Saturday 31 October 2015

Top 10 Best Hacking OS

Below is the List of Top 10 Hacking OS in 2015

You can download them and the links are given with them

List of Top 10 Hacking OS

1. Kali Linux

Kali Linux is a Debian-derived Linux configuration create for digital forensics and penetration testing. It’s maintained and funded by Offensive Security Ltd. Kali Linux updates its tools, and it’s available for many different platforms like VMware, ARM, and many more.


2. BackBox

It’s a Linux distribution that’s based on Ubuntu. If you want to play safety assessment and penetration experiment, this software is the one that you should have in your repository. It active protects the IT infrastructure.

3. Backtrack 5r3

This operating system is built keeping the savviest security personnel in mind as the audience. This is also a useful tool even for the early newcomers within the data safety discipline. It provides a fast and simple method to discover and also update the largest database ready for the security tools collection till date.

4. SELinux

Security Enhanced Linux or SELinux is an upstream repository that’s used for various userland tools and books. There are various capabilities like policy compilation, policy management and coverage development which are combined in this utility tool along with SELinux services and utilities.

5. Knoppix

Knoppix STD is a Live CD Linux configuration based on Knoppix that centered on PC safety instruments. It included GPL-licensed tools in the following categories, password cracking, authentication, encryption, forensics, honeypots, intrusion detection system, firewalls,  network utilities, penetration, packet sniffers, assemblers, vulnerability assessment and wi-fi networking.

6. Pentoo

Pentoo is a Live CD and Live USB designed for security assessment and penetration testing. Based on Gentoo Linux, Pentoo gives both as 32 and 64-bit installable live cd. The Pentoo kernel includes safety and PAX hardening and extra patches – with double compiled from a hardened toolchain with the latest nightly versions of some tools available.

7. Live Hacking OS

Live Hacking OS is also based on Linux which has a big package of hacking tools useful for penetration testing or ethical hacking. It includes the graphical user interface GNOME inbuilt. There’s a second variation available which has a command line only, and it requires very fewer hardware requirements.

8. Matriux Krypton

After Weakerth4n, this is perhaps the first distribution that’s directly based on the Debian Operating System. It provide an arsenal of 300 security tools and makes a good choice for ethical hacking, system and cyber forensics investigations, security testing, penetration testing and network administration etc.

9. NodeZero Linux

NodeZero Linux is a powerful, reliable and stable. Based on the industry leading Ubuntu Linux distribution, NodeZero Linux needs all the stability and reliability that comes with Ubuntu’s Long Term Support model, and its power comes from the tools configured to live comfortably within the environment.

10. DEFT

DEFT Operating System is based on the Linux Kernel 3 along with the Digital Advanced Response Toolkit. It uses WINE in order to run Windows tools Linux and predominantly run with the LXDE desktop environment.
So above is all about Top 10 best hacking OS 2015. Hope you like it so please don’t forget to share this post with others.

Friday 23 October 2015

Find someone’s IP address: When chatting on facebook


First you got to find out the IP address of that User.
To Do so we will be using “netstat” command in windows. If you want to know the IP address of a specific person on facebook or orkut or any chat service, there is only one way: Just invite or ping him for a chat and while chat is ON open ‘Command Prompt‘ on your PC (Start >Run>cmd).

note: before trying this make sure you close all the other tabs in your browser, and only keep facebook open. Also if possible delete all the history and cache from your browser.

When command prompt opens Type the following command and hit Enter.
  • netstat -an
And you will get all established connections IP addresses there. Note down all the suspicious IP’s.

The Next Step is to Trace that user using his IP address.

To do so we will be using IP tracer service. Go to the below address and paste the IP address in the box that says “lookup this ip or website”, and it will show you the location of the user.

http://www.ip-adress.com/ipaddresstolocation/

It will show you all the information about that user along with his ISP and a Location in the MAP. Now in the MAP Just click on “click for big ip address location” in the big picture you can actually zoom in. and try to recognize the area. If any serious matter just note down the ISP details in that page and contact them about the IP. They will respond you.

Other netstat commands:
  • -a Displays all connections and listening ports.
  • -e Displays Ethernet statistics. This may be combined with the -s option.
  • -n Displays addresses and port numbers in numerical form.
  • -p Proto Shows connections for the protocol specified by proto; proto may be TCP or UDP.
  • -s Option to display per-protocol statistics, proto may be TCP, UDP, or IP.
  • -r Displays the routing table.
  • -s Displays per-protocol statistics. By default, statistics are shown for TCP, UDP and IP; the
  • -p Option may be used to specify a subset of the default. 
 netstat -an