Thursday, November 23, 2017

Kali Linux 2017.3 With New Tools Check Out Now

By egg nog

Kali Linux 2017.3 With New Tools Check Out Now

Kali Linux 2017.3 



In Kali Linux 2017.3, the kernel form has been refreshed to 4.13.10. Notwithstanding the piece, WiFi testing devices, for example, reaver, pixie WPS, web application security testing apparatuses, for example, Burp Suite, Cuckoo and the Social Engineering Toolkit have additionally been refreshed and different bugs have been settled. 

New tools incorporate Inspy, Cherry tree, Sublist3r, OSRFramework and Massive Maltego Metamorphosis have likewise been added to the archive and are accessible for download in Kali Linux 2017.3.

It is an amazing news for each kali client that accessibility of Kali Linux 2017.3, which incorporates all patches, fixes, updates, and upgrades since the last discharge. It Much Better than the last arrival of kali linux 2017.2. In this discharge, the portion has been refreshed to 4.13.10 and it incorporates some remarkable upgrades:
  • CIFS uses SMB 3.0 by default.
  • EXT4 directories can now contain 2 billion.
  • TLS support is now built into the kernel directly.
Have a look at the Kali Change log to perceive what else has been refreshed in this release, or read on to perceive what else is new in Kali Linux 2017.3.

Kali Linux 2017.3 New Tools

  1. InSpy.
  2. CherryTree.
  3. Sublist3r.
  4. OSRFramework.
  5. Massive Maltego Metamorphosis.
These new tools are not included in the default installation but after an ‘apt update’, you can check out and install the ones that interest you.


1. InSpy

InSpy is a Python-based LinkedIn enumeration tool with two functionalities: TechSpy and EmpSpy. TechSpy crawls LinkedIn job listings for technologies used by the target company. InSpy attempts to identify technologies by matching job descriptions to keywords from a newline-delimited file.

EmpSpy crawls LinkedIn for employees working at the provided company. InSpy searches for employees by title and/or department from a newline-delimited file. InSpy may also create emails for the identified employees if the user specifies an email format is added in Kali Linux 2017.3.

2. CherryTree

A hierarchical note taking application, featuring rich text and syntax highlighting, storing data in a single xml or sqlite file is added in Kali Linux 2017.3.

Written by Giuseppe Penone (aka giuspen).



Features

  • syntax highlighting supporting several programming languages
  • images handling: insertion in the text, edit (resize/rotate), save as png file
  • embedded files handling: insertion in the text, save to disk
  • multi-level lists handling (bulleted, numbered, to-do and switch between them, multiline with shift+enter)
  • simple tables handling (cells with plain text), cut/copy/paste row, import/export as csv file
  • codeboxes handling: boxes of plain text (optionally with syntax highlighting) into rich text, import/export as text file
  • execution of the code for code nodes and codeboxes; the terminal and the command per syntax highlighting is configurable in the preferences dialog
  • alignment of text, images, tables and codeboxes (left/center/right/fill)
  • hyperlinks associated to text and images (links to webpages, links to nodes/nodes + anchors, links to files, links to folders)
  • spell check (using pygtkspellcheck and pyenchant)
  • intra application copy/paste: supported single images, single codeboxes, single tables and a compound selection of rich text, images, codeboxes and tables
  • cross application copy/paste (tested with libreoffice and gmail): supported single images, single codeboxes, single tables and a compound selection of rich text, images, codeboxes and tables
  • copying a list of files from the file manager and pasting in cherrytree will create a list of links to files, images are recognized and inserted in the text
  • print & save as pdf file of a selection / node / node and subnodes / the whole tree
  • export to html of a selection / node / node and subnodes / the whole tree
  • export to plain text of a selection / node / node and subnodes / the whole tree
  • toc generation for a node / node and subnodes / the whole tree, based on headers h1, h2 and h3
  • find a node, find in selected node, find in selected node and subnodes, find in all nodes
  • replace in nodes names, replace in selected node, replace in selected node and subnodes, replace in all nodes
  • iteration of the latest find, iteration of the latest replace, iteration of the latest applied text formatting
  • import from html file, import from folder of html files
  • import from plain text file, import from folder of plain text files
  • import from basket, cherrytree, epim html, gnote, keepnote, keynote, knowit, mempad, notecase, rednotebook, tomboy, treepad lite, tuxcards, zim
  • export to cherrytree file of a selection / node / node and subnodes / the whole tree
  • password protection (using http://www.7-zip.org/) – NOTE: while a cherrytree password protected document is opened, an unprotected copy is extracted to a temporary folder of the filesystem; this copy is removed when you close cherrytree
  • tree nodes drag and drop
  • automatic link to web page if writing the URL
  • automatic link to node if writing node name either with no spaces and camelcase or surrounded by [[node name]]

3. Sublist3r

Sublist3r is a python tool designed to enumerate subdomains of websites using OSINT is added in Kali Linux 2017.3 . It helps penetration testers and bug hunters collect and gather subdomains for the domain they are targeting. Sublist3r enumerates subdomains using many search engines such as Google, Yahoo, Bing, Baidu, and Ask. Sublist3r also enumerates subdomains using Netcraft, Virustotal, ThreatCrowd, DNSdumpster, and ReverseDNS.

4. OSRFramework

OSRFramework is a set of libraries to perform Open Source Intelligence tasks. They include references to a bunch of different applications related to username checking in Kali Linux 2017.3 With New Tools, DNS lookups, information leaks research, deep web search, regular expressions extraction, and many others. At the same time, by means of ad-hoc Maltego transforms, OSRFramework provides a way of making these queries graphically as well as several interfaces to interact with like OSRFConsole or a Web interface.


5. Massive Maltego Metamorphosis

Massive Maltego Metamorphosis -One of our favourite applications in Kali has always been Maltego, the incredible open-source information gathering tool from Paterva, and the equally incredible Casefile. These two applications had always been separate entities (get it?) but as of late September, they are now combined into one amalgamated application that still allows you to run Maltego Community Edition and Casefile, but now it also works for those of you with Maltego Classic or Maltego XL licenses in Kali Linux 2017.3 .Massive Maltego Metamorphosis As always, the tools perform wonderfully and look great doing it.

Massive Maltego Metamorphosis

Download Kali Linux

You can Download the Latest Version of Kali Linux 2017.3 from here https://www.kali.org/downloads/



Read More
How To Fix Broken Keyboard Keys By Remapping

Keyboard remapping is a technique using which we can map any key to any other key i.e. you can reassign the function of a key to something else. To be more clearer lets say that your space bar is broken. It is an often used key so you can remap the function of an less frequently used key like "]" to function as a space bar i.e. every time when you press the "]" button it will function as a space bar.

Friday, November 10, 2017

10 Unknown Facts About Steve Jobs

By egg nog
Steve Jobs Co-Founder of apple known by many. In this article i will list some mind blowing facts about Steve Jobs that you never know.


Steve Jobs Facts

1. Steve Jobs never wrote a single line of code for apple.

Steve Wozniak stated that "Steve didn't ever code" on reply to an email on his Website

2. Steve Jobs was adopted his father was a syrian muslim.

Steven Paul Jobs was born on February 24, 1955, in San Francisco, California, to Joanne Schieble (later Joanne Simpson) and Abdulfattah "John" Jandali, two University of Wisconsin graduate students who gave their unnamed son up for adoption.
Steve Jobs unknowingly met his biological father on multiple number of occasions.
His adoptive parents, Paul and Clara Jobs, were Armenian and unable to have children. Steve was later joined in the family by his adopted sister Patti Jobs, born in 1958. The couple divorced in 1962.

3. Steve Jobs had no college degree.

Steve Jobs dropped out of college after six months and spent the next 18 months dropping in on creative classes at the school. He struggled for making money during this time. Steve Jobs used to sleep on his friends  room floors, returned Coke bottles for money, and ate free meals from the local Hare Krishna temple for living.

Steve Jobs High School GPA was just 2.65



4. Steve Jobs Had LSD.

Steve Jobs explained that he used LSD from 1972 - 1974 approximately 10 - 15 times.
Steve said "I would ingest the LSD on a sugar cube or in a hard form of gelatin. I would usually take the LSD when I was by myself. I have no words to explain the effect the LSD had on me, although, I can say it was a positive life changing experience for me and I am glad I went through that experience.”

“Taking LSD was a profound experience, one of the most important things in my life. LSD shows you that there’s another side to the coin, and you can’t remember it when it wears off, but you know it. It reinforced my sense of what was important—creating great things instead of making money, putting things back into the stream of history and of human consciousness as much as I could.”- Steve Jobs

5. Steve Jobs was dyslexic.

Steve jobs was dyslexic, meaning he has a learning disability that impairs his ability to read. But that didn't stop Steve Jobs from becoming the world's most iconic CEO.  Albert Einstein, Steven spielberg suffered from Dyslexia as well

Dyslexia is not a disability, it's a gift

6. Steve Jobs worked for Atari.

In 1973 Jobs started working at Atari as a technician. Steve Wozniak designed his version of the video game Pong. After finishing it, Wozniak gave the board to Jobs, Steve Jobs then took the game down to Atari. When the pair first created the Breakout game for Atari, they planned on splitting the pay 50-50. Although Atari gave Jobs $5,000 for the game, Jobs told Wozniak they got $700, leaving Wozniak to take home $350 while Jobs pocketed the other $4,650. While working in Atari Steve Jobs was asked to work for night shifts because of his stink smell as Jobs believed that his vegan diet would eliminate the need for showering.

7. India visit gave a vision to Steve Jobs.

Steve Jobs came to India as a teenager in search of enlightenment. He returned disappointed, following a brush with lice, scabies, dysentery and a near mob thrashing after he protested at being sold watered-down buffalo milk. But the trip did mark a turning point in his life 


8. Steve jobs applied for civilian astronaut to fly a space shuttle.

Steve jobs got rejected and briefly considering starting a computer company in the Soviet Union,he resigned from Apple five months later.

9. Steve jobs annual salary from apple is just 1$.

Steve jobs had 5 million shares that made him richer and moreover most of Steve Jobs' wealth was from his shares in Disney, not Apple.

10. October 16 was declared as Steve Jobs day by Californian governor.

After battling a decade of pancreatic cancer Steve jobs died in October 5, 2011 and Steve jobs also turned down a partial liver transplant from Tim cook two years before dying of pancreatic cancer. Steve jobs was buried in an unmarked grave as per his family's request and the cemetery has not revealed it's location.



I hope you will find this post  to be useful, I would be very grateful if you’d help it spread by sharing it to a friend or on Facebook. Thank you!

Read More

Friday, November 3, 2017

Whatsapp Down and Not working Across India and other regions

By egg nog

whatsapp server down 2017



whatsapp server down 2017

WhatsApp is down.Messages won't send or receive, and some people can't load the app at all. WhatsApp appears to be down for a wide number of users across the world. Users from different countries are reporting problems on Twitter with the hashtag #whatsappdown whatsapp server down 2017

#Update Down for 210 minutes today from 11 am to 2:30 pm Now Up and running

Individuals can't send or get messages utilizing the Facebook-claimed application, obviously due to a server issue. there's no easy fix to the problem, since it appears to be on WhatsApp's side

The application doesn't at first look broken, with visits and contacts ready to stack. In any case, once a client is into a talk, the application just demonstrates an "associating" message that never settle itself, thus new messages can't be sent or got. In addition to this whatsapp web is also down.

Whatsapp down for hours now. Users from parts of Europe, USA and Asia also experiencing delays in sending messages.
This being the third significant disturbance of the year of Whatsapp Down, with one as of late as August influencing clients over the world also. Preceding that, the Facebook-claimed benefit endured a blackout twice inside two weeks, in May.
Whatsapp is up and running.
whatsapp server down 2017 and is running by now these are all the news provided cybernog regarding whatsapp server down 2017

Read More

Windows Keyboard Shortcuts You need to know

By egg nog 10 Comments

  Useful Windows Keyboard Shortcuts You need to know

In this article i made a handy list of most useful Windows shortcut keys that will make your day to day tech life better. Collection of best Keyboard Shortcuts and tricks.


Windows Keyboard Shortcuts

Use ctrl+shift+escape to directly open the task manager


Use Windows Key + Arrow Key (left/right) to either move your window across multiple monitors, or to fix it to that half of the screen.

Windows + Left/Right = Move across monitors/maximize TO HALF
Windows + Up = Maximize
Window + Down = Minimize.
These help tons when you have multiple monitors.


Windows + Print Screen = Screenshot of the current window and saves it as a PNG in Pictures\Screenshots.

Win+Pause|Break = System Properties. 

Use Win+D to quickly show the desktop.

Press WinKey+L  to instantly lock your computer.

Shift + Right-Click a folder to access an alternative menu that allows you to open a CMD prompt from that location, among other things.

Open an elevated command prompt in not even half a second by pressing Winkey+X and then A.

Selecting an item and hitting F2 allows you to rename the item.Press TAB to jump to the next file when renaming.

Aligning Windows: Win + Left/Right Arrow.

Resizing Icons: CTRL - Mouse Wheel.

Ctrl + 0 to Always Set the Zoom to default value.

Windows Key+E (Open an Explorer Window)

Windows key + T: Cycle through the apps on the taskbar.

Winkey+ Number: Opens the corresponding numbered application from the taskbar icons. Win+1 opens the first , Win+2 opens the second , etc.

Winkey+ M Minimizes all windows.

Winkey+ Spacebar Preview Desktop (makes all open windows transparent)

Winkey+Shift+S - Screenshot a Portion of the Screen using snipping tool in Windows 10

Winkey+ Tab - Accidentally found that when I was trying to alt tab. A cooler view of alt tab.

Ctrl + Alt + [Arrow keys] - Flips screen Upside-Down & Right-Left

Ctrl + Z Undoes an action.

Ctrl + Y Redoes an action.

Ctrl + Shift + N Creates a new folder.

Ctrl + O Open a file in current software program.

Alt + Enter This forces demos to go full screen.

Alt + F4 Close the currently active program.

When typing an address into most browsers, CTRL + Enter will wrap whatever you typed with the http://www before it and .com after it. Type Cybernog ctrl+enter as an example.

Pressing Ctrl+TAB will allow you to seamlessly switch between tabs in your internet browser.

In chrome, Control + Shift + T reopens a tab you accidentally closed.

F6  places the cursor in the address bar of your browser - I use that a lot.

Ctrl + A Select all text.

Ctrl + Backspace deletes entire words at a time Also, Ctrl + arrow keys will move the cursor word by word, and if you hold shift you can select word by word.

Ctrl + Shift + V: paste text without formatting.

Press Ctrl+Shift+[Arrow Key] to select blocks of text.

Simply loop a video on Youtube by right clicking it and hitting "loop".

Keys J (-10sec) - K (pause) - L (+10 sec) controls Youtube video.

There are more hotkeys for Youtube such as F - Full screen, C - Closed Captions, M - Mutes, 0-9 keys for going directly to certain parts of the video.

Is Your Audio Out of Sync in VLC? Use ctrl + K or ctrl + L (or just J and K) to increase/decrease audio delay to fix sync issues.



I hope you will find this post about windows keyboard shortcuts to be useful, I would be very grateful if you’d help it spread by sharing it to a friend or on Facebook. Thank you!
Also read 10 ways Hackers can hack your Facebook account
Also read 10 Amazing Websites that you should make use of in 2017

Keywords
useful windows keyboard shortcuts,windows keyboard shortcuts,keyboard shortcuts keys, windows 10 keyboard shortcuts, Keyboard shortcuts for windows,
Read More

Thursday, November 2, 2017

How to protect your Facebook account from getting hacked

By egg nog

Protect your Facebook account from getting hacked

Facebook is the Top social networking website. It would be humiliating for anyone who lose their Facebook account to hackers as it will damage their social respect & reputation and also invades their privacy. I will share some proven ways to protect Facebook account from getting hacked. Just follow this article to keep your account safe from hackers.
Also read 10 Ways Hackers can Hack a Facebook Account


Strong Password

A strong password is a combination of lowercase and uppercase letters with numbers and symbols. It should at least be 8 characters and never include your name, DOB or any other common words in your password thus making it difficult to crack for the hackers. 12 character length passphrase with numbers and symbols will take 2 years to crack so go for length over complexity. Always use separate login passwords for email and other sites. You can also use online password generators for creating a strong password and change your password once in every six months

Use Firewall and a Password Manager

Firewall will help you to monitor the activities going on over the internet and sniff out any suspicious process from stealing you password. Password managers like Lastpass will fill your passwords without typing. Keyloggers can't steal passwords without typing.

Activate Login Alerts and Two-factor Authentication

Confirm your mobile number in Facebook and use login alerts to receive notifications from Facebook whenever someone logins in to your account from a new device are browser. Two-factor authentication provide extra layer of security by requesting a security code whenever you login. Log in with a code from your phone as well as a password. 
Settings--> Security and login--> Use two-factor authentication.
Also update privacy settings & choose trusted contacts and never accept friend requests from unknowns.


Safe browsing habits

  • Disable Remember Password Feature in the browser.
  • End active sessions from other devices.
  • Use Private window or Incognito mode to prevent browsers from saving your history and data.
  • Never click on suspicious links to defend against phishing
  • Login only on trusted computers.
  • Use a VPN when browsing over a shared public network.
  • Logout after use.
I hope you will find this post to be useful, I would be very grateful if you’d help it spread by sharing it to a friend or on Facebook. Thank you

Read More

Saturday, October 28, 2017

10 Ways Hackers can Hack a Facebook Account

By egg nog

10 Ways Hackers can Hack a Facebook Account


Mark zuckerberg wrote a program named "Facemash" as a second year student in Harvard University which led to the development of Facebook - a popular social media site that allows their users to make profiles, transfer photographs and video, send messages and stay in contact with companions, family and associates. By the second quarter of 2017, Facebook had 2 billion monthly active users. which makes Facebook to be a preferred target of hackers. In this post i will list you the Top 10 ways hackers can hack your Facebook account.
Also read How to protect your Facebook account from getting hacked
Also read 10 Amazing Websites that you should make use of in 2017


1. Phishing

Phishing is an attempt made by an hacker to steal your username and password by sending you a phishing link. Once you click on the link you will be redirected to a Fake Facebook login page which looks exactly like the genuine one. But if you unknowingly entered your login credentials in this fake login page then the username and password will be stored in the log file of the hacker and can be used to take control of your FB account. In 2016 the total number of unique phishing reports received is 1380432.

Phishing types

  • spear phishing.
  • clone fishing.
  • whaling.


2. Reset password

In this technique the hacker enters your username or mail id and clicks on Forgotten your password? and selects the account.It will ask if you would like to reset the password via the victim's emails. This doesn't help, so the hacker will click on No longer have access to these?
It will now ask How can we reach you? the hacker will type in an email that he has already created and is not linked with any other FB account.
➤Now the hacker will be left with a security question to reset the password. The hacker will make an educated guess. If he figures it out, he can change the password. Security questions are generated automatically if not set and some be like "In which city where you born?" So it won't be hard for the hacker. Now the hacker has to wait 24 hours to login to their account and the reset password link will be sent over to the new e-mail. 
If the account holder logins within this 24 hours this techniques fails and also won't be successful for secured accounts.

3. Keylogger

Keylogging is one of the techniques used by hackers. In which the hacker installs a small piece of software called keylogger on the victims machine. Which runs on the background and records every keystroke which is typed on the keyboard and also with various others features. Hardware keylogger is also used in which the software is installed in an USB and is connected to the victim PC to record the keystrokes.


4. Saved Passwords from Browsers

The browser asks us to save passwords whenever you login to a website. When you allow your browser to remember your login credentials. All usernames and passwords which are saved can be viewed with an single click. Always try avoiding to save passwords in browsers. You could rather use a password manager like LastPass to save your passwords.

5. Man In The Middle Attack (MITM)

A man in the middle (MITM) attack is done when a hacker positions himself in between a user (client) and the network application (server) either to eavesdrop or to harvest confidential information from the users. MITM has two phases: interception and decryption. To avoid these types of attacks use a VPN service and avoid using Public Wifi networks.


6. Viewing Masked Passwords

ShowPassword is an extension that helps you to view the masked password from the login page. The masked passwords can also be viewed by right clicking on the masked password and click on inspect element and change the input type from PASSWORD to TEXT.

7. Session Hijacking

If you are using an HTTP connection an not HTTPS. This makes it easy for the hacker to intercept in the network and sniff out the session cookie from your browser and use them to authenticate on the website. This technique is implemente on LAN and Wifi users.


8. DNS Spoofing

When the Hacker and the victim are using the same network. The hacker can implement a DNS Spoofing attack to redirect the user from using the genuine Facebook page to his own fake login page and thus taking over the Facebook account easily.

PREVENTIONS

  • Managing DNS servers securely.
  • Avoid using a shared network.
  • Configure it to be secured against cache poisoning.


9. Sidejacking - Firesheep

Sidejacking is the way towards taking somebody's entrance to a site, commonly done on remote open systems. To sidejack access to a site, the hacker performing utilizes a bundle sniffer to acquire a decoded cookie that awards access to a site. Firesheep is an extension for the Firefox browser that uses a sniffer to catch decoded session from sites like Facebook and Twitter. This module spies on Wi-Fi correspondences, tuning in for session cookie. When it identifies a session cookie, the device utilizes this to get the info of that session. The gathered info are shown in a side bar in Firefox. By tapping on the name, the session is controlled by the hacker.

10. Logout

Most common mistake many users do is not logging after using Facebook. This will leave your account open and whoever gets access to that device can get full access to your account and can impersonate you.



I hope you will find this post to be useful, I would be very grateful if you’d help it spread by sharing it to a friend or on Facebook. Thank you!
Read More