Ways of Detecting Attacks

Ways of Detecting Attacks

Most computer vulnerabilities can be exploited in a variety of ways. Hacker attacks may use a single specific exploit, several exploits at the same time, a misconfiguration in one of the system components or even a backdoor from an earlier attack. This makes it difficult to identify hacker attacks, especially for a novice user. This…

How to Perform Cryptography? Practical

How to Perform Cryptography? Practical

Using HashCalc to Calculate One-Way Hashes HashCalc is an efficient tool to calculate message digests, checksums, and HMACs of files, text, and hex strings.  The information in files are distilled by message digests and one-way hash functions into a single fixed-length number. Generally, the length of these numbers is 128 or 256 bits. When the…

Wireless Hacking Tools

Wireless hacking tools are of two types. One can be used to sniff the network and monitor what is happening in the network. The other kind of tool is used to hack WEP/WPA keys. These are the popular tools used for wireless password cracking and network troubleshooting. 1. Aircrack-ng One of the most well-liked wireless…