Posts

Showing posts from April, 2018

Android Codes

Image
If we talk about an Android operating system, the reason why i choose Android over other mobile OS is that this platform has different kind of features for every particular purpose. i have managed to collect some of the useful codes for Android users which will help those who’re worried about being tracked. Code 1: *#21# This code will let you find out whether your messages, calls, and other data are being diverted. You can find details about call forwarding. You can even find out where your data, voice, fax, SMS, sync, async, Packet access, and pad access call forwarding enabled or disabled. Code 2: *#62# If your friend tells you, that your number is saying no-service or no-answer, then you need to dial this code on your smartphone to find out where your calls, messages, and data are being redirected. There are possibilities that your calls are being redirected to one of your cell phone operator’s numbers. Code 3: ##002# This is a universal code to deactivate all call forwa...

Things to do with Rooted Phone

Image
Rooting is one of the best things when it comes to smartphones. Rooting give you power, customization, privacy, and control. Here are some ways you can use your rooted phone to give you some more of that. The first thing is customization. The ability to change your roms to one that speaks to you and how you like your phone. I personally like the CyanogenMod project. They produce slim line rom that gives you different versions of the Android OS to be able to use on your phone. Using mods helps you stand out with your phone and something that helps you remove all the different spamware that is pre installed on your phone. next is giving your phone power. There area few ways this can be done. 1. removing spamware 2. installing custom rom 3. overclocking your CPU/GPU The first option is the easiest. There are many system apps out there that you will never use. Some people will never use twitter or facebook or many other system apps. You can not uninstall these system app...

How to become a hacker

Image
Nowadays, every other college or school student wants to be a hacker. Due to media hype, the term hacker is considered both cool and criminal at the same time. Now, since my blog is basically about my journey into hacking, I receive many emails on how to become a hacker. "I'm a beginner in hacking, how should I start?" or "I want to be able to hack my friend's Facebook account" are some of the more frequent queries. In this article I will attempt to answer these and more. I will give detailed technical instructions on how to get started as a beginner and how to evolve as you gain more knowledge and expertise in the domain. Hacking is a skill. And you must remember that if you want to learn hacking solely for the fun of hacking into your friend's Facebook account or email, things will not work out for you. You should decide to learn hacking because of your fascination for technology and your desire to be an expert in computer systems. "Being a ...

Protecting your Android device and your Privacy

Image
Its been a while since I have written about how to protect your self from the prying eyes of government. So if your trying to protect your self against the NSA, GCHQ, or who ever here are some things that you can do to help protect yourself. Since those 3 characters agencies mass surveillance pick up a lot of innocent peoples private data that never go away or GCHQ where they are legal to hack your data. So since the main area that is been popular for governments resiliency is your mobile phone here are some things you can do to help protect them. Operating system: This would be a modified android OS that is stock with some additional features. CyanogenMod has a lot of improvements over stock android and is controlled by community and not by corporate google who may be forced to try to put back doors in their OS. From there you will want to be on the latest version of the operation system because you will want to have the app protection with permissions that android 6 and ab...

Information Security (InfoSec) Software

Image
Probably the number one of all the software out there Metasploit is one of the top exploit deployment and research tool. It helps you quickly deploy and expedite the exploiting process. Armitage/Cobalt Strike are both tools to help leverage the Metasploit Framework to quickly and show examples of how to quickly and quietly leverage and suggest exploits to get access to network resources. All these resources require and are based off of the complexity of the metasploit framework. So if you know how to use metasploit very well you may find that these tools will just expedite your exploiting speed and help have a graphical place to work in. Though metasploit has its own Pro version that does close to the same thing. Subterfuge Framework will help you leverage and run a Man In the Middle Attack with out needing to worry about configuring sslstrip, arp poisioning, harvesting credentials, blocking vpn tunnels, and much more. Subterfuge allows you to build plugins onto subterfuge ...

Become a cyber security expert

Image
Cyber-security work is *creative* work.  Though much of it is done by rote (the same old vulnerability scans, the same old firewall configurations, etc.), the real intellectual "jewels" are finding the application-coding flaw the designer didn't think of (buffer-overflow, off-by-one error, fuzzing), or using existing communication channels in previously-unexpected ways (making outbound DNS queries which happen to look like 16-digit credit card numbers, using patterns of ICMP ping-traffic as Morse Code, etc.). So:  you need to familiarize yourself with the tricks of the trade.  I would grab a couple of O'Reilly books (PGP Encryption, RADIUS, Security Warrior, SSH are good choices).  If those are too difficult for a first read, fall back to Wikipedia or Hacking for Dummies.  (Yes, I have a copy on my Drive.)  If you are comfortable with three or four of the references above, move on to anything by Bruce Schneier, or try watching/listening...

Becoming an I.T. Professional

Image
As an I.T. professional with over 8 years of experience in the field, I sometimes get asked the question, “How’d  YOU  get started in I.T?”  I figured that the answers that I give could become a good article on breaking into the field, so I thought I would suggest 8 things that I did in order to increase my knowledge and my skill set to become a Systems Engineer in the Information Technology field.  I tried to make them general enough so that it encompasses more than just network and systems engineering.  Enjoy!!! 1. Hang with the geeks. By this, I mean seek out others who are also interested and passionate about I.T.  Don’t be afraid to engage with others just because they may seem “geeky.”  The term “geek” is overstated nowadays anyhow. We are not the pocket protector wearing, high water pants, never interacting with members of the opposite sex people that we are portrayed as being in movies.  There are “geeks” everywhere. Y...