Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Articles by Ajay yadav
38 articles
Reset Kali Linux Password
Kali Linux is a Debian-derived Linux distribution designed for penetration testing and digital forensics, adopted by both hackers and security professionals. Users may find themselves unable to login due to a forgotten password or after installing Kali in a virtual environment or dual boot configuration. This article explains how to reset the Kali Linux password using the built-in recovery options. When locked out of the system, users typically encounter a login prompt where entering incorrect credentials results in access denial. Step-by-Step Password Reset Process Step 1: Access GRUB Boot Menu Reboot your Kali Linux ...
Read MoreCover the Tracks using covermyass
CoverMyAss is a penetration testing tool designed for the "covering tracks" phase of security assessments. It helps security professionals clean up evidence of their activities on target systems before exiting, or disable system logs for post-exploitation analysis. This tool is essential for ethical hackers and penetration testers who need to simulate real-world attack scenarios. How CoverMyAss Works The tool operates by systematically clearing or manipulating various system log files that record user activities, authentication attempts, and system events. It targets critical log files where evidence of unauthorized access might be stored, ensuring a thorough cleanup process. Target ...
Read MoreWindows UAC protection Bypass
User Account Control (UAC) is a Windows security feature that prevents unauthorized changes to the system by requiring administrator-level permissions for certain operations. It acts as a barrier between standard user accounts and administrative functions, prompting users to confirm or provide credentials when attempting to perform tasks that could affect system security or stability. UAC is designed to reduce the attack surface by ensuring that even users with administrator accounts run most applications with standard user privileges. When administrative access is needed, UAC displays a prompt requiring explicit consent or credentials. Understanding UAC Bypass Techniques This tutorial ...
Read MoreRun Linux Natively on Windows 10
Microsoft has introduced the Windows Subsystem for Linux (WSL), which lets users run their favorite Linux distributions directly from Windows 10 without dual-booting or using a virtual machine. This feature bridges the gap between Windows and Linux environments, allowing developers and system administrators to use Linux tools natively on Windows. Limitations of Windows Subsystem for Linux While WSL is a significant step forward for Microsoft, it has some limitations in terms of full functionality. Specifically, WSL does not support AF_PACKET due to security restrictions. This means you won't be able to put a Wi-Fi adapter in promiscuous mode ...
Read MoreExecuting C# code in Linux
The .NET ecosystem was traditionally limited to Windows, but Microsoft's introduction of Mono changed this landscape. Mono enables the execution of .NET applications on Linux systems, making them run as if they were native Linux packages rather than Windows executable files. What is Mono? Mono is an open-source, cross-platform implementation of Microsoft's .NET Framework. It allows developers to run .NET applications on various platforms including Linux and macOS. Mono provides a complete development stack that supports Windows Forms, LINQ, XML web services, ADO.NET, and ASP.NET using the same CLR namespaces. Cross-Platform .NET with ...
Read MoreCyber Attack Symptoms
A cyber attack can compromise your computer's security even when advanced antivirus software is installed. While regular system scans provide protection, attackers use sophisticated techniques that may bypass detection. Recognizing the warning signs of an active attack is crucial for immediate response and damage control. Understanding these symptoms helps identify potential breaches before significant damage occurs, allowing for prompt remediation actions. Common Cyber Attack Symptoms Process and Network Anomalies Unauthorized PowerShell activity − Unusual PowerShell processes running in Task Manager without user initiation indicate potential remote access or malware execution. Suspicious network ...
Read MoreNMAP Cheat Sheet
Nmap is a free open source tool, employed to discover hosts and services on a computer network by sending packets and analyzing the retrieved responses. Nmap offers features for probing computer networks, including host discovery and service and operating system detection. Nmap provides additional information on targets, including reverse DNS names, device types, and MAC addresses. It supports scriptable interaction through the Nmap Scripting Engine (NSE) for advanced network reconnaissance. Nmap Network Discovery Process Scanner Host Discovery ...
Read MoreRegistry Forensic
The Windows Registry is a central hierarchical database that stores configuration settings for applications, hardware devices, and users. Beyond system configuration, the Registry maintains extensive records of user activities, recently accessed files, and connected devices, making it a valuable source of forensic evidence. For forensic analysts and system administrators, the Registry provides crucial insights into system usage patterns and potential security incidents that may not be visible through other investigative methods. Windows Registry Structure Prior to Windows 95, system configuration was managed through individual files such as autoexec.bat, config.sys, win.ini, and system.ini. The Registry replaced this fragmented ...
Read MoreAddress Space Layout Randomization (ASLR)
Address Space Layout Randomization (ASLR) is a critical security mechanism that randomizes the memory layout of running programs to prevent attackers from predicting memory addresses. This makes it significantly harder for malicious code to exploit memory corruption vulnerabilities. Memory corruption vulnerabilities occur when a program mistakenly writes attacker-controlled data outside of an intended memory region. This may crash the program or, worse, provide the attacker full control over the system. ASLR serves as a failsafe mechanism to limit the damage should such vulnerabilities be exploited. How ASLR Works ASLR works by randomizing the memory locations where program ...
Read MoreRundll32.exe Attack
A Rundll32.exe attack exploits the legitimate Windows utility rundll32.exe to execute malicious Dynamic Link Libraries (DLLs). Rundll32.exe is a Windows system process that allows programs to invoke functions from DLL files, making it an attractive target for attackers who can abuse this functionality to run malicious code while appearing as legitimate system activity. Attackers leverage rundll32.exe because it can load and execute code from DLL files, and security tools often trust this legitimate Windows process. This technique is commonly used in penetration testing and malware campaigns to bypass security controls and establish remote access to target systems. How ...
Read More