3. Virtual Box
VirtualBox is a powerful x86 and
AMD64/Intel64 virtualization product
for enterprise as well as home use.
It is freely available as Open Source
Software under the terms of the
GNU General Public License (GPL).
5. Contd…
Platforms:
Presently, VirtualBox runs on
Windows, Linux, Macintosh, and
Solaris hosts and supports a large
number of guest operating systems
including but not limited to Windows
(NT 4.0, 2000, XP, Server 2003,
Vista, Windows 7, Windows 8,
Windows 10), DOS/Windows 3.x,
Linux (2.4, 2.6, 3.x and 4.x), Solaris
and OpenSolaris, OS/2, and
OpenBSD.
7. Kali Linux
Kali Linux is the new generation of
the industry-leading BackTrack Linux
penetration testing and security
auditing Linux distribution. Kali
Linux is a complete re-build of
BackTrack from the ground up,
adhering completely to Debian
development standards.
8. Parrot Universe
Parrot is a GNU/Linux distribution
based on Debian Testing and
designed with Security,
Development and Privacy in mind.
It includes a full portable laboratory
for security and digital forensics
experts, but it also includes all you
need to develop your own software
or protect your privacy while surfing
the net.
13. Cryptography
Cryptography is associated with the
process of converting ordinary plain
text into unintelligible text and vice-
versa. It is a method of storing and
transmitting data in a particular
form so that only those for whom it
is intended can read and process it.
Cryptography not only protects data
from theft or alteration, but can also
be used for user authentication.
14. Caesar cipher
In cryptography, a Caesar cipher,
also known as Caesar's cipher, the
shift cipher, Caesar's code or Caesar
shift, is one of the simplest and
most widely known encryption
techniques. It is a type of
substitution cipher in which each
letter in the plaintext is replaced by
a letter some fixed number of
positions down the alphabet. For
example, with a left shift of 3, D
would be replaced by A, E would
become B, and so on. The method is
named after Julius Caesar, who used
it in his private correspondence.
The action of a Caesar cipher is to
replace each plaintext letter with a
different one a fixed number of
places down the alphabet. The
cipher illustrated here uses a left
shift of three, so that (for example)
each occurrence of E in the
plaintext becomes B in the cipher
text.
15. Continue…
In cryptography, a Caesar cipher,
also known as Caesar's cipher, the
shift cipher, Caesar's code or Caesar
shift, is one of the simplest and
most widely known encryption
techniques. It is a type of
substitution cipher in which each
letter in the plaintext is replaced by
a letter some fixed number of
positions down the alphabet. For
example, with a left shift of 3, D
would be replaced by A, E would
become B, and so on. The method is
named after Julius Caesar, who used
it in his private correspondence.
Decryption
shift
Candidate plaintext
0 exxegoexsrgi
1 dwwdfndwrqfh
2 cvvcemcvqpeg
3 buubdlbupodf
4 attackatonce
5 zsszbjzsnmbd
6 yrryaiyrmlac
...
23 haahjrhavujl
24 gzzgiqgzutik
25 fyyfhpfytshj
16. Caesar Encryption &
Decryption
c2d = dict(zip("abcdefghijklmnopqrstuvwxyz",range(26)))
d2c = dict(zip(range(26),"abcdefghijklmnopqrstuvwxyz"))
for i in range(26):
key_c = i
ciphertext =
"wshpualeapzhalytbzlkpujyfwavnyhwofaohaylmlyzavhtlzzhnlilmvyllujyfwapvuvyhmalykljyfwapvuhukpzhtlzzhnl
puhmvytaohapzlhzpsfylhkhislifobthuz"
# encipher
plaintext = ""
for c in ciphertext:
if c: plaintext += d2c[ (c2d[c] + key_c)%26 ]
else: plaintext += c
print(plaintext)
print("n")
'''
Answer:
Key is 19
Text is "PLAIN TEXT IS A TERM USED IN CRYPTOGRAPHY THAT REFERS TO A MESSAGE BEFORE ENCRYPTION OR
AFTER DECRYPTION AND IS A MESSAGE IN A FORM THAT IS EASILY READABLE BY HUMANS"
'''
18. Hacking Tools
Trojan Horse is a method that enables the cracker to set up a way to intrude on a
computer or a system, by having his/her code installed with useful software on the
machine, network, or system. The cracker can enter the system through that back door
later on. Examples of this useful software are programs that mimic login screens,
viruses that fool the user to download programs, and other applications.
Snooper is an application that enables the cracker to capture secure information while it
is in transit within a computer or a network. For example, information transported
between web pages for form applications transitions and stages, and the transportation
of information from a form to the server.
A worm is an application that looks for weaknesses in a system or a network, and
reproduces itself on that system till the system crashes. A virus on the other hand, is
attached to software, and is spread once the software is executed. The danger of a
virus can be as harmless as a sound, or a picture, or as harmful as a worm, that
changes the binary setting of the computer, and crashes the system. Further light will
be shed on how each of viruses and worms act when accessing a system.
Vulnerability Scanner is a tool that is used to check if a computer on a network has a
known weakness. There are also port scanners that enable the cracker to determine the
open port that can be accessed through to the computer.
Packet Sniffing can be used for network monitoring, and for troubleshooting. It can be a
powerful tool to gather information that helps compromise the network.
20. Hacking Thwarting
Some of the methods and
techniques that are used to reduce
the effects of hackers and malicious
software are developed by different
companies. Companies vary in their
ideas of what is the weakest point in
a network that should be protected
from hackers. Each software tool
has its negatives and positives, and
below, is a discussion of some of the
tools that are used to lessen the
intrusion of a hacker or virus to a
network system.
21. IDS (Intrusion Detection
System)
In cryptography, a Caesar cipher,
also known as Caesar's cipher, the
shift cipher, Caesar's code or Caesar
shift, is one of the simplest and
most widely known encryption
techniques. It is a type of
substitution cipher in which each
letter in the plaintext is replaced by
a letter some fixed number of
positions down the alphabet. For
example, with a left shift of 3, D
would be replaced by A, E would
become B, and so on. The method is
named after Julius Caesar, who used
it in his private correspondence.
22. Performance Analysis
In cryptography, a Caesar cipher,
also known as Caesar's cipher, the
shift cipher, Caesar's code or Caesar
shift, is one of the simplest and
most widely known encryption
techniques. It is a type of
substitution cipher in which each
letter in the plaintext is replaced by
a letter some fixed number of
positions down the alphabet. For
example, with a left shift of 3, D
would be replaced by A, E would
become B, and so on. The method is
named after Julius Caesar, who used
it in his private correspondence.
23. Computer Performance
Analysis
In cryptography, a Caesar cipher,
also known as Caesar's cipher, the
shift cipher, Caesar's code or Caesar
shift, is one of the simplest and
most widely known encryption
techniques. It is a type of
substitution cipher in which each
letter in the plaintext is replaced by
a letter some fixed number of
positions down the alphabet. For
example, with a left shift of 3, D
would be replaced by A, E would
become B, and so on. The method is
named after Julius Caesar, who used
it in his private correspondence.
24. Website Spam Detection
In cryptography, a Caesar cipher,
also known as Caesar's cipher, the
shift cipher, Caesar's code or Caesar
shift, is one of the simplest and
most widely known encryption
techniques. It is a type of
substitution cipher in which each
letter in the plaintext is replaced by
a letter some fixed number of
positions down the alphabet. For
example, with a left shift of 3, D
would be replaced by A, E would
become B, and so on. The method is
named after Julius Caesar, who used
it in his private correspondence.
26. Overview of Xblades.exe
What Is Xblades.exe?
Xblades.exe is a type of EXE file associated with X-
Blades developed by Gaijin Entertainment for the
Windows Operating System. The latest known version
of Xblades.exe is 1.0.0.0, which was produced for
Windows XP. This EXE file carries a popularity rating of
1 stars and a security rating of "UNKNOWN".
What Are EXE Files?
EXE ("executable") files, such as xblades.exe, are files
that contain step-by-step instructions that a
computer follows to carry out a function. When
you "double-click" an EXE file, your computer
automatically executes these instructions designed by a
software developer (eg. Gaijin Entertainment) to run a
program (eg. X-Blades) on your PC.
Every software application on your PC uses an
executable file - your web browser, word processor,
spreadsheet program, etc. - making it one of the most
useful kinds of files in the Windows operating system.
Without executable files like xblades.exe, you wouldn't
be able to use any programs on your PC.