Converting Binary to shellcode
Converting a Binary to shellcodeNow we will talk about converting a binary to shellcodeby using this program binary2shellcode (FOR LINUX AND UNIX)1- Compile & Run :To build binary2shellcode  cd...
View ArticleMetasploit 1
Metasploit 1Introduction Metasploit framework is a penetration testing framework that contain a lot of tools (port scanners , vulnerability scanners ...etc) .Now we will start with the important step...
View ArticleMetasploit 2
Metasploit 2Scanning By ModulesMetasploit contains a lot of modules such as (port scanners , banner grabbers for services ... etc).We will use here some of these modulesNote: to get port scanner...
View ArticleMetasploit 3
Metasploit 3Advanced Commands Now we will introduce some advanced commands in metasploit (msfconsole)1- show exploitsmsf> show exploitsDisplay all exploites available in metasploit2- show...
View ArticleMetasploit 4
Metasploit 4Meterpreter part 1What is meterpreter ?Meterpreter is payload that uses DLL injection technique in memory so ,Antiviruses software can't detect it because meterpreter writes nothing to...
View ArticleMetasploit 5
Metasploit 5Meterpreter part 28- checkvmTo check if the remote system is a Vitrual machinerun checkvmThe target system is actually a virtual machine ruuning on VMware9- killavTo kill antivirusrun...
View ArticleCryptography1
Cryptography 1Introduction to cryptography :Now let's talk in details about 3 major concepts i- Computer Security , ii- OSI Security Architecture , iii- Cryptographyi - Computer securityA definition of...
View Articlecryptography2
Cryptography 2Symmetric EncryptionSymmetric encryption or symmetric key or single-key encryption is an encryption system which the encryption and the decryption processes are preforms using the same...
View Articlecryptography3
Cryptography 3Classical Encryption Techniques:As we mentioned earlier , the basic of all encryption techniques are based on 2 techniques 1- Substitution2- Transpositionand we can also use a combination...
View Articlecryptography4
Cryptography 4Classical Encryption Techniques 2:B- Polyalphabetic Cipher:Polyalphabetic Cipher is an encryption method to improve the simple substitution cipher techniques by using a larger key space...
View Articlecryptography5
Cryptography 5Classical Encryption Techniques:2- Transposition Cipher:Transposition Cipher is an encryption method which elements are rearranged.There are many types of Transposition Cipher such as...
View Articlecryptography6
Cryptography 6Block CipherBlock cipher is an encryption method which the encryption algorithm operates on a plaintext block of n bits and produces a block of n bits ciphertext.Block Cipher has 2^n...
View Articlecryptography7
Cryptography 7DES (Data Encryption Standered)DES :DES adopted in 1977 by (NIST) National Institute of Slandered and Technology).In DES data are encrypted in 64 bit block with a key length 56 bits and...
View Articlecryptography8
Cryptography 8Finite FieldIn this section we will talk about something in abstract algebra, and i'm trying to make it painless and simple.Finite Fields is a vary important topic in cryptography and it...
View Articlecryptography9
Cryptography 9Simplified AESSimplified AES is an educational algorithm to understand AES encryption algorithm , Simplified AES has the exact same structure of AES but with smaller parameters.Simplified...
View Articlecryptography10
Cryptography 10AESAES takes a plaintext block 16 bytes (128 bits) and key length 16, 24, 32 bytes (128, 192, 256 bits) AES-128, AES-192, AES-256 depending on key length.The input to encryption or...
View Articlecryptography11
Cryptography 11Pseudorandom Number Generation (PRNG)We uses PRNGs everyday over internet, network security applications and Protocols such as RSA and authentication algorithms.There are two...
View Articlecryptography12
Cryptography 12RSARSA is a block cipher, the block size must be less than or equal .\(\log_{2}(n)+1\), if block size =i bits \(2^{i}<n<2^{i}+1\)The encryption and decryption are on the following...
View Articlecryptography13
Cryptography 13Diffie-Hellman Key ExchangeDiffie-Hellman is a key exchange algorithm based on public key cryptography written by Diffie and HellmanDiffie-Hellman Algorithm :First we have to know the...
View Articlecryptography14
Cryptography 14Elgamal Cryptographic SystemElgamal cryptographic system is a public-key algorithm based on discrete logarithm.Elgamal cryptographic system is used in digital signature standard...
View Articlecryptography15
Cryptography 15Elliptic CurveElliptic curve is an equation with two variables and coefficients and it is a cubic equation like the following form:\(y^{2}+axy+by=x^{3}+cx^{2}+dx+e\)\(y^{2}=x^{3}\)Let's...
View Articlecryptography16
Cryptography 16Hash FunctionsWhat is hash function ?!Hash function maps a variable length message into a fixed length hash value.Cryptographic hash function is an algorithm for which no attack is more...
View Articlecryptography17
Cryptography 17Secure Hashing Algorithm (SHA)Secure Hashing Algorithm (SHA) is based on the hash function MD4 ,SHA was developed by National Institute of Standards and Technology (NIST) and published...
View Articlecryptography18
Cryptography 18Digital SignatureDigital Signature is an authentication mechanism tha enable the creator of a message to attach a code that act as a signature.Digital Signature is formed by taking the...
View ArticleSecure browsing and Escaping firewall by using SSH
Secure browsing and escaping firewall by using SSHThis article about how to build a secure browsing environment and how to escape firewall rules or even escaping ISPs rules over browsing (HTTP and...
View Article