Sunday, May 2, 2021

Threats on The Dark Web BE CAREFULL!!

Types of Threats on The Dark Weberforming_arts:
 
Today we will gonna learn about Types of Threats on The Dark web .
Below are some comman Threats you may face during your browsing experience :- 
:black_small_squar︎Malicious Software :
Malware - is fully alive all across the Dark web.It is often offered in some portals to give threat actors the tools for cyber attacks.As such, users can find themselves regularly exposed to some types of malware like:
Keyloggers
Botnet Malware
Phishing
Ransomware
If you choose to explore more and more sites on the dark web, you put yourself at risk of being singled out and targeted for hacks and more.

:black_small_square:︎Government Monitoring :
Many Tor-based sites being overtaken by police authorities across the globe, there is a clear danger of becoming government's target for simply visiting a dark website.Illegal drug marketplaces like The Silk Road have been hijacked for police surveillance in the past.
This has allowed law officials to discover user identities of patrons and bystanders alike. Even if you never make a purchase, you could be watched and incriminate yourself for other activities later in life.
Evading government restrictions to explore new political ideologies can be an imprisonable offense in some countries.


Some of these are well-known, established threats that circulate in this nook of the web. However, others may be taking advantage of the dark web’s reputation to trick users out of large sums of money. Also, some users on the dark web may attempt Phishing scams to steal your identity or personal information for extortion.

Saturday, May 1, 2021

Top free hosting and domain sites

Top sites for building free hosting

You can host here.

https://www.hostinger.in/
https://www.2freehosting.com/
https://www.freehosting.com/
https://www.5gbfree.com/
https://in.000webhost.com/
http://www.atspace.com/
https://byet.host/free-hosting
https://x10hosting.com/
https://profreehost.com/
https://infinityfree.net/

site to build a free domain:v:

http: //www.freenom.com/en/ 

Thursday, April 29, 2021

Hiding Data

 Hide data in an audio file:beginner:


We looked at a method for hiding files in picture
this time we will show you a method for hiding data in audio files.

Let's get started:

Download and install DeepSound - http://fumacrom.com/bImz

Open DeepSound and click on "Open carrier files", then specify the path where the audio file is stored, where the information will be hidden.

Click on "Add secret files" and select the required data.

Next click on "Encode secret files".

The files were hidden in the "music". to get them out of there, on the main page of the program, add the audio file in which the data was encrypted and click on "Extract secret files".

Done!

Hiding Data

 Hide Data inside Images


:small_blue_diamond:Create a folder. Name it anything you wish, say hide.

put anything and everything you want to hide in this folder. Text files, other images, executables - anything. Also, put the image behind which you want to hide the files in the same directory, sayimage.jpg”.

:small_blue_diamond:we need to archive this folder. You can use your choice of compression tool for this (I recommend the free and open-source 7-zip). So now we have a zip file hide.zip containing all of the data we want to hide behind an image.

:small_blue_diamond:You should have your image, say image.jpg (inside of which we’ll hide our data) in the same directory as hide.zip (next to it).

:small_blue_diamond:open command prompt and move to the folder where image.jpg and hide.zip are located using the cd command:cd PATH For example: cd C:\Folder cd desktop

:small_blue_diamond:Now we type in the following command:copy /b image.jpg + hide.zip output.jpg

DONE

Wednesday, April 28, 2021

Data Research Engines

Best Search Engines Used By Security Researchers


Security professionals need to correlate data during OSINT, reconnaissance, vulnerability detection, network security breaches, and more. There are quite a few interesting and useful search engines in this blog

Shodan is a network security monitoring system and search engine that contains data from any type of electronic device that has ever been connected to Internet

Censys it tracks every online device on the Internet and provides data and reports in the form of a search engine on how devices, websites and certificates are set up

GreyNoise this system tracks those who scan the Internet using the aforementioned scanners

Hunter is a search engine that helps you get all email addresses belonging to a domain or organization

Pipl is a system designed to search for information about a specific person