-->

ABOUT US

Our development agency is committed to providing you the best service.

OUR TEAM

The awesome people behind our brand ... and their life motto.

  • Kumar Atul Jaiswal

    Ethical Hacker

    Hacking is a Speed of Innovation And Technology with Romance.

  • Kumar Atul Jaiswal

    CEO Of Hacking Truth

    Loopholes are every major Security,Just need to Understand it well.

  • Kumar Atul Jaiswal

    Web Developer

    Techonology is the best way to Change Everything, like Mindset Goal.

OUR SKILLS

We pride ourselves with strong, flexible and top notch skills.

Marketing

Development 90%
Design 80%
Marketing 70%

Websites

Development 90%
Design 80%
Marketing 70%

PR

Development 90%
Design 80%
Marketing 70%

ACHIEVEMENTS

We help our clients integrate, analyze, and use their data to improve their business.

150

GREAT PROJECTS

300

HAPPY CLIENTS

650

COFFEES DRUNK

1568

FACEBOOK LIKES

STRATEGY & CREATIVITY

Phasellus iaculis dolor nec urna nullam. Vivamus mattis blandit porttitor nullam.

PORTFOLIO

We pride ourselves on bringing a fresh perspective and effective marketing to each project.

Showing posts with label decryption. Show all posts
Showing posts with label decryption. Show all posts
  • TryHackMe Cryptography for dummies

     


     



    The platform develops virtual classrooms that not only allow users to deploy training environments with the click of a button, but also reinforce learning by adding a question-answer approach. Its a comfortable experience to learn using pre-designed courses which include virtual machines (VM) hosted in the cloud.

    TryHackMe Cryptography for dummies


    While using a question-answer model does make learning easier, TryHackMe allows users to create their own virtual classrooms to teach particular topics enabling them to become teachers. This not only provides other users with rich and varied content, but also helps creators reinforce their understanding of fundamental concepts.



    Room :- https://tryhackme.com/room/cryptographyfordummies




    Cryptography is a big topic. We are going to cover the basics, to give you a basic understanding.

    It is used by a wide range of applications, almost everywhere in the internet.



    Why we need cryptography?


    Without encryption communications over the internet will be very insecure, and it would be very easy for someone to see your data. Fortunately this isn't true, and almost all of the data you get/send over the internet is encrypted and cannot be seen in plain text by someone who got access to it. Now let's look into cryptography in more detail.


    I understand why cryptography is important!









    Task 2 Types of cryptography



    There are two types of cryptography :

    • Symmetric
    • Asymmetric




    What is symmetric cryptography?


    Let's say Alice wants to send message to Bob, but she doesn't want to send the message in plain text because anyone can read it.

    She  has a recipe how to mess up the letters in a way that no one can understand what it means(that is called encryption). Bob has the same recipe but he uses it to order them so it will become readable again(that is called decryption), and he will understand what Alice wrote. The recipe in cryptography is called a key.  In symmetric cryptography both users have the same key to encrypt and decrypt the messages.



    What is asymmetric cryptography?


    In asymmetric cryptography the encryption and decryption keys are different. The encryption key can be used only for encryption, not for decryption and vice versa. The encryption key is called Public key and the decryption key is called Private key.



    Why is asymmetric cryptography used?


    Well..because it's more secure! If you are using symmetric cryptography and someone takes your key he can encrypt and decrypt messages that you send. While in asymmetric cryptography he can't decrypt the messages you encrypted with the public key. Only the holder of the Private key can decrypt them. Let's give an example :

    Alice wants to talk to Google

    Google gives Alice the Public key.

    Alice encrypts her message with the public key and sends it to Google.

    Google decrypts the message with his private key and sends back what Alice wanted.

    And that's how the conversation goes...




    Note : Symmetric cryptography is faster than asymmetric, but asymmetric is more secure.

    Now let's see what you've learned!



    1) What type of cryptography is more secure?

    Ans :- Asymmetric



    2) What type of cryptography is faster?


    Ans :- Symmetric



    3) What type of cryptography will a Bank site use?


    Ans :- Asymmetric



    4) What will you use to encrypt your messages in asymmetric cryptography?


    Ans :- public



    5) What will you use to decrypt messages in asymmetric cryptography?


    Ans :- private



    6) Does symmetric cryptography use two different keys for encryption/decryption? (aye/nay)

    Ans :- Nay





    Task 3 What is a hash?



    Hashes are a long strings of letters and numbers generated by hashing algorithms. They take plain text and make it a hash.

    The important thing about hashes is that they are not reversible. There's no way to decrypt/decode a hash.

    Popular hashing algorithms are : MD5 (Message Digest 5) and SHA (Secure Hash Algorithm).

    That's how the word "hello" looks as MD5 hash : 5d41402abc4b2a76b9719d911017c592




    What are hashes used for?



    The most popular use of hashes is for file identification and storing sensitive data, like passwords. When you create an account on a website your password is converted to hash and this hash is stored in the server's database. So when you login the password that you type in will be converted to a hash, the server will take it and compare it with the hash in it's database, if it's the same that means your password is correct and the server will let you in.


    MD5 hashes are also used to ensure the data integrity of files. Because the MD5 hashing algorithm always produces the same output for the same given input, it can be used to compare a hash of the source file with a newly created hash of the destination file to check that it is intact and unmodified.


    There are plenty of other hashing algorithms out there, but this room is intended for beginners so we're not going to cover them here.





    1) What's the MD5 hash of "hashes are cool"?


    Ans :- f762d32e3c160900d94b683e927555b9


    2) What does MD5 stand for?


    Ans :- Message Digest 5


    3) created MD5?


    Ans :- Ronald Rivest





    Task 4 Decoding/encoding



    There's difference between encoding and encrypting. Let's say you have an encrypted file, the only way to decrypt it is using key. While encoded data can be decoded immediately, without keys. It's NOT a form of encryption, it just a way of representing data.

    A very popular encoding is Base64. Here's how "hi there" looks with Base64 encoding : aGkgdGhlcmU=



    1) Encode the string "cryptographyisuseful" with Base64

    Ans :- Y3J5cHRvZ3JhcGh5aXN1c2VmdWw=


    2) Decode the string "dGhlIHNlY3JldCB3b3JkIGlzIDogd2F0ZXJtZWxvbg==". What's the secret word?

    Ans :- watermelon







    Disclaimer

     

    This was written for educational purpose and pentest only.
    The author will not be responsible for any damage ..!
    The author of this tool is not responsible for any misuse of the information.
    You will not misuse the information to gain unauthorized access.
    This information shall only be used to expand knowledge and not for causing  malicious or damaging attacks. Performing any hacks without written permission is illegal ..!


    All video’s and tutorials are for informational and educational purposes only. We believe that ethical hacking, information security and cyber security should be familiar subjects to anyone using digital information and computers. We believe that it is impossible to defend yourself from hackers without knowing how hacking is done. The tutorials and videos provided on www.hackingtruth.in is only for those who are interested to learn about Ethical Hacking, Security, Penetration Testing and malware analysis. Hacking tutorials is against misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used.


    All tutorials and videos have been made using our own routers, servers, websites and other resources, they do not contain any illegal activity. We do not promote, encourage, support or excite any illegal activity or hacking without written permission in general. We want to raise security awareness and inform our readers on how to prevent themselves from being a victim of hackers. If you plan to use the information for illegal purposes, please leave this website now. We cannot be held responsible for any misuse of the given information.



    - Hacking Truth by Kumar Atul Jaiswal



    I hope you liked this post, then you should not forget to share this post at all.
    Thank you so much :-)



  • Bluetooth के जरिए हैक हो सकता है iPhone और Android स्मार्टफोन

    Bluetooth के जरिए हैक हो सकता है iPhone और Android स्मार्टफोन, जल्द करें अपडेट


    search me on google  kumar Atul jaiswal
    Kumar Atul Jaiswal


    अगर आप चाहते हैं कि कोई आपका पर्सनल मैसेज न पढ़े या फिर आपका फोन हैक न करे तो जल्द से जल्द अपने आईफोन और एंड्रॉयड डिवाइस को अपडेट कर लें. क्योंकि एक वायरस स्मार्टफोन के ब्लूटूथ को प्रभावित कर रहा है जिससे कई लाखों स्मार्टफोन साइबर क्रिमिनल्स की पहुंच में है.


    CERT एक अमेरिका की कंप्यूटर इमेरजेंसी टीम है जिसका मानना है कि अगर एपल, गूगल, इंटेल जैसे डिवाइस के हार्डवेयर को अपडेट नहीं किया गया तो इनके हैक होने का खतरा सबसे ज्यादा है.  रिपोर्ट में इस बात की भी जानकारी दी गई है कि जब एक डिवाइस किसी दूसरे डिवाइस से ब्लूटूथ के जरिए कनेक्ट होता है और फाइल को शेयर या ट्रांसफर किया जाता तब डिवाइस के हैक होने का खतरा सबसे ज्यादा होता है.


    इसकी जानकारी तब मिली जब पता चला कि डेटा शेयर करते समय एक 'की' (चाबी) खो गई है जो डिफ्फी हेल्लमैन की एक्सचेंज में मौजूद नहीं थी. लेकिन ब्लूटूथ स्टैंटर्ड के हिसाब से इस चाबी की जरूरत किसी को नहीं है जिसकी वजह से हैकर्स के लिए ये एक खुला मैदान है जहां वो आपके डिवाइस को हैक कर आपकी सारी जानकारी ले सकते हैं.


    क्या है Diffie-Hellman (ECDH) key exchange?



    ये एक ऐसा चैनल होता है जो दो पार्टियों यानी की दो डिवाइस के पास ये अधिकार होता है कि वो एक प्राइवेट चैनल यानी की ब्लूटूथ की मदद से फाइल और डेटा शेयर कर सकते हैं. इसे हम KEY यानी की चाबी के नाम से जानते हैं.


    इस जानकारी के बाद अब कंपनियां अपनी सिक्योरिटी पैच को फिक्स करने में जुट गई है. एपल में पहले ही MacOS को अपडेट कर दिया है तो वहीं आईफोन के लिए iOS 11.4 को भी अपडेट कर दिया है. इंटेल की अगर बात करें तो कंपनी ने विंडोज 7, 8.1 और 10 के ब्लूटूथ ड्राइवर्स को अपडेट कर दिया है.


    गूगल की अगर बात करें तो कंपनी ने कहा है कि हैकर्स को देखते हुए हमने भी क्रोमOS और एंड्रॉयड को अपडेट करना शुरू कर दिया है. तो अगर आपने भी अभी तक अपना स्मार्टफोन नए वर्जन में अपडेट नहीं किया है तो कर लें क्योंकि ब्लूटूथ शेयरिंग के दौरान ज्यादा संभावना है कि आपका डिवाइस हैक हो सकता है.


  • WHAT WE DO

    We've been developing corporate tailored services for clients for 30 years.

    CONTACT US

    For enquiries you can contact us in several different ways. Contact details are below.

    Hacking Truth.in

    • Street :Road Street 00
    • Person :Person
    • Phone :+045 123 755 755
    • Country :POLAND
    • Email :contact@heaven.com

    Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

    Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation.