CyberSecurity Updates

Computer security, cybersecurity or information technology security is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.

EC-Council and Vinca Cyber Collaborate to Help Cybersecurity Leaders Build Secure Digital Business Ecosystems

EC-Council and Vinca Cyber Collaborate to Help Cybersecurity Leaders Build Secure Digital Business Ecosystems

Cyber Collaborate bannerEC-Council and Vinca Cyber form an alliance to support businesses and cybersecurity leaders in India by providing optimum managed services solutions, a combination of phishing simulations with ready-to-use training modules and anti-phishing preventive controls that give organizations and individuals the necessary tools to be secure in a virtually connected world. India, October 1, 2021 – As businesses all over the […]
Aljhood Becomes EC-Council’s New Authorized Training Center to Promote Cybersecurity Education and Credentialing in the Middle East

Aljhood Becomes EC-Council’s New Authorized Training Center to Promote Cybersecurity Education and Credentialing in the Middle East

Aljhood Becomes EC-Council’s New Authorized Training bannerEC-Council, a global leader in cybersecurity certifications, appoints Aljhood as an authorized training center in the Middle East. Aljhood is a leading training and consulting company specializing in business, organizational, and operational excellence solutions to support the development of security-aware culture. It offers professionals innovative and practical approaches to cybersecurity training and education, supporting regional workforce development. Middle East, September […]
Recognized Editor and Writer Cynthia Reeser Constantino Joins EC-Council to Lead Content and Editorial Development

Recognized Editor and Writer Cynthia Reeser Constantino Joins EC-Council to Lead Content and Editorial Development

Cynthia Reeser bannerEC-Council welcomes Constantino, an experienced leader who will drive content strategy by ensuring high standards of excellence and accuracy in digital communications. She brings 15 years of experience in the cybersecurity, education, and literary industries to the newly created role. Tampa, FL (October 15, 2021) Cynthia Constantino, a well-respected editor of cybersecurity courses and programs, joins EC-Council to lead content […]
EC-Council and Wissen Sponsor Awards for Winners of the ASEAN Student Contest on Information Security (ASCIS)

EC-Council and Wissen Sponsor Awards for Winners of the ASEAN Student Contest on Information Security (ASCIS)

Asean-01Vietnam, October 9, 2021 – EC-Council co-sponsors the awards for the winners of ASEAN Student Contest on Information Security (ASCIS) along with Wissen. The contest is an integral activity of the annual event, “Vietnam Information Security Day” organized by VNISA under the sponsorship of the Ministry of Information and Communications (MIC) and the Ministry of Education and Training (MoET) of Vietnam. ASCIS is a Capture the Flag contest for students from institutes of higher education in ASEAN. The warm-up round of […]
Where to hire react programmer and 3 essential skills to look for

Where to hire react programmer and 3 essential skills to look for

Hiring React.js developers for your tech project can be a tough job because it’s one of the most popular JavaScript frameworks in the world. Facebook, Uber, Airbnb, Netflix, PwC, Amazon, Twitter, Udemy, and nearly 9,000 others worldwide use it for web, desktop, and mobile apps. To hire React programmer, you need to challenge the competition, and as you can imagine, the talent pool isn’t infinite. In this article, we will show you where to hire React js developer for your business.

hire react js developer

React js is popular, and it is here to stay

When the latest StackOverflow survey appeared, the statistics were more than clear: React js has conquered the category “Web Frameworks”. React is a high-performance JavaScript framework. Its simple, component-based architecture allows developers to be more productive and code faster. The framework’s minimal API is focused on solving performance issues, enabling lightning-fast rendering speeds with a small overall footprint.

Where to find React js developers for hire

There are many ways to hire React js developers. Some of them are cheaper, others – more efficient. After all, it all depends on the project size and the budget.

Job sites

You can hire React js developers from a job site. When hiring React developers, know that the job seekers who want to work in the office are often eligible to receive better benefits. However, this isn’t always the case when hiring remotely. Remote staff members typically don’t have access to company benefits like healthcare, which is why they’re typically less expensive to hire.

Freelance platforms

Freelance platforms provide a great way to find a large pool of React JS developers at a low cost. Freelancers might not have the same company loyalty as full-time employees, but most will be able to produce results that meet or exceed hiring a full-time employee. Finding a quality freelancer on any of these platforms takes time and effort — make sure you browse all of your options before hiring anyone! When you employ someone, remember they’re working for money — and if they think they’ll get more elsewhere, they’ll leave.

Hire React programmer for an outstaffing agency

Outstaffing agencies are the best of both worlds. They have all the resources of a full-fledge company while cutting down on other expenses that would take a toll on your budget. Their big talent pools, excellent management, and other resources help companies achieve their goals without breaking the bank.

Skills that you should look for when hiring React js developer

  • Ability to work on other Javascript libraries — You have various options when hiring React developers, but what you want is someone with experience in the Javascript ecosystem. That way, they won’t need to spend time and energy learning all of the intricacies of your library — they can dive right in and start delivering value.
  • In-depth knowledge of React Js framework — One of the must-haves for developers is understanding React js concepts. Using JSX, understanding the component lifecycle, and working with the virtual DOM are necessary skills that every good developer should have. These abilities will get you started quickly on your projects.
  • Ability to write good code — React js developers who want to create polished products should be familiar with the Google JavaScript Style Guide so they can follow the correct standard. This will help keep code readable, consistent, and scalable on large projects.

While a React js developer might have the skillset to build a functional prototype, a good React js developer will be able to collect business requirements and turn them into a set of technical specs. Communication skills are important for this, as well as their ability to work in a team. In addition to creativity and the desire to learn, any success in this role will also depend on their problem-solving skills.

In conclusion

It is not an easy task to hire React programmer. Finding a great React js developer takes a lot of time and effort — but you don’t have to work with a remote freelancer or a company, or a person from a different part of the world. A trusted technology partner knows everyone in the development community, so they can help you find your ideal hire.

How to Setup SQLi Penetration Testing Lab on Kali Linux

How to Setup SQLi Penetration Testing Lab on Kali Linux

In our some previous articles we discussed about some penetration testing labs, like PentestLab , DVWA where we can practice and improve our attacking skills. In today’s article we are going to discuss about how to set SQLi lab on Kali Linux to test our SQL Injection skills. Advanced SQL Injection is still a major bug can be found on various sites. That because still learning and growing SQL Injection skills are profitable for cybersecurity experts and bug bounty hunters.

install sqli lab on Kali Linux

For this lab setup we are going to use SQLi_Edited, this is a upgraded fork of sqli-labs (Dhakkan Labs). Before cloning it from GitHub let we move to our /var/www/html directory, we are going to clone it there to make things easy.

cd /var/www/html

Here we need to clone the repository from GitHub by using following command:

sudo git clone https://github.com/Rinkish/Sqli_Edited_Version

In the following screenshot we can see that this repository is successfully cloned to the directory.

SQLi Lab  git clonning

Now we can go inside this directory by using following command:

cd Sqli_Edited_Version

Here we use ls command to see all the files, as we can see in the following screenshot:

SQLi labs git clonned

Here we can see the directory named “sqlilabs“, Now we move it on the previous directory and rename it for easy to open by applying following command:

sudo mv sqlilabs/ ../sqli

Then we back to our previous directory by using following command:

cd ..

We can see the process in the following screenshot:

moving sqlilabs directory

Now we need to edit database credential file named “db-creds.inc“, which is located under “sqli/sql-connections/db-creds.inc” and put our user name and password for database. To edit it we are going to use infamous Linux text editor nano.

sudo nano sqli/sql-connections/db-creds.inc

In the following screenshot we can see the default configuration of it, where the database user is root and database password is blank.

sqlilabs databse username and password changing

Now we modify this as per our Kali Linux system user, here we are using user “kali” and we can also choose a password as we want, as shown in the following screenshot:

sql injection lab setup

Now we save and close it by typing CTRL+X, then Y, then Enter ↲.

Now we need to setup our mySQL database for our Kali Linux system. MySQL comes preloaded with Kali Linux. We need to open up our MariaDB as root user by using following command:

sudo mysql -u root

Then we need to create our user with password, in our case our user will be ‘kali‘ and password will be ‘1234‘. So the command for us will be following:

CREATE USER 'kali'@'localhost' IDENTIFIED BY '1234';

Now our user is created as we can see in the following screenshot:

creating user on mysql Kali Linux

Now we need to grant all permission to user ‘kali‘ by using following command:

GRANT ALL PRIVILEGES ON *.* TO 'kali'@'localhost';

The screenshot of the above command is following:

grant permission for mysql database user on Kali Linux

Database setup is done, now we can exit from MariaDB by using CTRL+C keys and run following command to start our MySQL services:

sudo service mysql start

Our setup is almost complete now we need to run our apache2 server (comes pre-loaded with Kali). We start our Apache2 web server by using following command:

sudo service apache2 start

Now our web server is running, we can see it by navigating to localhost/sqli URL from our browser. Our SQL Injection lab will open in front of us as we can see in the following screenshot:

sqli lab challanges

Here for the very first time we need to ‘Setup/reset database for labs’. After clicking there our database setup will start as we can see in the following screenshot:

SQLi labs database connecting

Now a page will open up in our browser which is an indication that we can access different kinds of Sqli challenges, as we can see in the following screenshot:

SQLi labs on Kali Linux

Here we can solve various types of SQL injection challenges, by solving them our SQL Injection skill will be improved. For an example, to start the basic SQL Injection challenge we need to click on Lesson 1.

SQLi Labs basic challenge 1

This is all for this article. We had learnt how we can set up SQL Injection labs on our Kali Linux system and practice our SQL Injection skills from basics to advance.

Love our articles? Make sure to follow us on Twitter and GitHub, we post article updates there. To join our KaliLinuxIn family, join our Telegram Group. We are trying to build a community for Linux and Cybersecurity. For anything we always happy to help everyone on the comment section. As we know our comment section is always open to everyone. We read each and every comment and we always reply.

Hashcat — Crack Passwords in Minutes

Hashcat — Crack Passwords in Minutes

Hashcat is an advanced free (License: MIT) multi-threaded password recovery tool and it is world’s fastest password cracker and recovery utility, which supports multiple unique attack modes of attacks for more than 200 highly optimized hashing algorithms. Hashcat currently supports CPUs and GPUs and other hardware accelerators on Linux, Windows, and OSX, and has facilities to help enable distributed password cracking.

hashcat on Kali Linux

Hashcat comes pre-installed on our Kali Linux system, So we don’t need to install it, but if installation is required we can use sudo apt install hashcat command.

Features of Hashcat

  • World’s fastest password cracker.
  • World’s first and only in-kernel rule engine.
  • Free and open source.
  • Multi-OS (Linux, Windows and macOS).
  • Multi-Platform (CPU, GPU, APU, etc., everything that comes with an OpenCL runtime).
  • Multi-Hash (Cracking multiple hashes at the same time).
  • Multi-Devices (Utilizing multiple devices in same system).
  • Multi-Device-Types (Utilizing mixed device types in same system).
  • Supports password candidate brain functionality.
  • Supports distributed cracking networks (using overlay).
  • Supports interactive pause / resume.
  • Supports sessions.
  • Supports restore.
  • Supports reading password candidates from file and stdin.
  • Supports hex-salt and hex-charset.
  • Supports automatic performance tuning.
  • Supports automatic keyspace ordering markov-chains.
  • Built-in benchmarking system.
  • Integrated thermal watchdog.
  • 350+ Hash-types implemented with performance in mind.
  • … and much more.

Hashcat offers multiple unique attack modes for cracking passwords. Those are following: 

  • Brute-Force attack
  • Combinator attack
  • Dictionary attack
  • Fingerprint attack
  • Hybrid attack
  • Mask attack
  • Permutation attack
  • Rule-based attack
  • Table-Lookup attack
  • Toggle-Case attack
  • PRINCE attack

Now without wasting any more time lets dive into Hashcat.

Hashcat on Kali Linux

As we told Hashcat comes pre-installed with a Kali Linux and it is multi-threaded so first let we benchmark our system by using following command:

hashcat -b

In the following screenshot we can see the benchmark of our system and get an idea how it can perform while cracking various types of hashes.

benchmark of hashcat

Here we can get an idea about the performance of our system. Let’s run this tool to crack some hashes. Here we have collected some hashed on a text file. For educational purposes we just generated these hashed not collected from any website’s database.

hashes list on our system

Now we can crack these using Hashcat, and store the output in a craced.txt file by applying following command:

hashcat -m 0 -a 0 -o cracked.txt hashes.txt /usr/share/seclists/Passwords/Common-Credentials/10k-most-common.txt

Let’s discuss about the above command, in this command we have used -m flag to specify the hash type, -a for attack mode and -o for output file, here we named our output file ‘cracked.txt’, then we give the target hash file to crack named ‘hashes.txt’, at last we specify the wordlist file to be used. In the following screenshot we can see that hashcat finishes the cracking job.

hashcat finishes cracking passwords

Let’s see our output file (cracked.txt).

hashcat password recovered

In the above screenshot we can see that hashcat cracked the hashes. Here for the new readers, in this attack mode we can crack those password hashes if the plaintext of the hashes is available in the wordlist file. Using bigger wordlist file will increase the chance to crack hashes.

Hashcat & Type of Hashes & Attacks

In the above we saw that we need to specify our attack modes and type of hashes we want to crack. These attack modes and hashes are refereed by numbers. Here we are giving hashcat supported all numbers that referees to the attack modes and the type of hashes (as Sep 2021, update of Hashcat tool may include some new things).

Attack Types of Hashcat

  0 | Straight
  1 | Combination
  3 | Brute-force
  6 | Hybrid Wordlist + Mask
  7 | Hybrid Mask + Wordlist

Hash types in Hashcat

Hashcat supports so much types of hashes if we include all them here then this article will very lengthy. We encourage to use hashcat – h command on our Kali Linux system to get all the numbers corresponding to the hash type (Uff.. It’s really large ?).

types of hashes on hashcat

Whenever we are trying to crack a hash we have to know the type of the hash. We can use hash-id tool to know the type of hash. Then we need to choose our attack type and wordlist. That’s all it’s not hard.

This is all about Hashcat, and how we can use Hashcat to crack passwords on our Kali Linux. Hashcat (#?) is really a very widely used tool for cracking passwords.

Love our articles? Make sure to follow us on Twitter and GitHub, we post article updates there. To join our KaliLinuxIn family, join our Telegram Group. We are trying to build a community for Linux and Cybersecurity. For anything we always happy to help everyone on the comment section. As we know our comment section is always open to everyone. We read each and every comment and we always reply.

Strategic Collaboration between EC-Council and the United Cooperative Assurance, KSA

Strategic Collaboration between EC-Council and the United Cooperative Assurance, KSA

United Cooperative AssuranceSeptember 29th 2021, Kingdom of Saudi Arabia – Security awareness is a significant cause for concern for organizations, and never more so than when users are working remotely. The use of cloud-based collaboration tools to facilitate remote work has increased the amount of sensitive data accessed by end-users. As a result, organizations are more prone to security vulnerabilities and insider […]
How to Install & Use Ngrok on Kali Linux

How to Install & Use Ngrok on Kali Linux

What is Ngrok ?

Ngrok is a multi-platform application that provides us to forward our local development server to the internet without port forwarding. Ngrok hosts our locally hosted web server in to a subdomain of ngrok.com. That means we can easily show our localhost in the internet without owning domain names/static IP or port forwarding.

Ngrok is a very good tool for the developers to check and show the projects to the clients before launching the project. But as everything it also be misused by the bad guys. They always trying to host their localhost phishing page on Ngrok to capture victims on the internet. So as a cybersecurity expert we need to look up on this Ngrok.

How to install ngrok on Kali  Linux

Warning:- Learning is the most beneficial way to protect everyone in the cybersecurity field, so our this article will focus on educational things. Ngrok is like a knife, knife is created for helping people to cut vegetables, but bad guys misuse it. Same for Ngrok also, it is created to help developers but bad guys misuse it. So don’t try to misuse it against anyone. We will not responsible for that.

Download & Configure Ngrok on Kali Linux

To install Ngrok on our Kali Linux system we need to open our browser and navigate to the official Ngrok’s download page. Then we can see the webpage like the following screenshot:

ngrok download page

Here we need to click on “Download for Linux”, because we are using Linux. For other OS we can go on the “More Options”. After clicking on download we can see that download is started.

download ngrok

After download the starting it may not take much time with decent internet. The ZIP file will be downloaded on our “Downloads” directory. We need to go to the “Downloads” directory and decompress the compressed file.

We open the terminal and use following command to go to our “Downloads” directory.

cd Downloads

Then we unzip the downloaded ZIP file by using following command:

unzip ngrok-stable*zip

In the following screenshot we can see that our zip compressed file is extracted.

ngrok zip extracting

Now our ngrok file is decompressed. Before running it we need to give it executable permission by using following command:

chmod +x ngrok

executable permission ngrok

Now we are all set to run. But wait, we need to setup Ngrok before running. We need to set authentication with Ngrok API token. Where I can get my token? Well for that we need to sign up on Ngrok website. Lets navigate to Ngrok signup page on our browser.

ngrok signup page

Here we need to fill up our name and email and choose a password. If we want we can use disposable mail address to login and verify our mail address we don’t need to give our own mail address.

logged in on ngrok

After verifying our mail address we can get the API token on the “Your Authentication” area on the sidebar, as we can see in the following screenshot:

ngrok authentication command

In the above screenshot we can see our Ngrok authentication API key and the command to set it up. For security we had hided a part of our API keys. So we run the command with API key to set up the Ngrok.

./ngrok authtoken 1xyqb*****************25PTTHqMpHqB

In the above command again we hided our the same API key with *. In the following screenshot we can see the output of the command:

ngrok authentication command

Now we are all set to run Ngrok. For an example we forward a locally hosted demo website to the internet.

Using Ngrok on Kali Linux

Ngrok’s work is simple it just host our local website to internet. So first we need a local website. Here we have a demo html page on our desktop, and we had opened it on Firefox browser.

website demo

But it is just a html page we need to host it locally. For that, we need to run a localhost server on our desktop. We open another terminal and go to the directory where our html page is stored. Then run python localhost server there to host the html page on our localhost by using following command:

sudo python3 -m http.server 80

In the following screenshot we can see that our local web server is started:

python3 http server

Now we can check it by opening our localhost IP on our browser 127.0.0.1. In the following screenshot we can see that page is now accessible by using our local host IP (127.0.0.1).

localhost server is started

Now this is accessible from our computer by using localhost IP (127.0.0.1), and from devices on the same network by using our Local IP (IP assigned by router for our Kali Linux system). But it isn’t available for other network, because this web server isn’t hosted on internet.

Now we leave our web host terminal as it is, and back to our previous terminal window (where we setup Ngrok), and run the following command to run Ngrok:

./ngrok http 80

Here we run the Ngrok script on http with port number 80, because our localhost server is running on port 80. (If we can’t use the localhost port 80 then we can use other ports like 8080 or 8888, in that case we need to specify our that port on Ngrok).

After that we can see our Ngrok is started as we can see in the following screenshot:

ngrok is running

In the above screenshot we can see our forwarding link. Using that forwarding link (in actual links both http and https) we can see our that page from our browser.

ngrok forwards our localhost site on the internet

Not only from our browser we can access it from anywhere on the internet by the link provided by Ngrok.

Ngrok site on Mobile

We can see that page on our mobile which is connected to mobile data (not in our WiFi network). This link will be active until we don’t close the Ngrok tunnel, but in real life uses Ngrok can’t run this for a long time in their free plan. It can be a temporary solution.

This is how we can use Ngrok on Kali Linux, this is the solution for hosting our local website or web server on the internet. Here we don’t need a static IP address neither requires port forwarding.

Love our articles? Make sure to follow us on Twitter and GitHub, we post article updates there. To join our KaliLinuxIn family, join our Telegram Group. We are trying to build a community for Linux and Cybersecurity. For anything we always happy to help everyone on the comment section. As we know our comment section is always open to everyone. We read each and every comment and we always reply.

EQT Private Equity invests in EC-Council, a global leader in cybersecurity training and certification

EQT Private Equity invests in EC-Council, a global leader in cybersecurity training and certification

global leader in cybersecuritySeptember 27th 2021 EQT Private Equity adds to its cybersecurity investments with a significant equity stake in EC-Council EC-Council contributes to narrowing the global cybersecurity talent gap and confronting the increasingly complex nature of cybersecurity incidents EQT will support EC-Council and its management team in its next phase of growth and innovation by leveraging EQT’s cybersecurity sector expertise, global platform […]

The post EQT Private Equity invests in EC-Council, a global leader in cybersecurity training and certification appeared first on EC-Council.

Open Whatsapp chat
Whatsapp Us
Chat with us for faster replies.