Posts

Showing posts from January, 2018

Hide secret message inside an Image using LSB-steganography

Image
Imagine a scenario where we want to send a confidential message and don't want anyone except the recipient to read it. We will use every possible methods to make our message hidden from any third person. So here i am going to use LSB-Steganography method to hide our message inside an image. What is LSB  image source  Least Significant bit also called RightMost Bit is a lowest bit of a binary number. For example in binary number 10010010, "0"is the least significant bit.  What is LSB-Steganography  image source LSB-Steganography is a steganography technique in which we hide messages inside an image by replacing Least significant bit of image with the bits of message to be hidden.   By modifying only the first most right bit of an image we can insert our secret message and it also make the picture unnoticeable, but if our message is too large it will start modifying the second right most bit and so on and an attacker can notice the changes in picture

cracking encrypted PDF password using Dictionary Attack

Image
In this post we will crack encrypted PDF with a very easy method. This is a very simple and easy method for cracking encrypted PDF password which is helpful for beginners in password cracking. There are also different method for cracking PDF password by generating hash and cracking it with John the Ripper but we are going to use dictionary attack for this. Lets crack the code In below screen shot we can see when i am trying to access a PDF its asking for password.  STEP 1 First open your terminal and type apt-get install pdfcrack -y and press return. It will install pdfcrack on your machine   Now before cracking the password we need do generate some wordlist by keeping in mind our target, before doing this we have to do some reconnaissance to gather information about our victim.  STEP 2   After gathering enough information  about our target its time to generate wordlist . To do this first type apt-get install cupp and then type cupp -i . 

Dump every saved password from a computer

Image
In this post we will see a faster and easier way to dump all saved passwords from a local computer. This will recover every stored password saved by each software using different technique, all hashdumps and any other software's saved pass . What makes it easier There are lot of other tool and techniques through which we can pull all cache passwords like USB Rubber Ducky but in this case its very fast and easy to use,  just a simple command and we will get every saved password . How to do this   STEP 1 I am going to do this on my windows machine so for windows user download this and extract in your desired location . For Linux users get it from here . STEP 2 Now go to your saved location hold shift +  right click and select open command window here. STEP 3 Now we are going to dump all saved password in browsers ,to do this type laZagne browsers   And below we can see we got a saved password from chrome browser Final Words You can al

Cryptography and some tool and techniques for hiding information

Image
Cryptography and some tool and techniques for hiding information In computer science cryptography is a method of hiding information in storage and during a communication so that only authorized people can access that information.  Cryptography contain lot of cryptology method for securing communication and information like hiding text or messages behind images, Asymmetric encryption (public key cryptography) for securing Networks. In this article we are going to discuss some common and popular cryptography tool and techniques. Steganography Steganography is a method of hiding information, messages or files behind an image especially from the people who could snoop on our messages. A picture file contains some unused space in it and that space can be used for storing messages or some information in it. The good part is, a snooper would have no idea that the picture has some hidden information in it. Recommend tool: You can use LSB-Steganography for hiding file into image which is an op

Know the dangers of credential reuse attacks

Image
What is it? Give your target Email address and it will check for public leaks for the email and if it found any, it will returns with all available details about the leak (Using hacked-emails site API). Now give your leaked email address's password then it will check for that leaked password by login on popular sites like Facebook, G mail, etc.   How is it useful? It's useful because you can check if your email and password has been leaked on some public leak/dumps or not. How to use it ? STEP 1 To use this tool clone into this GitHub URL by typing git clone https://github.com/D4Vinci/Cr3dOv3r.git .  STEP 2 Now you need to install pip3 package management system for python3, to do this type apt-get install python3-pip -y . STEP 4  Now install the requirements of this program by typing pip3 install -r requirements.txt then run the program using python3 Cr3dOv3r.py <your email address>.     Scan started It will start scanning public le

Network security scanning with nmap

Image
Today we are going to scan a network for common publicly known Cybersecurity vulnerabilities with Nmap. As we all know Nmap is a very powerful tool when it comes to network scanning to find vulnerabilities in a network. It contains lot of scripts prebuilt for lot of task like for brute forcing a network login address and password for various type of protocols, discovering all directories  on a network , fuzzing and a lot of security auditing techniques are available in Nmap. In this post I am going to scan my network for publicly known vulnerability to check if it’s vulnerable to any bug or not. What you need to know  This is a basic network scanning so I am going to describe everything that you need to know for doing a basic scan. Apart from this you can search about those vulnerabilities and way to mitigate them after the scan. Prepare Nmap for the scan STEP 1 To do this network scan you will need to clone in to a github URL, so type this in your terminal git clo