How to implement css when onClick event occur in Reactjs
In ReactJS, you can implement CSS changes on an onClick event by using state
to manage the CSS styles and then updating that state when the event occurs.
Here's a step-by-step guide:
1.Create a React component:
import React, { useState } from "react";
import "./CSSViaOnClick.css";
function CSSviaOnClick() {
const [isClicked, setIsClicked] = useState(false);
const handleClick = () => {
// Update the state when the button is clicked www.hackingtruth.in
setIsClicked(!isClicked);
};
// Define CSS classes based on the state www.kumaratuljaiswal.in
const buttonClass = isClicked ? "clicked" : "unclicked";
return (
<div>
<div className="main-div">
<button onClick={handleClick} className={buttonClass}>
Click me
</button>
</div>
</div>
);
}
export default CSSviaOnClick;
1. First of all we are written and import the two pkg first one is
react and another one is css file.
2. In this example, we create a functional component App that uses the
useState hook to manage the isClicked state. Initially, it's set to false.
3. We define a handleClick function
that will be called when the button is clicked. Inside this function, we
update the isClicked state using setIsClicked, toggling it between true and
false with each click.
4. Based on the isClicked state, we
determine the CSS class to apply to the button. In this case, we have two CSS
classes: 'clicked' and 'unclicked', which you can define in your CSS or use
CSS-in-JS libraries like styled-components.
5. Finally, we
render the button with the onClick event handler and the appropriate CSS
class.
Wheneven user click on button then event occur and css works.
Disclaimer
All tutorials are for informational and educational purposes only and have
been made using our own routers, servers, websites and other vulnerable free
resources. we do not contain any illegal activity. We believe that ethical
hacking, information security and cyber security should be familiar subjects
to anyone using digital information and computers. Hacking Truth is against
misuse of the information and we strongly suggest against it. Please regard
the word hacking as ethical hacking or penetration testing every time this
word is used. We do not promote, encourage, support or excite any illegal
activity or hacking.
All tutorials are for informational and educational purposes only and have
been made using our own routers, servers, websites and other vulnerable free
resources. we do not contain any illegal activity. We believe that ethical
hacking, information security and cyber security should be familiar subjects
to anyone using digital information and computers. Hacking Truth is against
misuse of the information and we strongly suggest against it. Please regard
the word hacking as ethical hacking or penetration testing every time this
word is used. We do not promote, encourage, support or excite any illegal
activity or hacking.
CRUD is stands for "Create, Read,
Update, and Delete".
These are the four basic
operation for managing data in an application.
In
HTTP we find four main methods that can perform processing on
data that are defined in the REST architecture. This correspondence can also
be done with CRUD.
GET
-> Retrieve POST -> Create PUT -> Update Delete
-> Delete
CRUD Operation
To Insert
Public class HomeController: Controller
[HTTPPOST]
//controller is a class
public ActionResult InsertData(Students s)
{
ApplicationDb db = new ApplicationDb();
db.Students.Add(s);
db.SaveChanges();
return view();
}
To read
ApplicationDb db = new ApplicationDb();
var lst = db.Students.ToList();
List<Students> list = db.students.ToList();
foreach(var obj in list)
{
console.writeline (obj.StudentsId);
console.writeline (obj.StudentsName);
}
To Update
ApplicationDb db = new ApplicationDb();
Students s = db.Students.Where(x => x.StudentsId == items.StudentsId).SingleOrDefault();
//items is a model name
s.StudentsName = new StudentsName;
db.SaveChanges();
To Edit Single Update
Public Class HomeController: Controller
{
ApplicationDb db = new ApplicationDb();
Students s = db.Students.Where(x => x.StudentsId == StudentsId).SingleOrDefault();
return view(s);
}
To Delete
List <Students> s = db.studentsToList()
if(s!=null)
{
foreach(var t in s)
{
db.students.remove(t);
}
db.savechanges();
}
Disclaimer
All tutorials are for informational and educational purposes only and have
been made using our own routers, servers, websites and other vulnerable free
resources. we do not contain any illegal activity. We believe that ethical
hacking, information security and cyber security should be familiar subjects
to anyone using digital information and computers. Hacking Truth is against
misuse of the information and we strongly suggest against it. Please regard
the word hacking as ethical hacking or penetration testing every time this
word is used. We do not promote, encourage, support or excite any illegal
activity or hacking.
HTML Helper is just a method that returns a HTML string.
The string can represent any type of content that you want.
For
example, you can use HTML Helpers to render standard HTML tags like
HTML <input>, <button> and <img> tags
etc. You can also create your own HTML Helpers to render more complex
content such as a menu strip or an HTML table for displaying database data.
The following table lists HtmlHelper methods and html control:
HtmlHelper - Html.ActionLink Html Control
- Anchor link
HtmlHelper - Html.ActionLinkFor Html Control - Anchor
link
HtmlHelper - Html.TextBox Strogly Typed HtmlHelpers
- Html.TextBoxFor Html Control - Textbox
HtmlHelper - Html.TextArea Strogly Typed HtmlHelpers - Html.TextAreaFor
Html Control - TextArea
HtmlHelper
- Html.CheckBox Strogly Typed HtmlHelpers - Html.CheckBoxFor
Html Control - Checkbox
HtmlHelper - Html.RadioButton Strogly Typed HtmlHelpers -
Html.RadioButtonFor Html Control - Radio button
HtmlHelper - Html.DropDownList Strogly Typed HtmlHelpers
- Html.DropDownListFor Html Control - Dropdown, combobox
HtmlHelper - Html.ListBox Strogly Typed HtmlHelpers
- Html.ListBoxFor Html Control - Multi-select list box
HtmlHelper
- Html.Hidden Strogly Typed HtmlHelpers - Html.HiddenFor Html Control - Hidden Field
HtmlHelper - Password Strogly Typed HtmlHelpers - Html.PasswordFor Html Control - Password textbox
HtmlHelper
- Html.Display Strogly Typed HtmlHelpers - Hmlt.DisplayFor
Html Control - Html text
HtmlHelper - Html.Label Strogly Typed HtmlHelpers - Html.LabelFor Html Control - Label
HtmlHelper - Html.DisplayName Strogly Typed HtmlHelpers
- Html.DisplayNameFor Html Control - Display
HtmlHelper
- Html.editory Strogly Typed HtmlHelpers - Html.EditorFor Html Control -
Generates html controls based on data type of specified model property eg.
textbox for string property numeric field for int, double or other numeric
type.
Disclaimer
All tutorials are for informational and educational
purposes only and have been made using our own routers, servers, websites and
other vulnerable free resources. we do not contain any illegal activity. We
believe that ethical hacking, information security and cyber security should be
familiar subjects to anyone using digital information and computers. Hacking
Truth is against misuse of the information and we strongly suggest against it.
Please regard the word hacking as ethical hacking or penetration testing every
time this word is used. We do not promote, encourage, support or excite any
illegal activity or hacking.
Currently we are working on web 2 and we are excited about web 3
and then jack dorsey says hey we are coming up with
web 5 that is correct but then why do we need
web 3 and web 5 when we have web 2.
web5 is here with web2+web3
Now think about this what
is happening in the web 2 world now basically it provides you
multiple services right so we have so many websites so many applications and
they provide you some awesome services the only problem is for every different
service you have to provide your information you share your personal
information you share your post you share your photos you share your location
and all this data is there with that particular website i mean that that is
okay right not exactly you're not sure how they are using that data maybe
they're using your data for marketing purpose they're using your data to sell
to someone or they are using your data to influence you so that's one thing
and again you might be thinking when you upload a photo on a website.
web2
When you upload a post somewhere basically you
own that data not exactly this company owns your data not just your post and
photos your personal data as well so that's one issue the second issue is
let's say if you are using a particular service maybe apple music so what you
do is if you want to use that service you share information you share your
email id phone number and all the details and then you are enjoying that
particular service but what if you want to move to some other service again!!
web3
You have to go to that particular website on an app you
have to share your information then only you can access that particular
service so basically if you want to switch you again have to share the
information and this company they actually lock your data with them you can't
even delete it and of course with the help of GDPR it may be
possible but not in all the countries right so this company actually hold your
information so can we do it this way can we just reverse it can we say hey let
me hold my information. web2 tech
I have a box here in this
box i will have my information and if you want to give that particular service
you have to request for the service you have to request for the data i will
give you data and then i'll be there of course when you don't have to share
everything you just have to share that you have an identity and maybe a
particular key and they can verify this is you what you're claiming to be
right so that's the box.
I want that's the wallet that's the right
word in the terms of web three we call it as a wallet which has your identity
so that's why we were going for web3 right and that's where jack dorsey
the founder of twitter says hey we have a better solution let's go for web 5
which is actually a combination of web 2 all the services and web 3 technology
and that's your web 5 and this is actually built on bitcoin blockchain so
basically web5 provides you with decentralized identity and the storage for
your application to learn more let's go to that particular website so this is
basically the company by jack dorsey a
blockchain project company and it was formerly called as square
and now we have a different name they're coming up with web five it's an extra
decentralized web platform and you can see this is actually a combination of web 2
and web3. world wide web
If you want to learn more
about it there's a amazing pdf available you can just explore that pdf in fact
i will show you some introduction part as well now what they are providing you
is first they are providing you with the wallets they are providing you with a
decentralized web application uh in the web3 world we call them as
dapps and they are also giving you decentralized web nodes the blockchain
nodes actually if you explore this pdf which is an amazing pdf to go
through so this is the same thing i've explained right so basically to access
any a web you have to share information with each service but how about this
can we just have one particular identity and we can share with multiple
service and you don't even have to share information basically you will own
your data and that's what i actually was talking about from a long time on
this channel right basically we need privacy where you need to
have a power where you need to have the hold on your own data.
So, we have talked about this this is actually web 2 and web3 which is creating web 5 and this is interesting so
decentralized web application enables developers to write dapps or
decentralized web application using the identifiers basically you'll be having
your own identities and this identity is actually verifiable on the on the
chain or on the network and important thing is they don't have a token here
and don't think about the pricing of token or you know the inflation of tokens
so that's a different thing.
We don't have any tokens here
and it is decentralized web notes and they are combining everything to give
you web five in fact this is just an introduction video of
web5 i have not gone through the entire documentation how it
will work how what kind of application you can build but this looks a
promising start but again my bet is on web3 web5 is just an implementation
just an idea so it's not a replacement for web3 in fact on twitter i saw this
amazing tweet this is web one is scientists where in the driver's seat
web 2 is techno entrepreneurs why the driver said web 3 is vcs
because the entire web 3 is funded by vcs again it's a promising
start but what about web five and jack dorsey said it is for the
people uh people will be driving it and that looks promising so in future for
sure we are moving from web 2 to web 3 it doesn't matter or i mean web 2 to
web 3 or f5 so it doesn't matter whatever people are claiming about it's a
scam or something you know maybe lack of knowledge but blockchain is there
blockchain will be coming and then it will disrupt the entire ecosystem most
of the companies are using private blockchains because they don't want to
share the data with the world they want to use it for their own use cases
maybe for supply chain maybe for hospitalmanagement or all those use cases and then for the consumer
side.
Disclaimer
All tutorials are for informational and educational purposes only and have been
made using our own routers, servers, websites and other vulnerable free
resources. we do not contain any illegal activity. We believe that ethical
hacking, information security and cyber security should be familiar subjects to
anyone using digital information and computers.
Hacking Truth is
against misuse of the information and we strongly suggest against it. Please
regard the word hacking as ethical hacking or penetration testing every time
this word is used. We do not promote, encourage, support or excite any illegal
activity or hacking.
DNS (Domain Name System) provides a simple way for us to
communicate with devices on the internet without remembering complex numbers.
Much like every house has a unique address for sending mail directly to it,
every computer on the internet has its own unique address to communicate with
it called an IP address. An IP address looks like the following 104.21.56.127,
4 sets of digits ranging from 0 - 255 separated by a period. When you want to
visit a website, it's not exactly convenient to remember this complicated set
of numbers, and that's where DNS can help. So instead of rememberin104.21.56.127, you can remember
hackingtruth.org instead. DNS in full details
google.com
nasa.gov
hackingtruth.in
104.21.56.127
bbc.co.uk
hackingtruth.org
facebook.com
twitter.com
Domain Hierarchy
TLD (Top-Level Domain)
A TLD is the most
righthand part of a domain name. So, for example, the google.com TLD is .com.
There are two types of TLD, gTLD (Generic Top Level) and ccTLD (Country Code Top Level Domain). Historically a gTLD was meant to
tell the user the domain name's purpose; for example, a .com would be for
commercial purposes, .org for an organisation, .edu for education and .gov for government. And a ccTLD was
used for geographical purposes, for example, .ca for sites based in Canada,
.co.uk for sites based in the United Kingdom and so on. Due to such demand,
there is an influx of new gTLDs ranging from .online , .club , .website , .biz
and so many more. For a full list of over 2000 TLDs click here.
Taking google.com as an example, the .com part is the TLD,
and google is the Second Level Domain. When registering a domain name, the
second-level domain is limited to 63 characters + the TLD and can only use a-z
0-9 and hyphens (cannot start or end with hyphens or have consecutive
hyphens).
Subdomain
A
subdomain sits on the left-hand side of the Second-Level Domain
using a period to separate it; for example, in the name admin.google.com the
admin part is the subdomain. A subdomain name has the same creation
restrictions as a Second-Level Domain, being limited to 63 characters and can
only use a-z 0-9 and hyphens (cannot start or end with hyphens or have consecutive hyphens). You can use multiple subdomains split with periods to create longer names,
such as jupiter.servers.google.com. But the maximum length must be kept
below 253 characters. There is no limit to the number of subdomains you
can create for your domain name.
Root Domain "."
TLD .edu .org .gov .com
Second Level Domain mit, hackingtruth, usa, google, nasa, army etc
1) What is the maximum length of a subdomain?
Ans :- 63
2) Which of the following characters cannot be used in a subdomain (
3 b _ - )?
Ans :- _
3) What is the maximum length of a domain name?
Ans :- 253
4) What type of TLD is .co.uk?
Ans :- ccTLD
Record Types
DNS Record Types
DNS isn't just for websites
though, and multiple types of DNS record exist. We'll go over some of the most
common ones that you're likely to come across.
A Record
These records resolve to IPv4 addresses, for example
104.26.10.229
AAAA Record
These
records resolve to IPv6 addresses, for example 2606:4700:20::681a:be5
CNAME Record
These records resolve to another domain name, for example,
google's online shop has the subdomain name store.google.com which returns a
CNAME record shops.shopify.com. Another DNS request would then be made to
shops.shopify.com to work out the IP address.
MX Record
These records resolve to the address of the servers that handle
the email for the domain you are querying, for example an MX record response
for google.com would look something like alt1.aspmx.l.google.com. These
records also come with a priority flag. This tells the client in which order
to try the servers, this is perfect for if the main server goes down and email
needs to be sent to a backup server.
TXT Record
TXT records are free text fields where any text-based data can be
stored. TXT records have multiple uses, but some common ones can be to list
servers that have the authority to send an email on behalf of the domain (this
can help in the battle against spam and spoofed email). They can also be used
to verify ownership of the domain name when signing up for third party
services. What type of record would be used to advise where to send
email?
1) What type of record would be used to advise where to send email?
Ans :- MX
2) What type of record handles IPv6 addresses?
Ans :- AAAA
Making A Request
What happens when you make a DNS request
1) When you request a domain name, your computer first checks its local cache to
see if you've previously looked up the address recently; if not, a request to
your Recursive DNS Server will be made.
2) A
Recursive DNS Server is usually provided by your ISP, but you
can also choose your own. This server also has a local cache of recently
looked up domain names. If a result is found locally, this is sent back to
your computer, and your request ends here (this is common for popular and
heavily requested services such as Google, Facebook, Twitter). If the request
cannot be found locally, a journey begins to find the correct answer, starting
with the internet's root DNS servers.
3) The root servers act as the DNS backbone of the
internet; their job is to redirect you to the correct Top Level Domain Server,
depending on your request. If, for example, you request www.google.com, the
root server will recognise the Top Level Domain of .com and refer you to the
correct TLD server that deals with .com addresses.
4) The TLD server holds records for where to find the
authoritative server to answer the DNS request. The authoritative server is
often also known as the nameserver for the domain. For example, the name
server for google.com is kip.ns.cloudflare.com and
uma.ns.cloudflare.com. You'll often find multiple nameservers for a
domain name to act as a backup in case one goes down.
5) An authoritative DNS server is the server that is responsible for storing the DNS records for a
particular domain name and where any updates to your domain name DNS records
would be made. Depending on the record type, the DNS record is then sent back
to the Recursive DNS Server, where a local copy will be cached for future
requests and then relayed back to the original client that made the request.
DNS records all come with a TTL (Time To Live) value. This value is a number
represented in seconds that the response should be saved for locally until you
have to look it up again. Caching saves on having to make a DNS request every
time you communicate with a server.
1) What field specifies how long a DNS record should be cached for?
Ans :- TTL
2) What type of DNS Server is usually provided by your ISP?
Ans :- recursive
3) What type of server holds all the records for a domain?
Ans :- authoritative
Disclaimer
This was written for educational purpose and pentest only. The author
will not be responsible for any damage ..! The author of this tool is not
responsible for any misuse of the information. You will not misuse the
information to gain unauthorized access. This information shall only be
used to expand knowledge and not for causing malicious or damaging
attacks. Performing any hacks without written permission is illegal ..!
All
video’s and tutorials are for informational and educational purposes only. We
believe that ethical hacking, information security and cyber security should
be familiar subjects to anyone using digital information and computers. We
believe that it is impossible to defend yourself from hackers without knowing
how hacking is done. The tutorials and videos provided on www.hackingtruth.in
is only for those who are interested to learn about Ethical Hacking, Security,
Penetration Testing and malware analysis. Hacking tutorials is against misuse
of the information and we strongly suggest against it. Please regard the word
hacking as ethical hacking or penetration testing every time this word is
used.
All tutorials and videos have been made using our own
routers, servers, websites and other resources, they do not contain any
illegal activity. We do not promote, encourage, support or excite any illegal
activity or hacking without written permission in general. We want to raise
security awareness and inform our readers on how to prevent themselves from
being a victim of hackers. If you plan to use the information for illegal
purposes, please leave this website now. We cannot be held responsible for any
misuse of the given information.
- Hacking Truth by
Kumar Atul Jaiswal
I hope you liked this post, then you
should not forget to share this post at all. Thank you so much :-)
What is Port Forwarding | use of ngrok | Access localhost website from outside network
In computer networking, port forwarding or port mapping is an application of network address translation (NAT) that redirects a communication request from one address and port number combination to another while the packets are traversing a network gateway, such as a router or firewall. This technique is most commonly used to make services on a host residing on a protected or masqueraded (internal) network available to hosts on the opposite side of the gateway (external network), by remapping the destination IP address and port number of the communication to an internal host.
Port forwarding allows remote computers (for example, computers on the Internet) to connect to a specific computer or service within a private local-area network (LAN).[3]
In a typical residential network, nodes obtain Internet access through a DSL or cable modem connected to a router or network address translator (NAT/NAPT). Hosts on the private network are connected to an Ethernet switch or communicate via a wireless LAN. The NAT device's external interface is configured with a public IP address. The computers behind the router, on the other hand, are invisible to hosts on the Internet as they each communicate only with a private IP address. What is Port Forwarding ? use of ngrok ? Access localhost website from outside network
When configuring port forwarding, the network administrator sets aside one port number on the gateway for the exclusive use of communicating with a service in the private network, located on a specific host. External hosts must know this port number and the address of the gateway to communicate with the network-internal service. Often, the port numbers of well-known Internet services, such as port number 80 for web services (HTTP), are used in port forwarding, so that common Internet services may be implemented on hosts within private networks.
Typical applications include the following:
Running a public HTTP server within a private LAN
Permitting Secure Shell access to a host on the private LAN from the Internet
Permitting FTP access to a host on a private LAN from the Internet
Running a publicly available game server within a private LAN
Administrators configure port forwarding in the gateway's operating system. In Linux kernels, this is achieved by packet filter rules in the iptables or netfilter kernel components. BSD and macOS operating systems prior to Yosemite (OS 10.10.X) implement it in the Ipfirewall (ipfw) module while macOS operating systems beginning with Yosemite implement it in the Packet Filter (pf) module.
When used on gateway devices, a port forward may be implemented with a single rule to translate the destination address and port. (On Linux kernels, this is DNAT rule). The source address and port are, in this case, left unchanged. When used on machines that are not the default gateway of the network, the source address must be changed to be the address of the translating machine, or packets will bypass the translator and the connection will fail.
When a port forward is implemented by a proxy process (such as on application layer firewalls, SOCKS based firewalls, or via TCP circuit proxies), then no packets are actually translated, only data is proxied. This usually results in the source address (and port number) being changed to that of the proxy machine.
Usually only one of the private hosts can use a specific forwarded port at one time, but configuration is sometimes possible to differentiate access by the originating host's source address.
Unix-like operating systems sometimes use port forwarding where port numbers smaller than 1024 can only be created by software running as the root user. Running with superuser privileges (in order to bind the port) may be a security risk to the host, therefore port forwarding is used to redirect a low-numbered port to another high-numbered port, so that application software may execute as a common operating system user with reduced privileges.
The Universal Plug and Play protocol (UPnP) provides a feature to automatically install instances of port forwarding in residential Internet gateways. UPnP defines the Internet Gateway Device Protocol (IGD) which is a network service by which an Internet gateway advertises its presence on a private network via the Simple Service Discovery Protocol (SSDP). An application that provides an Internet-based service may discover such gateways and use the UPnP IGD protocol to reserve a port number on the gateway and cause the gateway to forward packets to its listening socket.
Types of port forwarding
Port forwarding can be divided into the following specific types: local, remote, and dynamic port forwarding.
Local port forwarding
Local port forwarding is the most common type of port forwarding. It is used to let a user connect from the local computer to another server, i.e. forward data securely from another client application running on the same computer as a Secure Shell (SSH) client. By using local port forwarding, firewalls that block certain web pages are able to be bypassed.
Remote port forwarding
This form of port forwarding enables applications on the server side of a Secure Shell (SSH) connection to access services residing on the SSH's client side.[8] In addition to SSH, there are proprietary tunnelling schemes that utilize remote port forwarding for the same general purpose.[9] In other words, remote port forwarding lets users connect from the server side of a tunnel, SSH or another, to a remote network service located at the tunnel's client side.
To use remote port forwarding, the address of the destination server (on the tunnel's client side) and two port numbers must be known. The port numbers chosen depend on which application is to be used.
Remote port forwarding allows other computers to access applications hosted on remote servers. Two examples:
An employee of a company hosts an FTP server at their own home and wants to give access to the FTP service to employees using computers in the workplace. In order to do this, an employee can set up remote port forwarding through SSH on the company's internal computers by including their FTP server’s address and using the correct port numbers for FTP (standard FTP port is TCP/21).
Opening remote desktop sessions is a common use of remote port forwarding. Through SSH, this can be accomplished by opening the virtual network computing port (5900) and including the destination computer’s address.
Dynamic port forwarding
Dynamic port forwarding (DPF) is an on-demand method of traversing a firewall or NAT through the use of firewall pinholes. The goal is to enable clients to connect securely to a trusted server that acts as an intermediary for the purpose of sending/receiving data to one or many destination servers.[11]
DPF can be implemented by setting up a local application, such as SSH, as a SOCKS proxy server, which can be used to process data transmissions through the network or over the Internet. Programs, such as web browsers, must be configured individually to direct traffic through the proxy, which acts as a secure tunnel to another server. Once the proxy is no longer needed, the programs must be reconfigured to their original settings. Because of the manual requirements of DPF, it is not often used.
Once the connection is established, DPF can be used to provide additional security for a user connected to an untrusted network. Since data must pass through the secure tunnel to another server before being forwarded to its original destination, the user is protected from packet sniffing that may occur on the LAN.
DPF is a powerful tool with many uses; for example, a user connected to the Internet through a coffee shop, hotel, or otherwise minimally secure network may wish to use DPF as a way of protecting data. DPF can also be used to bypass firewalls that restrict access to outside websites, such as in corporate networks.
How to use Ngrok for Access outside Network ?
1) first we need a localhost server such as hosting provider or need a web address to access the outside network ( For eg Ngrok )
3) First, download the ngrok client, a single binary with zero run-time dependencies. you can downloa for MAC OS X, Windows, Mac (32bit), Windows (32-bit), Linux (ARM), Linux (ARM64), Linux (32-bit), FreeBSD (64-Bit), FreeBSD (32-bit)...
4) On Linux or OSX you can unzip ngrok from a terminal with the following command. On Windows, just double click ngrok.zip.
$ unzip /path/to/ngrok.zip
Most people like to keep ngrok in their primary user folder or set an alias for easy command-line access.
5) Try it out by running it from the command line:
./ngrok help
6) To start a HTTP tunnel on port 80, run this next:
./ngrok http 80
OR
ngrok http -subdomain=baz 8080
OR
ngrok http foo.dev:80
OR
ngrok http https://localhost
OR
ngrok tcp 22
How To Access website from Outside Network ?
Type the following command and press enter :-
1) serivce apache2 start
otherwise i have already download and install external apache server ( XAMPP Server )
For chech a service status , it's a start or not
service apache2 start
then we have ready to access our localhost website via inside and outside network ( internet )
Now, we have to copy a ngrok's link
https://ab5ac26e3592.ngrok.io
Then access
Through Mobile
----------------
Disclaimer
This was written for educational purpose and pentest only.
The author will not be responsible for any damage ..!
The author of this tool is not responsible for any misuse of the information.
You will not misuse the information to gain unauthorized access.
This information shall only be used to expand knowledge and not for causing malicious or damaging attacks. Performing any hacks without written permission is illegal ..!
All
video’s and tutorials are for informational and educational purposes
only. We believe that ethical hacking, information security and cyber
security should be familiar subjects to anyone using digital information
and computers. We believe that it is impossible to defend yourself from
hackers without knowing how hacking is done. The tutorials and videos
provided on www.hackingtruth.in is
only for those who are interested to learn about Ethical Hacking,
Security, Penetration Testing and malware analysis. Hacking tutorials is
against misuse of the
information and we strongly suggest against it. Please regard the word
hacking as ethical hacking or penetration testing every time this word
is used.
All tutorials and videos have been
made using our own routers, servers, websites and other resources, they
do not contain any illegal activity. We do not promote, encourage,
support or excite any illegal activity or hacking without written
permission in general. We want to raise security awareness and inform
our readers on how to prevent themselves from being a victim of hackers.
If you plan to use the information for illegal purposes, please leave
this website now. We cannot be held responsible for any misuse of the
given information.
- Hacking Truth by Kumar Atul Jaiswal
Video Tutorial :-
I hope you liked this post, then you should not forget to share this post at all.
Thank you so much :-)
One of the easiest way for cyber criminals to hack into internet users’ accounts is to crack their
passwords. Quite often people — out of ignorance or laziness — tend to keep passwords that are easy to guess.
One of the easiest way for cyber criminals to hack into internet users’ accounts is to crack their
passwords. Quite often people — out of ignorance or laziness — tend to keep passwords that are easy to guess. However, what they forget is that these passwords are also easy to hack and crack. Top 30 worst passwords in 2020 According to a recent research by cyber security firm ImmuniWeb, out of 21 million “credentials belonging to Fortune 500 companies, about 16 million were compromised” during the last one year. The research firm further found that just 4.9 million out the 21 million passwords were unique. In other words, a vast chunk of them were easy to hack. Of these millions of passwords, there are 32 that are most-commonly used. These 32 passwords appear in almost all hacker lists across industries. So, here are these 32 passwords that you should stop using right now if you want to protect your account from hackers. Top 30 worst passwords in 2019
The top 30 most common passwords were:
0000000
111111
112233
123456
12345678
123456789
1qaz2wsx
3154061
456a33
3366936455
798_234
aaaaaa
abc13
career121
comedy
cheer
cheezy
exigent
old123ma
opensesame
pass
passer
qwerty
passwOrd
password1
snowman
!qaz1qaz
soccer1
welcome
😂😂😂😂😂😂
iloveyou***
"iloveyou" just missed out on the top 10, while "monkey" and "dragon" made surprise appearances in the top 20. Plenty of users also used passwords as an opportunity to employ a colorful array of swear words.
Popular brand names were also chosen, such as cocacola, snickers, mercedes, skittles, mustang, and playboy. MySpace and LinkedIn were also common choices, alarmingly, to secure accounts on those sites.
Bands and movie references were often used, with Spiderman, superman, starwars, and pokemon all common choices as were expressions of frustration – a**hole, bull****, and f***you were often chosen.
What Makes a Good Password?
A good password will not be in the dictionary, will not use sequential numbers or be created by walking fingers along a keyboard. Brand names and locations should also be avoided. Passwords should be a minimum of 8 characters and should be unique – never used before by the user, and never reused on a different platform.
Passwords should include at least one capital letter, lowercase letter, symbol and number. If all lowercase letters are used, each letter in the password could be one of 26 letters. Add in capitals and the possible options double to 52. There are 10 digits, increasing the options to 62, and let’s say 32 special characters, bringing the total up to 94 options. With so many options and possible combinations, randomly generated passwords are particularly difficult to guess. However, randomly generated passwords are also particularly difficult to remember.
Recently, that problem has been recognized by the National Institute of Standards and Technology (NIST), which has revised its advice on passwords (See special publication 800-63B).
While the use of random strings of characters and symbols makes passwords particularly difficult to guess and more resilient to hackers’ brute force password guessing tactics, end users have trouble remembering their passwords and that leads to particularly risky behaviors such as writing the password down or storing it in a browser.
View kumar atul jaiswal's profile on LinkedIn, the world's largest professional community. kumar atul has 2 jobs listed on their profile. See the complete profile on LinkedIn and discover kumar atul's connections and jobs at similar companies.
For enquiries you can contact us in several different ways. Contact details are below.
Hacking Truth.in
Street :Road Street 00
Person :Person
Phone :+045 123 755 755
Country :POLAND
Email :contact@heaven.com
Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.
Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation.