Thursday, May 26, 2016

Mr.Robot : Season 2 - Date and Official Trailer

MR. ROBOT follows Elliot Alderson (Rami Malek), a young cyber-security engineer who becomes involved in the underground hacker group fsociety, after being recruited by their mysterious leader (Christian Slater). Following the events of fsociety’s hack on multi-national company Evil Corp, the second season will explore the consequences of that attack as well as the illusion of control. The series also stars Portia Doubleday, Carly Chaikin, Grace Gummer, Michael Cristofer and Stephanie Corneliussen.

USA Network has officially set the premiere date for its criticaly acclaimed drama Mr. Robot. Returning for a second season on Wednesday, Jul. 13 at 10/9c, Sam Esmail's groundbreaking series stars Rami Malek as Elliot Alderson, a brilliant-but-troubled computer hacker, and Christian Slater as Mr. Robot, a mysterious agitator who enlists Elliot's help.

[Warning: season one spoilers ahead.] Season two picks up after fsociety’s 5/9 hack on Evil Corp and will explore the consequences of the attack, as well as the illusion of control. In addition to Malek and Slater, Portia Doubleday (Angela), Carly Chaikin (Darlene), Martin Wallström (Tyrell), Michael Cristofer (Phillip Price), and Stephanie Corneliussen (Joanna) are onboard for season two, which is currently shooting in New York City.
Esmail, who is directing all 10 episodes of the new season, is introducing the character Dominique “Dom” DiPierro into the story this year. Grace Gummer will play Dom, a young federal agent investigating the hack.
“Elliot committed a crime and we’re going to see the ramifications of that this season,” Esmail said during the Mr. Robot panel at SXSW last month. “That’s why you see that introduction of law enforcement, which you deliberately didn’t see the first season.”

Also joining the cast this year: Craig Robinson as Ray, a neighborhood local who reaches out to Elliot in his time of need; rapper Joey Bada$$ as Leon, a new friend of Elliot’s who philosophizes on the meaning of life; and Chris Conroy as Derek, the young and attractive new man in Joanna Wellick’s life.

 Source : usanetwork

What is Hacktivism ?

mr.robot hacktivism k4linux wallpaper
Today on k4linux we gonna talk about Hacktivism! In our series of penetration testing cours, you must know all terms and definitions and types of hackers to introduce this domains... many articles about penetration testing and hacking will be shared soon, keep connected with k4linux and support us.

What is Hacktivism ?

Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose. The individual who performs an act of hacktivism is said to be a hacktivist.

Form Of Hacktivism :

Wikipedia is always a good source of definitions for technology-related issues. Its categorizes Hacktivism to differences categories:

Website Mirroring: It is a technique that copies the content of a censored website and posts it to other domains and subdomains that are not censored.
Anonymous blogging: a method of speaking out to a wide audience about human rights issues, government oppression, etc. that utilizes various web tools such as IP masking, and blogging software to preserve a high level of anonymity.
 Political hacking: Many targets of hacktivist groups are of a more overtly political nature. During the 2013 Zimbabwean election, hacktivist group Anonymous Africa attacked and closed down 50 websites, including those associated with the ruling Zanu PF party. 

 Most Famous Group of Hacktivism:

Two of the most widely known groups are Anonymous and LulzSec.

Anonymous : has participated in a great number of online projects such as Operation: Pay Back Is a Bitch and Operation: Safe Winter. A great number of their projects have been for a charitable cause.

LulzSec : The group has (allegedly) disbanded and some of its members arrested. Nevertheless, given the disparate structure of these organisations and the transient nature of their members, it is unlikely that all the members have been caught. group that claimed responsibility for several high profile attacks, including the compromise of user accounts from Sony Pictures in 2011. The group also claimed responsibility for taking the CIA website offline.

Mr.Robot :

mr.robot hacktivism penetration testing k4linux

Mr. Robot is an American drama–thriller television series which tells the story of a cybersecurity engineer and hacker his name is Elliot Alderson, he joined a group of hacktivists. The group aims to cancel all debts by attacking the large corporation E Corp.

Elliot Alderson, its a young man living in New York City, who works at the cyber security company Allsafe as a security engineer. Constantly struggling with social anxiety disorder and clinical depression, Elliot's thought process seems heavily influenced by paranoia and delusion. He connects to people by hacking them, which often leads him to act as a cyber-vigilante.

"hacktivism promotes anti-crime , anti-war , and anti-terrorism"

If you have encountered a problem or you have any questions or remarks please feel free to set a comment.

If this article helped you to solve your problem please feel free to share it with your friends ... with love and prosperity K4LINUX-TEAM.

Wednesday, May 11, 2016

9 Different Types of Hackers

Different types of Hackers and their differences ?

9 types of different hackers and the differences between them

There are many different types of hacker today, on k4linux we will explain to you what means and how work all type of Hackers.

1. Black Hat Hacker

A black hat hacker is a hacker who violates computer security for little reason beyond maliciousness or for personal gain. The black hat hacker takes advantage of the break-in, perhaps destroying files or stealing data for some future purpose. The black hat hacker may also make the exploit known to other hackers and/or the public without notifying the victim. This gives others the opportunity to exploit the vulnerability before the organization is able to secure it.

Their primary motivation is usually for personal or financial gain, but they can also be involved in cyber espionage, protest or perhaps are just addicted to the thrill of cyber crime. Black hat hackers can range from amateurs getting their feet wet by spreading malware, to experienced hackers that aim to steal data, specifically financial information, personal information and login credentials. Not only do black hat hackers seek to steal data, they also seek to modify or destroy data as well.

2. Grey Hat Hacker

Grey hat hackers are a blend of both black hat and white hat activities. Often, grey hat hackers will look for vulnerabilities in a system without the owner’s permission or knowledge. If issues are found, they will report them to the owner, sometimes requesting a small fee to fix the issue. If the owner does not respond or comply, then sometimes the hackers will post the newly found exploit online for the world to see.

The term "grey hat" refers to a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but does not have the malicious intent typical of a black hat hacker.

3. White Hat Hacker

White Hat Hacker is a ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies to ensure the security of an organization's information systems.

White hat hackers choose to use their powers for good rather than evil. Also known as “ethical hackers,” white hat hackers can sometimes be paid employees or contractors working for companies as security specialists that attempt to find security holes via hacking.

White hat hackers employ the same methods of hacking as black hats, with one exception- they do it with permission from the owner of the system first, which makes the process completely legal. White hat hackers perform penetration testing, test in-place security systems and perform vulnerability assessments for companies. There are even courses, training, conferences and certifications for ethical hacking.

4.  Suicide Hacker

Suicide hackers are those who hack for some purpose and even don’t bother to suffer long term jail due to their activities. Suicide hacker can be bad as well as good. Suicide Hacker will stop at nothing and will ignore consequences.

5.Script Kiddie

A Script Kiddie is basically a hacker amateur who doesn’t has much knowledge to program tools to breaks into computer networks. He often use downloaded hacking tools from internet written by other hackers/security experts.Script kiddies usually focus on the quantity of attacks rather than the quality of the attacks that they initiate.
A Script Kiddie is an unskilled individual who uses scripts or programs developed by others to attack computer systems and networks and deface websites. It is generally assumed that script kiddies are juveniles who lack the ability to write sophisticated programs or exploits on their own and that their objective is to try to impress their friends or gain credit in computer-enthusiast communities.

6. Spy Hacker

Spy hackers are individuals who are employed by an organization to penetrate and gain trade secrets of the competitor. These insiders can take advantage of the privileges they have to hack a system or network.

7. Cyber Terrorist

A Cyber Terrorist is a programmer who breaks into computer systems in order to steal or change or destroy information as a form of cyber-terrorism.
Cyberterrorism is the act of Internet terrorism in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses.

8. State Sponsored Hacker

State sponsored hackers are individuals employed by the government to penetrate and gain top-secret information and to damage information systems of the governments.

9. Hacktivist

A hacktivist is kinda hacker who thinks hacking can bring out some social changes and hacks government and organizations to show his discomfort over some trivial issues.
Hacktivism  is the subversive use of computers and computer networks to promote a political agenda. With roots in hacker culture and hacker ethics, its ends are often related to the free speech, human rights, or freedom of information movements.

If you have encountered a problem or you have any questions or remarks please feel free to set a comment.

If this article helped you to solve your problem please feel free to share it with your friends ... with love and prosperity K4LINUX-TEAM.

Who is a Hacker ?

Who is a Hacker?

k4linux kali linux 2.0 tutorials hacker
A hacker is someone who seeks and exploits weaknesses in a computer system or computer network.
Hackers may be motivated by a multitude of reasons, such as profit, protest, or challenge.
Another definition of Hacker:
A computer hacker is someone who lives and breathes computers, who knows all about computers, who can get a computer to do anything.

Equally important, though, is the hacker's attitude. Computer programming must be a hobby, something done for fun, not out of a sense of duty or for the money.
(It's Okay to make money, but that can't be the reason for hacking.)

If you have encountered a problem or you have any questions or remarks please feel free to set a comment.

If this article helped you to solve your problem please feel free to share it with your friends ... with love and prosperity K4LINUX-TEAM.

The Basics of Ethical Hacking and Penetration Testing

Introduction to Ethical Hacking and Penetration Testing:

ethical hacking penetration testing kali linux 2.0 k4linux

Learn the basics of Ethical Hacking and Penetration Testing course to make you a better ethical hacker and penetration tester.

We understand the appeal of hacking and attacking systems is what draws most people to this profession but, a solid understanding of the theory will differentiate you from hackers and eventually turn you into an infosec professional. Which makes more money in the grand scheme of things.

Hacking vs Ethical Hacking

There is a difference between hacking and Ethical Hacking ?
The difference is: permission.
Seriously, Hacking without permission can land you in prison. Never do any testing without written consent from a client. In the case of things like bug bounties, where you don't have a contractual agreement, save the sites bug bounty text and any conversations you have with them.

Why Penetration Testing ?

If you have encountered a problem or you have any questions or remarks please feel free to set a comment.

If this article helped you to solve your problem please feel free to share it with your friends ... with love and prosperity K4LINUX-TEAM.

Tuesday, May 10, 2016

Kali Linux Ebook : Web Penetration Testing

Web Penetration Testing with Kali Linux :

web penetration testing with kali linux k4linux

Web Penetration Testing with Kali Linux is designed to be a guide for professional Penetration Testers looking to include Kali in a web application penetration engagement. Our goal is to identify the best Kali tool(s) for a specific assignment, provide details on using the application(s), and offer examples of what information could be obtained for reporting purposes based on expert field experience. Kali has various programs and utilities; however, this book will focus on the strongest tool(s) for a specific task at the time of publishing.

kali linux 2.0 ebook

The chapters in this book are divided into tasks used in real world web application Penetration Testing. Chapter 1, Penetration Testing and Setup, provides an overview of Penetration Testing basic concepts, professional service strategies, background on the Kali Linux environment, and setting up Kali for topics presented in this book.

Chapters 2-6, cover various web application Penetration Testing concepts including configuration and reporting examples designed to highlight if topics covered can accomplish your desired objective.

Chapter 7, Defensive Countermeasures, serves as a remediation source on systems vulnerable to attacks presented in previous chapters. Chapter 8, Penetration Test Executive Report, offers reporting best practices and samples that can serve as templates for building executive level reports. The purpose of designing the book in this fashion is to give the reader a guide for engaging a web application penetration with the best possible tool(s) available in Kali, offer steps to remediate a vulnerability and provide how data captured could be presented in a professional manner.

download now web penetration testing with kali linux k4linux

 If you have encountered a problem or you have any questions or remarks please feel free to set a comment.

If this article helped you to solve your problem please feel free to share it with your friends ... with love and prosperity K4LINUX-TEAM.

Saturday, April 30, 2016

Kali linux 2.0 Tutorials : Hack Facebook (Setoolkit - Ettercap)

Kali Linux 2.0 Tutorials : Setoolkit Ettercap Dnsspoof (Hack Facebook) 

kali linux 2.0 hack facebook k4linux linux tutorials

Everyone ask for how to hack facebook account with a simple method, like a program where you put a email address and get the password, this gave a chance to hackers to create fake programs and infect them to hack noobs computers (windows users) ... Fortunately kali linux users don't think this way!

Disclaimer: This tutorial is for educational purposes only and we are NOT responsible in any way for how this information is used, use it at your own risk.

They have to many way that can help you to hack facebook account, one of them it's fishing and i think it's the best method, so in this article we will use DNSSPOOF Attack using Ettercap to transfer victims from the original facebook website to our fake page! And with Setoolkit we will create our fake Facebook interface that we will use to get victims password.

Social Engineer Toolkit (SET)

hack facebook kali linux setoolkit k4linux

The Social-Engineer Toolkit (SET) is specifically designed to perform advanced attacks against the human element. SET was designed to be released with the launch and has quickly became a standard tool in a penetration testers arsenal. SET was written by David Kennedy (ReL1K) and with a lot of help from the community it has incorporated attacks never before seen in an exploitation toolset. The attacks built into the toolkit are designed to be targeted and focused attacks against a person or organization used during a penetration test.


hack ettercap kali linux k4linux

Ettercap is a comprehensive suite for man in the middle attacks. It features sniffing of live connections, content filtering on the fly and many other interesting tricks. It supports active and passive dissection of many protocols and includes many features for network and host analysis.


k4linux kali linux dnsspoof hack

Dnsspoof is a member of the Dsniff suit toolset and  works similarly to arpspoof . It lets you forge DNS responses for a DNS server on the local network . DNS runs on User Datagram Protocol (UDP), a connectionless protocol, a DNS client will send out a query and expect a response . The query is assigned a pseudo random identification number  which should be present in the answer from the DNS server. Then when the answer from the DNS server will be received , it will just have to compare both numbers if they’re the same, the answer is taken as valid, otherwise it will be simply ignored . The DNS protocol relies on UDP for requests (TCP is used only for zone transfers –> communications between DNS servers), which means that it is easy to send a packet coming from a fake IP since there are no SYN/ACK numbers (Unlike TCP, UDP doesn’t provide a minimum of protection against IP spoofing) .

Hack Facebook

hack facebook

After a simple presentation of the tools and ways we will use to hack facebook's account let's start hacking ...
All the steps for this tutorial are explained on a Video on our Youtube Channel you can subscribe to it by this link they are many other tutorials that you can learn about bypassing and hacking and others basics tutorials about kali linux 2.0 (Kali Sana).

If you have encountered a problem or you have any questions or remarks please feel free to set a comment.

If this article helped you to solve your problem please feel free to share it with your friends ... with love and prosperity K4LINUX-TEAM.

Sources used: Ettercap - SetoolkitDnsspoof.