Linux is
Better than Windows!
Don't know if Linux (the Open source) is really better than
windows in every aspect. Even though Linux is highly customizable , it is not
highly reachable and is not user friendly when compared to windows,and also in
2014 the report of vulnerabilities in the OS, "Apple Mac OS X topped the
ist, Linux 3rd and windows in 4th and other positions.
But for developers and hackers Linux is must!
All of us use websites, we use our usernames and password to
have our own profile. Now how does it actually work. we send the data that is
,the input to the server which is stored or used by the server. Now these
inputs are not sent just like a plain text or the same way user sends it, it
has to be modified in a way that no one understands it except the user and the
server. So this is Encryption.
Encryption basically is the conversation of data into
another form , called cipher text, which cannot be easily understood
by authorized people.
Since we have encryption , to convert the data, we also have
decryption to decode the data. and this encryption and decryption is called as
cryptography.
There are many types of cryptography. but before that there is
something called public key and private key.
The Public Key is what its
name suggests - Public. It is made available to everyone via a publicly
accessible repository or directory. On the other hand, the Private Key must
remain confidential to its respective owner.
Caesar cipher
Caesar was a Roman
emperor ….Everyone knows…..!
He was one of the
very first to use cyphers for secret communication….
Well not many know
that do they…….?
How does it work……
- The
alphabets are taken in order.
- The
given text is written down.
- The Shifting
is done
- Here's
the trick….
- Plain:
ABCDEFGHIJKLMNOPQRSTUVWXYZ
Cipher: DEFGHIJKLMNOPQRSTUVWXYZABC
- The
text is shifted to the right by 3
Thus “Kl wkhuh...Wklv lv pb iluvw
fbskhu....”
Is actually “Hi there...This is my
first cypher....”
What’s the point for
coders if you Don’t Know the Math…
Encryption
Y = (X + n) mod 26
Decryption
X = (Y - n) mod 26
Try this link : http://online-calculators.appspot.com/caesar_ext/
Here’s a part of history….
:-)
Caesar used this
hardware for his cipher…. :-)
Affine Cipher:
This is almost same as the Caesar's cipher
encryption is given as: f(x)= (ax+b)mod 26
decryption : y(x)=a^-1(x-b)mod 26
and when a is 1 it is Caesar's cipher
send many more methods... like Da Vinci code
MD5.
One way encryption. That is decoding is not possible!. and now we also have MD6
MD5.
One way encryption. That is decoding is not possible!. and now we also have MD6
Then we saw about the
network. How to use Linux commands to check the details , like ip address and
ports used for various purposes. etc etc..
used commands like ping, nmap to check the details of the server. and also used ftp, ssh to access other computer. and also monitor the other computers.
Post lunch session: After an hour of break, started with web , real cool things. but people actually dint understand it. only few know about php, html, css so it was hard for those people to get started quickly.
Cracking into an website without an exact username and password, how to actually create pages and have it running perfectly, get and post methods, and some security issues with php scripts. and XSS
Cross-site Scripting (also known as XSS or CSS) is generally believed to be one of the most common application layer hacking techniques.
In the pie-chart below, created by the Web Hacking Incident Database for 2011 (WHID) clearly shows that whilst many different attack methods exist, SQL injection and XSS are the most popular.
and Wire shark. A Tool where the list of details given for each and every packet.
At Last, Real cool hacking stuffs, hacking security cameras, bugs in intranet.amrita.edu and more. Hope to have more fun. Sessions should have been more interactive. It Lacked attention in the first session. Second session was more fun.
No comments:
Post a Comment