Posts

Showing posts from September, 2023

Cryptography

THE ART OF CRYPTOGRAPHY  Table of contents  What is cryptography?  Protocols understanding cryptographic methods math behind encryption What is cryptography? Cryptography involves the hiding or coding of information using keys such that only the intended recipient can view it. It is crucial to encrypt data so that it does not get forged or tampered by any untrusted parties such that the privacy and confidentiality of the messages is kept known only to the sender and recipient.  Protocol s There are two types of encryption protocols: SSL TLS Both are encryption protocols for the internet's transport layer help to protect data on webservers and websites. They rely on a set of private and public keys to encode messages into meaningless form so that it cannot be read by anyone who does not know how to decode it. But to use both protocols, a certificate needs to be installed on the server.  Example:   Have you ever noticed that a webpage address s...

Linux Basic Command Lines

Image
  Here is a guide to some basic command lines used which will help you to become more familiar with Linux.  Table of contents  What is Linux? How to install Linux? Basic Command Lines What is Linux?  Linux is an open-source operating system that offers a wide range of functionalities.  It is perfect for everyday tasks like browsing, emailing, photo management, financial management , and much more. How to install Linux?  The general steps to installing Linux on your PC are as follows: Pick a Linux distribution from the numerous that are available; each has special features and advantages. Ubuntu, Fedora, and Debian 123 are a few well-liked choices. Download the distribution: After making your decision, you can get the distribution from the official website. The majority of distributions include numerous download methods, such as ISO files and USB images 123. Make installation media: You must make installation media after downloading the distributi...

BetterCap

Image
  HOW TO DETECT EVERY DEVICES ON LOCAL NETWOKS USING BETTERCAP? Table Of Content: What is Bettercap? how to install Bettercap How to detect devices? What is Bettercap? Bettercap allows for a range of attacks on Wi-Fi networks and also on other low energy networks like Bluetooth for example.  Some of the features of Bettercap include: Network monitoring : Bettercap can be used to monitor network traffic and identify potential security issues. Packet injection : Bettercap can inject custom packets into a network to test its security. Man-in-the-middle attacks : Bettercap can be used to perform man-in-the-middle attacks on a network, allowing an attacker to intercept and modify network traffic. Password sniffing : Bettercap can be used to capture passwords and other sensitive information transmitted over a network. DNS spoofing : Bettercap can be used to spoof DNS responses, allowing an attacker to redirect traffic to a malicious website. Bettercap is a versatile tool that can b...