Thursday, April 9, 2015

How to Encrypt Your DNS for More Secure Browsing

We’ve been touting the benefits of third-party DNS servers for a while now, but one additional benefit that might be of interest is the ability to encrypt all of your DNS requests, further protecting you from anybody spying on you in the middle.
DNSCrypt, from the great team at OpenDNS, is the simple solution that we’ll use to add encryption between your computer and the DNS server. It’s a lightweight solution that works on either Windows or Mac — sadly no mobile support so far.
What this tool is actually doing is creating an encrypted connection to any of the supported DNS servers, and then creating a local DNS proxy on your PC. So when you try to open, your browser will send a regular DNS query to the localhost address on port 53, and that request will then be forwarded through the encrypted connection to the DNS server.

Sunday, December 21, 2014

Man In The Middle Attack With Kali Linux

It’s one of the simplest but also most essential steps to “Conquering” a network. Once a hacker has performed a “Man In The Middle” attack (MITM) on a local network, he is able to perform a number of other “Side-kick” attacks. This includes, cutting a victim’s internet connection; intercepting Emails, logins, and chat messages; and many others.
And only one tools is needed for this attack:
An install or Live boot of Kali Linux, a well-known OS containing a collection of hundreds of penetration testing tools.

If you have that, then proceed to the tutorial below, and we’ll demonstrate how to perform this powerful attack.

Sunday, November 16, 2014

Denial-of-service Attack – DOS using hping3 with spoofed IP in Linux

In computing, a denial-of-service (DoS) or distributed denial-of-service (DDoS) attack is an attempt to make a machine or network resource unavailable to its intended users.
Although the means to carry out, the motives for, and targets of a DoS attack vary, it generally consists of efforts to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet.
As clarification, distributed denial-of-service attacks are sent by two or more persons, or bots, and denial-of-service attacks are sent by one person or system. As of 2014, the frequency of recognized DDoS attacks had reached an average rate of 28 per hour.
Perpetrators of DoS attacks typically target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, and even root nameservers.
Denial-of-service threats are also common in business, and are sometimes responsible for website attacks.

Sunday, August 31, 2014

Advanced Networking Commands

In one of our previous tutorials, you've learned how to use basic commands in Command Prompt. Now it's time to take things to the next level and show how to use some of the more advanced commands. The first set of advanced commands contains useful network commands which facilitate the following: viewing information about your network devices and connections (assigned IP Address, the MAC of the network card), checking the availability of a certain host and displaying a wealth of networking and ports information

Retrieving Information about Your Network Connection

To obtain detailed information about your network connection, use the ipconfig command. Type ipconfig in Command Prompt and press Enter. As you can see below, a list with the network devices existing on your system and their IP addresses is displayed. You get also details such the default gateway, subnet mask or the state of the network adapter.

Google+ Followers

Contact Form


Email *

Message *