I'm Sanath
Programmer/ Hacker /Web Developer
I am a programmar/ full stack developer/ and even a hacker.It's almost been two years since i started my Computer Science Degree.The journey is being wonderful with quite interesting stuff making my head banging over the my computer desk and lot yet to be done.But trust me you'll programming.By the way iam pursuing my degree in Indian Institute of Information Technology Kalyani.
Being quite curious and enthusiastic made myself to grow around here and feel comfortable.Apart from these assignments,exams and boring routine stuff i made my interest in projects which is leading me to quite different places rather than others. I feel like to grab this technological world but success is never been so easy.But never mind, i'll be at it one day.
Would you like to know more or just discuss something?
I have worked on dozens of projects so I have picked only the latest for you.
The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer files between a client and server on a computer network. FTP is built on a client-server model architecture and uses separate control and data connections between the client and the server. FTP users may authenticate themselves with a clear-text sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it. For secure transmission that protects the username and password, and encrypts the content, FTP is often secured with SSL/TLS (FTPS) or replaced with SSH File Transfer Protocol (SFTP).
A botnet is a number of Internet-connected devices, each of which is running one or more bots. Botnets can be used to perform distributed denial-of-service attack (DDoS attack), steal data,send spam, and allows the attacker to access the device and its connection. The owner can control the botnet using command and control (C&C) software. The word "botnet" is a combination of the words "robot" and "network". The term is usually used with a negative or malicious connotation.
Telnet botnets use a simple C&C botnet Protocol in which bots connect to the main command server to host the botnet. Bots are added to the botnet by using a scanning script, the scanning script is run on an external server and scans IP ranges for telnet and SSH server default logins. Once a login is found it is added to an infection list and infected with a malicious infection line via SSH on from the scanner server. When the SSH command is run it infects the server and commands the server to ping to the control server and becomes its slave from the malicious code infecting it. Once servers are infected to the server the bot controller can launch DDoS attacks of high volume using the C&C panel on the host server.
Aircrack-ng is a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs.
It works with any wireless network interface controller whose driver supports raw monitoring mode and can sniff 802.11a, 802.11b and 802.11g traffic.
Aircrack-ng comes pre installed with kali linux .
If your are running an linux system you install aircrack-ng by running the below command
sudo apt install aircrack-ng
WPA2 wifi use strong encryption algortithm but not unbreakable.WPA2 wifi share its password in a 4 way handshake.So we prepare ourselves
for a handshake and crack the encrypted password
Download the commands file to see the complete list.
In cryptography, a brute-force attack consists of an attacker trying many passwords or passphrases with the hope of eventually guessing correctly. The attacker systematically checks all possible passwords and passphrases until the correct one is found. Alternatively, the attacker can attempt to guess the key which is typically created from the password using a key derivation function. This is known as an exhaustive key search.
A brute force attack is a trial-and-error method used to obtain information such as a user password or personal identification number (PIN). In a brute force attack, automated software is used to generate a large number of consecutive guesses as to the value of the desired data. Brute force attacks may be used by criminals to crack encrypted data, or by security analysts to test an organization's network security. A brute force attack is also known as brute force cracking or simply brute force.
Here we use mechanize library to bruteforce online websitesStylesheet switching is done via JavaScript and can cause a blink while page loads. This will not happen in your production code.