-->

ABOUT US

Our development agency is committed to providing you the best service.

OUR TEAM

The awesome people behind our brand ... and their life motto.

  • Kumar Atul Jaiswal

    Ethical Hacker

    Hacking is a Speed of Innovation And Technology with Romance.

  • Kumar Atul Jaiswal

    CEO Of Hacking Truth

    Loopholes are every major Security,Just need to Understand it well.

  • Kumar Atul Jaiswal

    Web Developer

    Techonology is the best way to Change Everything, like Mindset Goal.

OUR SKILLS

We pride ourselves with strong, flexible and top notch skills.

Marketing

Development 90%
Design 80%
Marketing 70%

Websites

Development 90%
Design 80%
Marketing 70%

PR

Development 90%
Design 80%
Marketing 70%

ACHIEVEMENTS

We help our clients integrate, analyze, and use their data to improve their business.

150

GREAT PROJECTS

300

HAPPY CLIENTS

650

COFFEES DRUNK

1568

FACEBOOK LIKES

STRATEGY & CREATIVITY

Phasellus iaculis dolor nec urna nullam. Vivamus mattis blandit porttitor nullam.

PORTFOLIO

We pride ourselves on bringing a fresh perspective and effective marketing to each project.

Showing posts with label cyber security. Show all posts
Showing posts with label cyber security. Show all posts
  • top 5 linux command for beginners


    top 5 linux command for beginners




    As data sets are getting larger and more prevalent, researchers are having to try to to tons of leg add reference to core programming - resulting in longer spent with tools like GIT and Kali Linux (something we have seen Hardly done before!).

    For software engineers reading this post: you would possibly not find the subsequent useful, but as someone who has been through those early self-taught days as a junior researcher, i might like to see data scientists or ML researchers Feeling of budding pain!

    Looking at all of that, i assumed about what commands i exploit daily and in my routine and which commands I wanted to understand beforehand. So from this, i'm now presenting my top 5 Kali Linux commands which have helped me reach the highest of my career! top 5 linux command for beginners


    Command 1: grep


    grep sounds like the noise frogs make, but actually it stands for Global regular expression print. That long phrase doesn’t make much sense outright, but the essential use case for the grep command is to search for a particular string in a given file.



    The function is fairly quick and incredibly helpful when you’re trying to diagnose an issue on your production box, in which for example, you may think a TXT file has some bad data.



    As an example, say we’re searching for the string 'this’ in any file which begins with the name 'demo_’:


    $ grep "this" demo_*
    demo_file:this line is the 1st lower case line in this file.
    demo_file:Two lines above this line is empty.
    demo_file:And this is the last line.
    demo_file1:this line is the 1st lower case line in this file.
    demo_file1:Two lines above this line is empty.
    demo_file1:And this is the last line.


    Not so bad huh? We can see on the left hand side that there are two files that begin with demo (demo_file and demo_file1)





    Command 2: wget


    Now we move onto something a little bit more sophisticated but still something we use quite a lot. The wget command is a useful utility used to download files from the internet. It runs in the background so can be used in scripts and cron jobs.

    To utility is called as follows:


    wget <URL> -O <file_name>

    Where the following is an example if we wanted to download a file:

    wget https://cdn.kernel.org/pub/linux/kernel/v4.x/linux-4.17.2.tar.xz




    Command 3: wc


    Often you have a file of arbitrary length and something smells fishy: maybe the size of the file seems too small for the number of rows you expect or something you’re just curious how many words are in it. Either way, you want to inspect it a bit more and need a command to do so.

    The wc command helps out in that it essentially counts a few different things for the file in reference:


    # wc --help
    Usage: wc [OPTION]... [FILE]...
      -c, --bytes            print the byte counts
      -m, --chars            print the character counts
      -l, --lines            print the newline counts
      -L, --max-line-length  print the length of the longest line
      -w, --words            print the word counts
          --help            display this help and exit
          --version            output version information and exi

    So, say we want to count the number of lines in a file:


    wc -L tecmintt.txt


    16 tecmintt.txt


    or maybe the number of characters:


    wc -m tecmintt.txt


    112 tecmintt.txt


    Awesome!




     

    Command 4: Vi



    The vi command is super helpful as it allows you to open and explore a file. The command works as follows:


    vi [filepath]


    And it takes you into an editor sort of thing. Now in this editor, you can use the following characters to navigate:


    k    Up one line 
    j    Down one line 
    h    Left one character 
    l    Right one character (or use <Spacebar>)
    w    Right one word
    b    Left one word



    However, in reality, you’ll find navigation pretty naturally. The following commands will be the most useful though:



    ZZ     Write (if there were changes), then quit
    :wq    Write, then quit 
    :q     Quit (will only work if file has not been changed) 
    :q!    Quit without saving changes to file


    You’ll learn to love vi, I swear!




     

    Command 5: CTRL+R



    So I’ve saved the best for last as I really use this command quite a lot. CTRL+R isn’t really a command but more a shortcut type of thing. It allows you to search your history of used commands by typing in something which resembles the command, and then similar commands that you’ve used before come up!


    For example, say you’ve just run a really long command and for whatever reason your terminal session breaks and you have to re-run the command again. With this command, you can quickly search for it again instead of reconstructing the command from scratch!


    Let’s say I’m trying to remember a command that begins with hi, but I can’t remember it all. I type in ctrl+r and then I see what it recommends:



    $ historybck-i-search: his_



    Perfect! The command history has been recommended and that’s exactly the
    command we were looking for. If you press tab at this point, the autocomplete fills in the line:



    $ history




    I’ve actually always struggled to use both Linux and GIT but over time, I’ve managed to remember a few key commands that’ve helped my development as an independent researcher. I can work fairly independently now and it’s thanks to the above command line tools that I’m able to so.

    Therefore, I really recommend spending a few hours getting used to linux as the small lessons you take now will really help progress your use of the system going forward. It’s pure upside!




    I hope you liked this post, then you should not forget to share this post at all.
    Thank you so much :-)


  • how to change MAC address with mac changer




    how to change MAC address with mac changer


    MAC (Media Access Control) address spoofing can come useful in many situations. By changing MAC address, one can protect his/her system from system identification bots which look for MAC address to exploit network administrative privileges, fool freely available internet service in order to bypass network access and bandwidth usage restrictions, make system more secure by disguising MAC address or by replacing it with other NICs randomly generated MAC address for security purposes. how to change MAC address with mac changer 


    Sadly, basic network tools are only for changing DHCP settings, switching between different network profiles, ping DNS servers, etc., therefore, you need to use a dedicated tool to change your Network Interface MAC address. Tecnitium MAC address Changer is developed to change your Network Interface Card (NIC) MAC address. You can choose NIC from the given list whose MAC address will replace your original MAC address.





    Technitium MAC Address Changer allows you to change (spoof) Media Access Control (MAC) Address of your Network Interface Card (NIC) instantly. It has a very simple user interface and provides ample information regarding each NIC in the machine. Every NIC has a MAC address hard coded in its circuit by the manufacturer. This hard coded MAC address is used by windows drivers to access Ethernet Network (LAN). This tool can set a new MAC address to your NIC, bypassing the original hard coded MAC address. Technitium MAC Address Changer is a must tool in every security professionals tool box.







    Features



    • Works on Windows 10, 8 & 7 for both 32-bit and 64-bit.
    • Enhanced network configuration presets with IPv6 support allow you to quickly switch between network configurations.
    • Allows complete configuration of any network adapter.
    • Command line options with entire software functionality available. You can select a preset from specified preset file to apply directly.
    • Update network card vendors list feature allows you to download latest vendor data (OUI) from IEEE.org.



    How To Change MAC Address


    1. Starting MAC address changer will list all available network adapters.
    2. Select the adapter you want to change the MAC address. You will get the details of your selection below.
    3. In the Information tab, find the Change MAC Address frame. Enter new MAC address in the field and click Change Now! button. You may even click Random MAC Address button to fill up a randomly selected MAC address from the vendor list available.
    4. To restore the original MAC address of the network adapter, select the adapter, click Restore Original button in the Change MAC Address frame.


    NOTE: This tool cannot change MAC address of Microsoft Network Bridge. Network Bridge will automatically use the original MAC address of the first NIC added into bridge with the first octet of MAC address set to 0x02.




         
    Don't Forget to Subscribe




    Download Technitium MAC Address Changer

    Download All About MAC Address PDF



    I hope you liked this post, then you should not forget to share this post at all.
    Thank you so much :-)



  • HTTP Error code and their meaning


    HTTP Error code and their meaning


    HTTP Error Codes and their meaning


    Following are the HTTP Error Codes. These Error codes are crucial for troubleshooting various issues with Symantec Endpoint Protection.

    If you can interpret the correct meaning of the http error code, you can decide the places to look at for resolving this issue.

    These status codes indicate a provisional response. The client should be prepared to receive one or more 1xx responses before receiving a regular response.
     



    * 100 - Continue.
    * 101 - Switching protocols.



    2xx :- Success


    This class of status codes indicates that the server successfully accepted the client request.

    * 200 - OK. The client request has succeeded.
    * 201 - Created.
    * 202 - Accepted.
    * 203 - Non-authoritative information.
    * 204 - No content.
    * 205 - Reset content.
    * 206 - Partial content.
    * 207 - Multi-Status (WebDay).



    3xx :- Redirection


    The client browser must take more action to fulfill the request. For example, the browser may have to request a different page on the server or repeat the request by using a proxy server.

    * 301 - Moved Permanently
    * 302 - Object moved.
    * 304 - Not modified.
    * 307 - Temporary redirect.


    4xx :- Client Sever


    An error occurs, and the client appears to be at fault. For example, the client may request a page that does not exist, or the client may not provide valid authentication information.

    * 400 - Bad request.
    * 401 - Access denied. IIS defines several different 401 errors that indicate a more specific cause of the error. These specific error codes are displayed in the browser but are not displayed in the IIS log:
    * 401.1 - Logon failed.
    * 401.2 - Logon failed due to server configuration.
    * 401.3 - Unauthorized due to ACL on resource.
    * 401.4 - Authorization failed by filter.
    * 401.5 - Authorization failed by ISAPI/CGI application.
    * 401.7 – Access denied by URL authorization policy on the Web server. This error code is specific to IIS 6.0.


    403 :- Forbidden 

    IIS defines several different 403 errors that indicate a more specific cause of the error:

    * 403.1 - Execute access forbidden.
    * 403.2 - Read access forbidden.
    * 403.3 - Write access forbidden.
    * 403.4 - SSL required.
    * 403.5 - SSL 128 required.
    * 403.6 - IP address rejected.
    * 403.7 - Client certificate required.
    * 403.8 - Site access denied.
    * 403.9 - Too many users.
    * 403.10 - Invalid configuration.
    * 403.11 - Password change.
    * 403.12 - Mapper denied access.
    * 403.13 - Client certificate revoked.
    * 403.14 - Directory listing denied.
    * 403.15 - Client Access Licenses exceeded.
    * 403.16 - Client certificate is untrusted or invalid.
    * 403.17 - Client certificate has expired or is not yet valid.
    * 403.18 - Cannot execute requested URL in the current application pool. This error code is specific to IIS 6.0.
    * 403.19 - Cannot execute CGIs for the client in this application pool. This error code is specific to IIS 6.0.
    * 403.20 - Passport logon failed. This error code is specific to IIS 6.0.


     

    404 :- Not Found


    * 404.0 - (None) – File or directory not found.
    * 404.1 - Web site not accessible on the requested port.
    * 404.2 - Web service extension lockdown policy prevents this request.
    * 404.3 - MIME map policy prevents this request.
    * 405 - HTTP verb used to access this page is not allowed (method not allowed.)
    * 406 - Client browser does not accept the MIME type of the requested page.
    * 407 - Proxy authentication required.
    * 412 - Precondition failed.
    * 413 – Request entity too large.
    * 414 - Request-URI too long.
    * 415 – Unsupported media type.
    * 416 – Requested range not satisfiable.
    * 417 – Execution failed.
    * 423 – Locked error.



    5xx Server Error


    The server cannot complete the request because it encounters an error.


    * 500 - Internal server error.
    * 500.12 - Application is busy restarting on the Web server.
    * 500.13 - Web server is too busy.
    * 500.15 - Direct requests for Global.asa are not allowed.
    * 500.16 – UNC authorization credentials incorrect. This error code is specific to IIS 6.0.
    * 500.18 – URL authorization store cannot be opened. This error code is specific to IIS 6.0.
    * 500.19 - Data for this file is configured improperly in the metabase.
    * 500.100 - Internal ASP error.
    * 501 - Header values specify a configuration that is not implemented.
    * 502 - Web server received an invalid response while acting as a gateway or proxy.
    * 502.1 - CGI application timeout.
    * 502.2 - Error in CGI application.
    * 503 - Service unavailable. This error code is specific to IIS 6.0.
    * 504 - Gateway timeout.
    * 505 - HTTP version not





    Disclaimer

     

    All tutorials are for informational and educational purposes only and have been made using our own routers, servers, websites and other vulnerable free resources. we do not contain any illegal activity. We believe that ethical hacking, information security and cyber security should be familiar subjects to anyone using digital information and computers. Hacking Truth is against misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used. We do not promote, encourage, support or excite any illegal activity or hacking.


     

  • WHAT WE DO

    We've been developing corporate tailored services for clients for 30 years.

    CONTACT US

    For enquiries you can contact us in several different ways. Contact details are below.

    Hacking Truth.in

    • Street :Road Street 00
    • Person :Person
    • Phone :+045 123 755 755
    • Country :POLAND
    • Email :contact@heaven.com

    Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

    Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation.