Tuesday, 8 January 2019

Type of Viruses

Internet security background

Resident Virus
Resident viruses live in your RAM memory. It can interfere with normal system operation which can lead to the corruption of files and programs. The most popular examples of resident viruses are CMJ, Meve, MrKlunky, and Randex.

Multipartite Virus
This type of virus can easily spread in your computer system. It is very infectious, performing unauthorized actions in your operating system, in folders, and other programs on the computer. They have the ability to infect both the executable files and the boots sector.

Direct Action Virus
Direct action viruses attack certain types of files, typically .exe and .com files. The main purpose of this virus is to replicate and infect files in folders. On the lighter note, they do not typically delete files or affect PC performance and speed. It can be easily removed by antivirus programs.

Browser Hijacker
This type of virus infects your web browser in which it will bring you to different websites. Typically, if you key in a domain name in the internet address bar, the browser hijacker will open multiple fake websites that may harm your computer. On the other hand, most trusted browsers have built-in features to block them ahead.

Overwrite Virus
From the name itself, this virus overwrites the content of a file, losing the original content. It infects folders, files, and even programs. To delete this virus, you also need to get rid of your file. Thus, it is important to back up your data.

Web Scripting Virus
This virus lives in certain links, ads, image placement, videos, and layout of a website. These may carry malicious codes in which when you click, the viruses will be automatically downloaded or will direct you to malicious websites.

Boot Sector Virus
Boot sector viruses affect floppy disks. They came to existence when floppy disks are important in booting a computer. Although they are not very common today, it is still causing other computer units, especially the outdated ones. Some examples include Polyboot.B and AntiEXE.

Macro Virus
Macro viruses target applications and software that contain macros. These viruses can carry out series of operations affecting the performance of the program or software. Some examples of macro viruses are O97M/Y2K, Bablas, Melissa.A, and Relax.

Directory Virus
Directory viruses change file paths. When you run programs and software that are infected with directory viruses, the virus program also runs in the background. Further, it may be difficult for you to locate the original app or software once infected with directory viruses.

Polymorphic Virus
Polymorphic viruses use a special method of encoding or encryption every time they infect a system. With this, antivirus software finds it hard to locate then using signature searches. They are also capable of replicating easily. Polymorphic viruses include Satan Bug, Elkern, Tuareg, and Marburg.

File Infector Virus
This virus also infects executable files or programs. When you run these programs, the file infector virus is activated as well which can slow down the program and produce other damaging effects. A large block of existing viruses belongs to this category.

Encrypted Virus
This type of virus uses encrypted malicious codes which make antivirus software hard to detect them. They can only be detected when they decrypt themselves during replication. Although they don’t delete files or folders, they can badly affect PC performance.

Companion Virus
This is a type of virus that doesn’t survive without accompanying an existing file or folder. In order to carry out damages, the file or folder being accompanied by companion viruses should be opened or run. Some examples of companion viruses include Terrax.1069, Stator, and Asimov.1539.

Network Virus
Basically, this type of virus spreads out through Local Network Area (LAN) and through the internet. These viruses replicate through shared resources, including drives and folders. When network viruses enter a computer, they look for their potential prey. Dangerous network viruses include Nimda and SQLSlammer.

Nonresident Virus
Nonresident viruses replicate through modules. When the module is executed, it will select one or more files to infect.

Stealth Virus
Stealth viruses trick antivirus software by appearing like they are real files or programs and by intercepting its requests to the OS. Some antivirus software cannot detect them. Sometimes, it temporarily removes itself from the system without deletion.

Sparse Infector
Sparse infectors use different techniques to minimize its detection. They are viruses that infect “occasionally”. For example, they may only want to infect a program every tenth execution. Because they are occasional infectors, antivirus software has a hard time detecting them.

Spacefiller Virus
Also known as “cavity” viruses, spacefillers attach themselves to the file and can alter the start of the program or change the encrypted code. They also implement stealth techniques so that users cannot determine the increase the file code. The most popular Spacefiller is the Lehigh virus.

FAT Virus
Basically, this type of virus ruins file allocation system where the information about files, including the location, exist.

Others
Other threats are not technically called as “virus”, but they also have the same damaging effects as viruses. This includes worms, adware, malware, Trojan, and ransomware. To prevent these viruses from affecting your computer, it is important that you install the best and the most competitive antivirus software that can detect, block, and eliminate all types of computer viruses.

Labels: , ,

Saturday, 25 November 2017

Kali Linux 2017.3 Release (Update Now) (New)

Kali 2017.3 Release
Kali Linux 2017.3 is Released, which includes all patches, fixes, updates, and improvements since our last release. In this release, the kernel has been updated to 4.13.10 and it includes some notable improvements :
In addition to the new kernel and all of the updates and fixes we pull from Debian, we have also updated our packages for ReaverPixieWPSBurp SuiteCuckooThe Social Engineering Toolkit, and more. Take a look at the Kali Changelog to see what else has been updated in this release, or read on to see what else is new.

New Tool Additions

Since our last release in September, we’ve added four new tools to the distribution, most of which focus on the always-lucrative open source information gathering. These new tools are not included in the default installation but after an ‘apt update’, you can check out and install the ones that interest you. We, of course, think they’re all interesting and hope you do as well.

InSpy

InSpy is a small but useful utility that performs enumeration on LinkedIn and can find people based on job title, company, or email address.
root@kali:~# apt update && apt -y install inspy

root@kali:~# inspy --empspy /usr/share/inspy/wordlists/title-list-large.txt google

InSpy 2.0.3

2017-11-14 14:04:47 53 Employees identified
2017-11-14 14:04:47 Birkan Cara Product Manager at Google
2017-11-14 14:04:47 Fuller Galipeau Google
2017-11-14 14:04:47 Catalina Alicia Esrat Account Executive at Google
2017-11-14 14:04:47 Coplan Pustell Recruiter at Google
2017-11-14 14:04:47 Kristin Suzanne Lead Recruiter at Google
2017-11-14 14:04:47 Baquero Jahan Executive Director at Google
2017-11-14 14:04:47 Jacquelline Bryan VP, Google and President of Google.org
2017-11-14 14:04:47 Icacan M. de Lange Executive Assistant at Google
...

CherryTree

The oft-requested CherryTree has now been added to Kali for all of your note-taking needs. CherryTree is very easy to use and will be familiar to you if you’ve used any of the “big-name” note organization applications.
root@kali:~# apt update && apt -y install cherrytree
CherryTree

Sublist3r

Sublist3r is a great application that enables you to enumerate subdomains across multiple sources at once. It has integrated the venerable SubBrute, allowing you to also brute force subdomains using a wordlist.
root@kali:~# apt update && apt -y install sublist3r

root@kali:~# sublist3r -d google.com -p 80 -e Bing

                 ____        _     _ _     _   _____
                / ___| _   _| |__ | (_)___| |_|___ / _ __
                \___ \| | | | '_ \| | / __| __| |_ \| '__|
                 ___) | |_| | |_) | | \__ \ |_ ___) | |
                |____/ \__,_|_.__/|_|_|___/\__|____/|_|

                # Coded By Ahmed Aboul-Ela - @aboul3la

[-] Enumerating subdomains now for google.com
[-] Searching now in Bing..
[-] Total Unique Subdomains Found: 46
[-] Start port scan now for the following ports: 80
ads.google.com - Found open ports: 80
 adwords.google.com - Found open ports: 80
analytics.google.com - Found open ports: 80
accounts.google.com - Found open ports: 80
aboutme.google.com - Found open ports: 80
 adssettings.google.com - Found open ports: 80
console.cloud.google.com - Found open ports: 80
...

OSRFramework

Another excellent OSINT tool that has been added to the repos is OSRFramework, a collection of scripts that can enumerate users, domains, and more across over 200 separate services.
root@kali:~# apt update && apt -y install osrframework

root@kali:~# searchfy.py -q "dookie2000ca"

  ___  ____  ____  _____                                            _
 / _ \/ ___||  _ \|  ___| __ __ _ _ __ ___   _____      _____  _ __| | __
| | | \___ \| |_) | |_ | '__/ _` | '_ ` _ \ / _ \ \ /\ / / _ \| '__| |/ /
| |_| |___) |  _ <|  _|| | | (_| | | | | | |  __/\ V  V / (_) | |  |   <
 \___/|____/|_| \_\_|  |_|  \__,_|_| |_| |_|\___| \_/\_/ \___/|_|  |_|\_

                Version:      OSRFramework 0.17.2
                Created by:   Felix Brezo and Yaiza Rubio, (i3visio)



searchfy.py Copyright (C) F. Brezo and Y. Rubio (i3visio) 2014-2017

This program comes with ABSOLUTELY NO WARRANTY. This is free software, and you
are welcome to redistribute it under certain conditions. For additional info,
visit https://www.gnu.org/licenses/agpl-3.0.txt

2017-11-14 14:54:52.535108  Starting search in different platform(s)... Relax!

    Press <Ctrl + C> to stop...

2017-11-14 14:55:04.310148  A summary of the results obtained are listed in the following table:

Sheet Name: Profiles recovered (2017-11-14_14h55m).
+---------------------------------+---------------+------------------+
|           i3visio_uri           | i3visio_alias | i3visio_platform |
+=================================+===============+==================+
| http://github.com/dookie2000ca  | dookie2000ca  | Github           |
+---------------------------------+---------------+------------------+
| http://twitter.com/dookie2000ca | dookie2000ca  | Twitter          |
+---------------------------------+---------------+------------------+

2017-11-14 14:55:04.327954  You can find all the information collected in the following files:
    ./profiles.csv

2017-11-14 14:55:04.328012  Finishing execution...

Total time used:    0:00:11.792904
Average seconds/query:  11.792904 seconds

Did something go wrong? Is a platform reporting false positives? Do you need to
integrate a new one and you don't know how to start? Then, you can always place
an issue in the Github project:
    https://github.com/i3visio/osrframework/issues
Note that otherwise, we won't know about it!

Massive Maltego Metamorphosis

One of our favourite applications in Kali has always been Maltego, the incredible open-source information gathering tool from Paterva, and the equally incredible Casefile. These two applications had always been separate entities (get it?) but as of late September, they are now combined into one amalgamated application that still allows you to run Maltego Community Edition and Casefile, but now it also works for those of you with Maltego Classic or Maltego XL licenses. As always, the tools perform wonderfully and look great doing it.
Maltego Product Selection
Maltego Machine Results

Get the Goods

As usual, OffSec updated  standard ISO images, VMware and VirtualBox virtual machines, ARM images, and cloud instances, all of which can be found via the Kali Downloads page.
and if you like this post please like & share with your friends...

& Don't Forget To....

Follow Us at Twitter : www.twitter.com/thehackingsage

Follow Us at Instagram : www.instagram.com/thehackingsage


Keep Visiting... Enjoy !!! :)

Labels: , , , , , , ,

Wednesday, 2 August 2017

How To Access The Silk Road (Guide) (Only For Educational Purpose)

How To Access The Silk Road 3.0 (Guide) (Only For Educational Purpose) -- THE HACKiNG SAGE

If you’ve heard about darknet markets, you have heard about the Silk Road. From the original Silk Road, which was basically the forefather of the current online black market, to the Silk Road 2, and now Silk Road 3.0 and Silk Road Reloaded, the name has become synonymous with buying drugs on the net.

And that was possibly the downfall of the first and second version. They were so well known and popular, it put a huge bullseye on their back for the law enforcement agencies determined to shut them down.

I’m going to walk you through step-by-step as I set up Tor and my VPN, create an account at Silk Road 3.0, and browse through a market that includes everything from hard drugs, weapons, to access to porn sites.

Note: The Silk Road 3.0 has undergone a massive security upgrade and modified design. The Silk Road 3.0 came back online around the 7th May 2016 after a bit of downtime for these upgrades. This shows how committed the team behind Silk Road are to providing one of the safest and secure darknet markets out there, this downtime would have cost them millions but they did it anyway. This guide Silk Road 3 guide has been updated to cover the new site. Since re-launching, the site has been getting TONS of traffic so have patience when trying to access it because the servers are betting hammered at the moment.

I will also mention certain software tools and methods of doing things in this guide to maximize your anonymity. While navigating your way around the Deep Web and any Darknet Marketplace you should take every precaution you can to keep you internet usage and identity anonymous. Make no mistake about it, ISP’s and government agencies are watching and trying to find you so don’t make it easy for them.

I also want to note that I do not, in any way, encourage you to buy or sell anything illegal on this site, this guide is just so you can cure your curiosity about Silk Road 3.0 and see it for yourself. If you buy or sell illegal items or substances on these such sites it can lead to imprisonment or even bodily harm, be careful and be anonymous.

Ready? Then let’s get started...

The Tools You’ll Need :
  1. START USING A VPN (Virtual Private Network) whenever you use the internet OR Tor. This site I found Here reviews the best VPN’s on the market for Tor. Every computer has what is called an IP address which is broadcast every time you are on the net. This IP address can be traced directly back to your physical location meaning you can be found. You need to use a VPN with Tor to fully hide your identity and location from your ISP and the feds. When you use your VPN and then Tor, your ISP and law enforcement cannot tell you are using Tor and they can’t tell you are on Silk Road 3.0. Without using the VPN then they can tell you are using Tor and then start to log your internet usage and monitor everything that you do. You should really start using a VPN whenever you connect to the net, as your connection will be fully encrypted and hack proof. The government is starting to monitor everything now and they are even starting to subpoena forums such as Reddit for user information that are talking about drugs. If you use a VPN while online then you can fly under the radar and be anonymous, even when downloading your favorite movie or song. In my opinion, this is a must have software tool if you want to be on Silk Road 3.0 or any other Darknet Market.
  2. Close all programs that are running and accessing the internet. This is to prevent a DNS leak. This includes Skype, Dropbox etc.
  3. Start your VPN app.
  4. Now we are going to need Tor browser, also known as “the onion browser”. Not only will this bad boy help us stay relatively safe and anonymous during our trip, it’s the only way to access the “onion” url addresses used by darknet markets – including the Silk Road 3.0 – period. Trying these addresses in any other browser will not work. Here’s the link where you can download the Tor browser: Click Here To Download Tor Browser
  5. Anyways, now you’ve (hopefully) got Tor and a VPN installed. You can either leave the “Run the Tor browser” box checked and have it boot up automatically, or you can find the shortcut on your desktop/Start menu and launch it from there.
  6. We’ll be connecting with the default settings. Give it a minute or two to configure the first time around.
How to Access the Silk Road 3.0 ?

Okay, so now we’re in the Tor browser.
  1. The next step will be to access the site itself. The Silk Road 3.0 onion url is just here: http://reloadedudjtjvxr.onion/ . Remember, the link won’t go anywhere if you’re not using the Tor browser.
  2. Anyways, the first thing you’ll see is a white screen with “continue”. OR a captcha page. If it is the “continue” page then go ahead and click ‘continue’, if it is the captcha then just enter in the captcha code and clicck “submit”.
    captcha
  3. You will then get to the “login” screen with the Silk Road’s signature camel rider logo. Who would have guessed this would be what an online portal to a marketplace filled with hard drugs looks like?If you have an old account then you login.
  4. Once you’ve gotten past your feelings of astonishment, we’ll need to register for an account, if you don’t already have one. See that little button that says ‘register’ in the top of the page? Yeah, that one. Click it.
Silk_Road_3_login_screen
  1. Now, I’ll enter in a username. DON’T USE ANY USERNAME THAT CAN BE LINKED TO YOU! Make sure to use a brand new username that you have never used before that has nothing to do with anything about you. This is one of the easiest ways to compromise your anonymity and give up your identity. You can only use letters and numbers here.
  2. Now for a password. But I’m not telling you that part, of course. The same rules as above apply. You can use any characters on a keyboard, you are not restricted to just letter and numbers.
  3. Now repeat it.
  4. Now make a “Pincode”. You can use any characters on a keyboard, you are not restricted to just letter and numbers.
  5. Now pick your currency. Even though you will be paying for goods in Bitcoin, by entering your currency here you will see the prices also in you own currency so you don’t have to work it out all of the time.
  6. Now enter the capture
  7. Click “Register”
Silk_Road_3_Register_screen


Now You're In...
What You’ll Find on the Silk Road ?

We’re here. The first thing you’ll see is a notification letting you know your account has successfully been created. By default you are taken to the “messages” screen.
From the top menu you can go to the home screen with all the drug listings, check your messages, check your current orders, check your bitcoin balance, read news, look at your activity, lodge a support ticket, read the forums, check your settings, and logout. We will click on “home” in the top menu bar and check out some goods for sale.

Silk_Road_3_Welcome

Scrolling down, I see a search feature and plenty of filters to help find exactly what I’m looking for. The categories are actually really well organized, with everything from every type of Cannabis/Weed, psychedelics, opioids, ecstasy, benzos, dissociatives, prescription drugs, stimulants broken down into smaller subcategories, like DMT, heroin, and cocaine.

Silkroad_3_Home_screen

Finding your drug of choice has never been easier. If I scroll past the search function, I see a list of products currently highlighted as ‘best sellers’, like weed, hash, ecstasy, and even “ex-gf” porn passes. Each listing includes a picture, price, vendor name, and what country(s) it ships from and to.

SilkRoad-3-weed

I click on a listing for weed, which brings up another page that shows a larger picture and all kinds of info on price, vendor, shipping, payments, and everything else. There’s also reviews for the vendor and a place to ask the vendor a question, as well as a list of questions they’ve received and answered recently from other prospective buyers.You will also have a large section for the description and details of the product.

Questions

Unless the product is out of stock, they will have a place to enter your order information on this page. You’ll enter your quantity, payment type (it seems only bitcoins are accepted at this time), shipping address, shipping option, and any additional notes you’d like to include for the seller.

SilkRoad 3 Order Drugs

You can also click on the seller’s name to find out additional information about their reputation, read reviews, etc. This seller seems to have a pretty solid track record, but there are of course others who have little to no feedback so far.

SilkRoad 3 Listing Reviews

As I poke around the site a bit more, I come across the ‘Others’ section. Here I find guns, like a Glock. And of course, the definitive guide to growing marijuana.

TombArtifact

It feels a little weird to be honest, browsing through all these different drugs, all of the free porn accounts and other illegal items like I’d shop for used DVDs on eBay. With the darknet markets, everything from cocaine to counterfeit money is literally just a few mouse clicks away.

Now You Need Bitcoins.

I found a site that has instructions on how to buy bitcoin, use bitcoin, sell bitcoin, set up a bitcoin wallet, tumble your bitcoins, they do a pretty good job explaining things and they have a link to get $10 free on your first purchase. 


Buying From Silk Road 3

For those of you now wanting to buy goods or services from Silk Road 3 you can follow the guide here. We have made a new complete step by step guide for buying from the Silk Road 3, with everything you need to know including: what to look for, what to do, what NOT TO DO, and tips on how to avoid scams. If you are even contemplating buying anything from SR3 then you should definitely read this.

For those of you guys and gals looking for Porn on Darknetmarkets I have stumbled across an awesome app that you can download or stream free HD porn to your computer or mobile device. It is called Porn Time. If you have heard of Popcorn Time then it is the same idea and same platform as the same developers that made Popcorn Time made Porn Time. It is awesome. You can check out..  

Download PornTime here: http://www.downloadporntime.com/

Anyways, that’s enough snooping for today. I think I’ve seen all I need to see. But feel free to continue on without me.

The Silk Road Lives On

With the rise of other darknet markets like Agora and AlphaBay, Silk Road 3.0 hasn’t managed to reach quite the same level of popularity as the earlier versions. But the fact that it’s simply up and running after a few months of downtime seems to prove that the Silk Road name is here to stay, whether it’s Silk Road 1, 3.0, or 20.

Whether that’s a good or bad thing is up for you to decide. Either way, the more options there are when it comes to darknet markets, the better it is for consumers. And the worse it is for law enforcement, of course.

Additional Resource

Since you are getting onto the whole Deep Web scene you will want to bookmark this site or subscribe on the right so you will always keep up to date with the latest news on the Silk Road 3. If you are looking for the latest news on the darknet markets then I would suggest you check out http://darkwebnews.com as they have a live status on all of the darknet markets, have heaps of user guides and have a massive darknet market list with all of the access details.

Buying Bitcoin

A good thing for anyone to do before deciding on obtaining Bitcoin or purchasing anything with it is to familiarize themselves with the concept of Bitcoin and cryptocurrencies in general. While there are huge amounts of data on Bitcoin all around the internet which can be overwhelming to someone, it is still advisable to at least learn of the basics of Bitcoin transactions.

The first thing to learn about Bitcoin is that every transaction made can be traced through what is known as a blockchain. Think of it as a big ledger where all Bitcoin transaction information is stored and readily accessible by anybody. This means that it can be quite hard to sever the connection between your identity and Bitcoin. Another thing to note that Bitcoin as a currency is quite volatile, which means it changes its value quickly and frequently. For this reason it is always advisable to obtain a little more Bitcoin than what you need, in case its value drops sharply.

Lastly, you should know that the way to store your Bitcoin is in the so called Bitcoin wallets. These wallets are a piece of software that in many ways works the same as your ordinary physical wallet. The main difference is that there is very little to no personal information needed to create a Bitcoin wallet, thus making it hard to tie the wallet to the owner. When creating a wallet make sure that what little information you have to provide cannot be in any way linked back to you and always make sure that the seed or the “passphrase” of your wallet is kept secure and that you do not lose it, as doing that will mean that your wallet becomes inaccessible.

The first information mentioned, the fact that Bitcoin transactions can be traced through blockchain and pinned to the owner no matter how many times they change wallets is the one of most concern to people wanting to buy off Silk Road 3.0. The best practice here is not to try to sever your connection to Bitcoin but rather to never create it in the first place. While there are many sites that offer service of exchanging USD for Bitcoin, most of them require you to perform a bank transfer of the money, which can in turn be used to trace the Bitcoin to you. One of the safest ways to obtain Bitcoin, anonymity-wise, is by using a service called LocalBitcoins.com. They are a site that holds a database of Bitcoin sellers, filtered by country and allow the potential buyer to get in contact with a seller in their vicinity. After creating the arrangements, the seller and the buyer can meet in person and exchange Bitcoin for physical cash, which leaves no evidence of Bitcoin changing ownership. Make sure that the meeting takes place in a crowded area, possibly covered by security cameras to prevent somebody from scamming or robbing you.
For those who are not concerned for privacy to the highest extent there are a number of ways to obtain Bitcoin, mainly through sites and services like BitStamp, CoinBase and BTC-E. Other alternatives include using sites like Craiglist to find a potential buyer or even mining Bitcoin yourself, although it is not advisable, due to how inefficient the process is.
After obtaining your Bitcoin, you have the option of using a Bitcoin tumbling service in case you are extra-paranoid and want to be absolutely sure that nobody will trace the Bitcoin to you. In short, tumbling your Bitcoin is a process similar to money laundering and requires two wallets, one to send Bitcoin from and into the tumbler and another to receive Bitcoin into. One of the most well-reputed tumbling services on deep web is Grams Helix, which for a small fee is said to do the best work of tumbling your Bitcoin. Since many tumbling services have proven to be a scam or just perform their work poorly, it is always advisable to check the blockchain after tumbling to make sure you have not been scammed. 


(replace “yourbitcoinaddress” with an actual Bitcoin address from your output wallet) to check if tumbling was performed properly.

You can then go on to send your Bitcoin to your darknet spending account. When purchasing something from a Silk Road 3.0, always deposit the minimum amount you need to make the purchase and never have any excess funds in Silk Road 3.0 market wallet. This will protect your funds from exit-scams and potential hackers looking to relieve users of their Bitcoin.

Please feel free to contact me if you need any Help & don't hesitate to comment below if you have any questions...

and if you like this post please like & share with your friends...

& Don't Forget To....

Like Our Facebook Page : www.facebook.com/thehackingsage 

Join Our Facebook Group : www.facebook.com/groups/thehackingsage 

Follow Us at Twitter : www.twitter.com/thehackingsage 

Follow Us at Instagram : www.instagram.com/thehackingsage 

Subscribe Our You Tube Channel : www.youtube.com/HACKTRONiAN 

Keep Visiting... Enjoy !!! :)

Labels: , , , , , , ,

Monday, 17 April 2017

THE HACKiNG SAGE ctOS Boot Animation for Android

THE HACKiNG SAGE ctOS Boot Animation for Android

THE HACKiNG SAGE ctOS Boot Animation Is the best Boot animation we has made now if you have a rooted device you can make this Boot Animation as your default bootanimation in a really easy way !!!

Why To Change Your Boot Animation ?
  1. Feel Like A Pro Hacker
  2. Impressive Style
  3. Full HD
  4. Works with 800×480 & 1280×720 both..
  5. It knows when your device will boot
How To Change Your Boot Animation :
  1. Make sure your device is Rooted. (Not Rooted Yet??? Click Here)
  2. Install ES File Explorer (Click Here)
  3. Open ES File Explorer, tap the menu icon from top left corner and select Tools
  4. In tools, enable the ‘Root Explorer’ option and grand full root access to ES explorer when prompted
  5. In ES Explorer, you will find up a / Icon Tab on it then go to System > Media folder.
  6. Long-press the “bootanimation.zip” file and rename it to bootanimation.zip1 to backup your default boot animation
  7. Download THE HACKiNG SAGE ctOS Boot Animation From Below
  8. Copy the Downloaded bootanimation.zip To System > Media folder
  9. Long-press the new “bootanimation.zip” file and tab the three dots Then open its properties
  10. Now at permission tab Change
  11. Now Click on Three Boxes of Read And First Box of write
  12. Reboot the phone. You’ll now be presented with the latest THE HACKiNG SAGE ctOS Boot Animation !!!
  13. Enjoy.. :)
THE HACKiNG SAGE ctOS Boot Animation for Android
THE HACKiNG SAGE ctOS Boot Animation
Notes : Your Device Must Be Rooted.. (Not Rooted Yet??? Click Here)


and if you like this post please like & share with your friends...



& Don't Forget To....


Like Our Facebook Page : www.facebook.com/thehackingsage

Join Our Facebook Group : www.facebook.com/groups/thehackingsage

Follow Us at Twitter : www.twitter.com/thehackingsage

Follow Us at Instagram : www.instagram.com/thehackingsage

Subscribe Our You Tube Channel : www.youtube.com/c/THEHACKiNGSAGE4U

Keep Visiting... Enjoy !!! :)

Labels: , , , , , , ,

Sunday, 22 January 2017

How To Reset Lost Password Of Kali Linux (Guide)

Reset Lost Password Of Kali Linux -- THE HACKiNG SAGE

Kali, the Linux based Operating System and Swiss army knife’s of hackers which mostly used for penetration testing nowadays. This article maybe important for penetration tester or those who are using Kali Linux for daily activity, such as ethical hacking, penetration testing, or students of information security fields.

In this post I will simply show you how to reset forgotten password of Kali Linux and hope it help you reset lost password of Kali Linux easily. I have simply  explained in the bellow step by step article.. So follow the Kali Linux 2.0 password reset article.

1. Boot your Kali system and let the GNU Grub page will be appear.

Reset Lost Password Of Kali Linux -- THE HACKiNG SAGE

2. On the GNU GRUB page select the Advanced options for Kali GNU/Linux option by down arrow key and press enter.

3. Now simplly select the second one Recovery Mode option and press E key to go to recovery mode of Kali Linux.

Reset Lost Password Of Kali Linux -- THE HACKiNG SAGE

4. To modify it just change read only mode (ro) to rw (write mode) and add init=/bin/bash like below screenshot then press F10 to reboot the Kali Linux.

Reset Lost Password Of Kali Linux -- THE HACKiNG SAGE

5. After rebooting the Kali Linux system, it will bring you the bellow screen in order to reset Kali Linux password.

Reset Lost Password Of Kali Linux -- THE HACKiNG SAGE

6. To reset root password of Kali Linux system, simply type “passwd root” and hit the enter. Then type the new password twice for root user. After successfully resetting Kali Linux lost password, you will see the succeed message *password update successfully*. Well reboot the system normally and log in with newly changed password of root user.


and if you like this post please like & share with your friends...

& Don't Forget To....

Like Our Facebook Page : www.facebook.com/thehackingsage 

Join Our Facebook Group : www.facebook.com/groups/thehackingsage 

Follow Us at Twitter : www.twitter.com/thehackingsage 

Follow Us at Instagram : www.instagram.com/thehackingsage 

Subscribe Our You Tube Channel : www.youtube.com/c/THEHACKiNGSAGE4U 

Keep Visiting... Enjoy !!! :)

Labels: , , , , , , , ,