Skip to main content

Posts

Showing posts from January, 2016

HASHCAT-CRACKING HASHES PASSWORD_KALI SANA 2.0

HELLO GUYS.. WELCOME BACK TO HACKERHEAVEN... in previous article..i show you how to spoof your mac address in kali sana.. today i am gonna show you how to crack the passwords through the help of hashcat in the kali sana 2.0.. let me tell you ..all the password are encrypted in hashe.. like .. window password encryption...SAM file in LM,NLTM or MD5 hashe which is very easily crack with help of HASHCAT,JOHN_THE_RIPPER,HYDRA..these all the software came inbuld with kali linux... similar to the window.. LINUX password is encrypted with SHA525 i think.. ya sure..wich can also be easily crack through these software.. and alogwith cracking...hashes.. i show you how to check the encrypted password...which type of hash it is... actually their is an sotware..hashfinder in kali...which easily .. guess what type of encyption it is... let me tell you one more thing...about the encryption.. lets your passwd is :zerocool but after encyption...MD5 MD5 hash for zero

KALI SANA 2.0 IN VIRTUAL BOX_HOSTED-UBUNTU

HELLO....GUYs WELCOME BACK TO HACKER_HEAVEN its long time ..huh... no worry i came with lot of article related penetration testing in Kali-sana 2.0 but befor we start it...we have to create an plate form to do it... trust me guy..it will help you to learn lot of thing about kali plateforms.... so in this tutorial ..i give you a live installation guide ..how to install virtual box in ubuntu,,, an after that..how to install kali sana 2.0 in it...it gonna take time to watch it..but trust me after this video you got an whole idea how to do..it.. this is zerocool..sign out..

SYSTEM_SECURITY_2

                             Setting File Mode With The GUI Now that we have seen how the permissions on files and directories are set in the last article"system security", we can better understand the permission dialogs in the GUI. In both Nautilus (GNOME) and Konqueror (KDE), right-clicking a file or directory icon will expose a properties dialog.suppose that an file whose permission wee change throgh the terminal commands..now it's time to show you how it will done by the GUI mode.. 1. right click in file and goto proporties and in their are an otion named 'permission' where you can change seperately its ownerships permissions..i put an screenshot of my screen for understanding... where you will get all the three owners section seperatly and by scrolling you can easily do it. that it for permission changing through the commands and by GUI mode now come to the next point that an command 'umask' which use t

SYSTEM SECURITY-PERMISSIONS

Add caption Hello guys welcome back to HackerHeaven,today we will learn about the system security of the linux distros...very preciesly..so..we are going to look at this essential part of system security and introduce the following commands: ● id – Display user identity ● chmod – Change a file's mode ● umask – Set the default file permissions ● su – Run a shell as another user ● sudo – Execute a command as another user ● chown – Change a file's owner ● chgrp – Change a file's group ownership ● passwd – Change a user's password  i hope you enjoyed my previous articles too... here are some things straight forward but instead you have too know it.. command : id output : ubuntu@ubuntu:~$ id uid=1000(ubuntu) gid=1000(ubuntu) groups=1000(ubuntu),4(adm),24(cdrom),27(sudo),30(dip),46(plugdev),108(lpadmin),124(sambashare) ubuntu@ubuntu:~$  So where does this information come from? Like so many things in Linux, from a couple of text files.