:
Command:

Ipconfig or Ipconfig/all.

You can even change the dynamic IP of your network using the following command:

Ipconfig/ release ( release your IP)
Ipconfig/renew ( renew your IP)
Ipconfig/flushdns( flush your DNS settings)

6. netstat: This command shows connection stats:

Command:
Netstat
Or
netstat -a( show all listing ports and connection with DNS names)
netstat-n( show all the open connection with IP address)
netstat-an( combine both the above commands)

7. Net View: This command will allow you to see sharing folders on targeted box.

Command:
Net view x.x.x.x or computer name

So, these are some useful commands that every person who dream to become a hacker should know.

Wednesday 7 June 2017

Why Linux Runs Faster Than Windows?

When it comes to choosing between different operating systems like Linux or Windows, we expect only one answer Linux. But do you ever wonder why so many people prefer Linux over Windows? The mere reason is its performance.

Kernel:
It is one of the big reason for excellent performance of Linux over Windows. The kernel is designed differently and nucleus of OS is different. Linux has monolithic kernel and holds core functionality needed such as drivers, memory management, task scheduler etc. On the other hand Windows only contains micro kernel that has basic necessities and remaining aspects are loaded separately which makes Windows slower compared to Linux.

Backward Compatibility:
This is the area where Windows suffers owing decade of software support it provides to users. While it slow down loading process, Linux on different side can forge to backward compatibility. Being a propriety OS, it has limited number of developers and finite number of man hours to work. Optimization is not as high priority for Windows when compare to other requirements.

Google Priced $200,000 To Find Bug In Android

The Giant company Google has made all techy brains surprised by announcing a reward money of $200,000 for the person who will succeed in finding a new bug in Android. The upgrade in the reward money took place after the news of Judy malware came. Judy attack consisted of number of infected applications that resides on Play Store and later could install adware on user device. It was been said that around 40 application were infected

From past 2 years, Google is running this reward program and till now $1.5 million has been given to the winners. The main motive of this reward program is to find the bug so that any type of cyber attack can be stopped easily and prevent from a heavy loss.

Reward Upgrades:

This bounty program is divided into different levels depending on seriousness of bugs. The first level reward to find bugs that could allow attackers to steal data was $30,000 and now the reward money has been increased upto 5 times. The second level includes Trust Zone bugs and Verified Boot. Verified Boot ensures that phones software is not affected whereas Trust Zone covers fingerprint scan, biometric data, security software, system settings and more. The previous reward for these bugs was $50,000 which has now upgraded to $200,000

Note: Reward for remote exploit chain or Exploit leading to TrustZone or Verified Boot increases from $50,000 to $200,000. Reward for remote kernel exploit increase from $30,000 to $150,000.