JUST LEARNING - HACKING - OS
WHAT'S NEW?
Loading...

How To Access Deep Web

This is my first tutorial and it is about accessing deep web for total beginner
Introduction:Internet has commonly three parts as per my knowledge 1st:surface web,2nd :Darknet and 3rd :Deep web
Surface web:We use surface web most of the time and they are websites or resources which can be accessed by search engine such as google,bing, duckduckgo or anything.They are the sites which can be accessed by our simple web browser like Firefox or chrome.It is in upper part in internet.
Darknet :Darknet or clearnet are basically middle of internet which contains both surface web and deep web resources.It is smaller than deep web and it is used for mostly file sharing and other like privacy,cybercrime,leaks.It is not too deeper.you will need tor browser to access it.
Deep web:This is the last stage of internet as per my knowledge but people say there are upto 8 stage of internet like mariana web or something.but I will particularly tell about deep web. It is in below of darknet and surface web.The website of deep web is also not indexed by standard search engine.so you basically need tor browser. This size of deep web is approx 550 times larger than surface and it consist of about 7.5 petabytes so you can think yourself how big it is.Things in deep web is more worst than deep web like Hitmens for killing,Malicious hacker for hire,child pornography,They can Hack you're own camera,disturbing videos and image like ISIS red rooms,drugs,marijuana and many worst things.you should always think before going to it.

1. Browser(Tor Broser)

First of all you will need a browser known as tor and to get it just go to:https://www.torproject.org/download/download.html.en and download the latest version for you're computer.
Then open you're tor browser then it will connect to tor network.then you will see a windows like this.
It will say that you're connected to tor.then you're ready to go.

2. Privacy and Anonymity

Important step:There will be S logo in left of browser click on it and click"forbid scripts globally" and most important step is to be safe before going to deep web.Use vpn or proxy before accessing deep web because there are many malicious people in deep web which will hack you're privacy and can do anything to you.I personally suggest you to use I2P and turn on you're firewall and antivirus if you have.You can do anything like covering camera with tape or anything and don't download anything from deep web which will harm you.you know what I'm talking about or you and you're privacy may be on deep web.

3. Going Deeper with Tor

You can go to hidden wiki:


Search engine known as Torch where you can search things:http://xmh57jrzrnw6insl.onion.to/ and best private search engine known as Duckduckgo:https://3g2upl4pq6kufc4m.onion.to/
Wikileaks:http://gjlng65kwikileax.onion/
http://zbnnr7qzaxlk5tms.onion/


facebook:https://facebookcorewwwi.onion/
These are the good ones but you can get bad and worst things in deep web such as drugs,child pornography,disturbing images and videos,weapons,hitmens for killing people,blackhat hackers for hire.
If you want these things whole links are in here:


Warning:But plz be careful while going to deep web because it may make you're life worse because I go to it once a day for seeing new things like stage of deep web which people talk but everyday I see more worse things.If anything happens to you I am not responsible because I did this post only because I saw many people writing "How to access deep web" and guys this is end of this written tutorial. please forgive me if I made any mistake I will certainly learn from it and make better tutorial.



Become Anonymous & Browse the Internet Safely


We all know about PRISM. The Surveillance Program allowing the U.S Government to access private user information. Such as, Google Searches, Tweets, Facebook Posts, Private Images, and other private user data. "Hiding" yourself can be very difficult, but it is possible. I'm here to show you How to Become Anonymous & Browse the Internet Safely.

1. Deleting Old Email & Social Accounts.

Removing your real identity from social media sites and website databases is important when keeping your real identity Anonymous. If that is not possible (for instance, email accounts or other) change the name of said account to a random name, thus making it seem like a different person. (If your email is something like: "JonDoe123@email.com" then deleting the account would be better for you)

2. Worry Free Site Browsing

Using a normal browser such as, Firefox, Chrome, Safari, Opera, and others won't work in terms of staying anonymous. These browsers don't encrypt the users data, leaving it open to phishers and keyloggers. If you want to stay anonymous, then you need to download Tor. Tor allows full privacy and encryption. It has many features, some include,
  • Automatic IP Changing (allowing you to make accounts without being traced)
  • NoScript (disallows certain "suspicious" scripts and cookies from showing and saving your data)
  • Anonymous Networking (allowing encrypted browsing)
  • and many more...
Tor also includes a cracked version of Mozilla Firefox, all plugins included. The downside to Tor is that, it disables mandatory plugins such as, Flash, Java, and other important scripts. These can be re-enabled by installing them manually in the Tor Directory.

3. Precautions for Signing Up on Website's

If you're like me and like to use sites like, Gmail, YouTube, Twitter, and others, then you'll need to use a Fake Name, Fake Date of Birth, and Fake Profile icon. These factors are the most important when masking your real identity. Using your creativity can benefit you most of the time, but if you can't think of a Name, Username or Password then Name Generators can do the trick. Websites like:


All of these can benefit you when making a new Email, YouTube Account, Twitter, or even Facebook.

Please Note

Use these tips in line of other tips such as, Encrypting your files, passwords and others.


P.S This was my first post here so please be gentle with criticism.

Kali Linux vs. Backbox: Pen Testing and Ethical Hacking Linux Distros

Hackers as portrayed on the big screen are usually sitting hooded in front of a monitor with sleek, shiny black hat tools laid out on the screen. Though in reality such tools in past years were mostly CLI-based, a new generation of penetration testing (pen testing) and ethical hacking tools feature both slick UIs and powerful functionality for testing cyber security controls and posture. In this comparison, we'll look at two of the best: the Kali Linux and BackBox Linux pen testing and ethical hacking distros.

1. Kali Linux by Offensive Security
Maintained and funded by Offensive Security, Kali Linux is a Debian-based distro chock full of pre-installed security and pen testing tools—over 600 to date. Some examples include nmap, Wireshark, John The Ripper, BURP Suite, OWASP ZAP, and Aircrack-ng, among others. Check out our comparison of Netcat and Wireshark for protocol analysis  —in this case, it comes packaged with Kali Linux.


2. BackBox Linux
To both black and white-hat hackers alike, Ubuntu-based BackBox needs little introduction; the popular network and systems security analysis toolkit includes a suite of ethical hacking and security testing tools for a wide array of purposes: web application analysis, network analysis, stress testing, vulnerability assessment, computer forensic analysis and exploitation, and more.

3. Scoreboard and Summary
The following is the scoreboard for Kali Linux vs. BackBox Linux based on the 12 criteria listed above:
        Kali Linux   BackBox Linux
Capability Set 
Ease Of Use star5-1.pngstar2-1.png
Community Support star5-1.pngstar5-1.png
Security and Surface Attack Probability  star2-1.pngstar2-1.png
Release Rate star2-1.png
Pricing And Support star2-1.png
API and Extensibility star2-1.png
3rd Party Integrationsstar2-1.png
Bug Bounty Program star2-1.png
Companies That Use It
Age Of Language Developed In/Used
Learning Curvestar2-1.png
Total5546
Average Score

Both solutions are excellent distros for pen testing and white hacking use cases, and both are free and open-source, so cost will never be an issue. Those that require commercial support and other perks that a for-profit-backed project enjoys (e.g., a bug bounty program) should probably go with Kali. And for continuous security monitoring and vulnerability assessment, ScriptRock is the platform to beat. Try it today, the first 10 nodes are on us. 

    Top 10 Best Books For Learning Hacking 2016

    Top 10 Best Hacking Books

    Best books for learning hacking: As you all know that a lot of teenagers want to turn out to be a “HACKER“. However, hacking isn’t a simple task. Learning Ethical hacking shouldn’t be an easy task you need to learn many Hacking Books after which implement these ideas or strategies. Then invent new methods to grow to be an ethical hacker.
    Hacking Is Not A Crime; It Is An Art
    If you want to become ethical hacker then here is a good useful resource for you ! Sure, here is handpicked the collection of Best books for learning hacking edition with hundreds of newest hacking tutorials. If you wish to learn ethical hacking then just download hacking books from below and start exploring the Hacking World.

    1.     THE HACKER’S UNDERGROUND HANDBOOK

    This book will take you from the core to the top. It can inform you learn how to hack in simple steps. All the things are introduced in an easy and efficient method. It’s a nice source for the newbie who wish to become a Hacker. This can set up a Hacker’s Mindset on you.
    The following Features include in this book:

    ·        You’ll be taught all of the hacker underground tips and learn to use them in real-world situations.
    ·        You may be put into a hacker mindset and be taught to suppose like a Hacker.
    ·        By studying how a hacker thinks and acts, it is possible for you to protect yourself from future hack attacks.
    ·        You’ll acquire knowledge nonexistent to 99.9% of the people in the world!
    ·        This Underground handbook may get you interested in pursuing a career as an Ethical Hacker.
    This book is of great value for all those that have a dream to become a Hacker.

    2.     HACKING FOR DUMMIES

    There may be certainly no shortage of books on this genre- Counter Hack, Hack Attacks Revealed and the best-selling Hacking Exposed (and all of its spin-offs) have covered this information in exhausting detail. What sets this book aside is that it doesn’t assume you’re already a CISSP or network security analyser. Being a “For Dummies” book signifies that it’s written from the idea that you just don’t know something and the knowledge is written in plain English and in terms that even a youngster may often understand.

    3.     OFFICIAL CERTIFIED ETHICAL HACKER  STUDY GUIDE

    Kimberly Graves, CEH, CWSP, CWNA, CWNP has over 15 years of IT experience. She is a founder of Techsource Network Options, a network, and safety consulting group situated within the Washington, DC area. She has served as subject matter knowledgeable for a number of certification programs together with the Certified Wireless Network Professional (CWNP) and Intel Certified Network Engineer programs and also has developed the course materials for the Department of Veteran Affairs, USAF, and the NSA. The Certified Ethical Hacker examination is quickly becoming some of the popular security certifications offered today. Candidates much prove their ability in not only figuring out security risks from all levels but also how to tackle these risks. This book provides a concise, simple to follow the strategy to this difficult exam.
    The following Features include in this book:
    ·        Introduction to Ethical Hacking, Ethics, and Legality
    ·        Footprinting and Social Engineering
    ·        Scanning and Enumeration
    ·        System Hacking
    ·        Trojans, Backdoors, Viruses, and Worms
    ·        Sniffers
    ·        Denial of Service and Session Hijacking
    ·        Web Application Vulnerabilities , Hacking Web Servers and Web-Based Password Cracking Techniques
    ·        SQL Injection and Buffer Overflows
    ·        Wireless Hacking
    ·        Physical Security
    ·        Linux Hacking 177
    ·        Evading IDSs, Honeypots, and Firewalls
    ·        Cryptography
    ·        Penetration Testing Methodologies

    4.     WEB HACKING ATTACK AND DEFENSE

    The book provides you details about  how Web hacking happens and teaches you enhanced ability at developing defenses in opposition to such Web attacks. Technologies lined within the book include Web languages and protocols, Web and database servers, payment systems and shopping carts, and also added critical vulnerabilities related to URLs. This book is a virtual battle plan that may make it easier to identify and eliminate threats that would take your Web site offline.
    Whether it’s petty defacing or full-scale cyber robbery, hackers are transferring to the Web along with everyone else. Organizations using Web-based business applications are frequently affecting risk. Web Hacking: Attacks and Defense is a powerful guide to the most recent info on Web attacks and defense.
    The following Features include in this book:
    ·        Overview of the Web and what hackers go after
    ·        Complete Web application security methodologies
    ·        Detailed analysis of hack techniques
    ·        Countermeasures
    ·        Cyber graffiti and Web site defacement
    ·        E-Shoplifting
    ·        Database access and Web applications
    ·        Java™ application servers; tips on how to harden your Java™ Web Server
    ·        Impersonation and session hijacking
    ·        Buffer overflows, and the most wicked of attacks
    ·        Automated attack instruments and worms
    Appendices include a listing of The Web and the database ports, cheat sheets for a remote command execution, and source code disclosure techniques and so on.

    5.     GRAY HAT HACKING

    This book is very helpful for both beginners and professionals. It provides the reader detailed knowledge of penetration testing. It also has chapters on Linux and windows exploits.
    The following Features include in this book:
    Introduction to Moral Disclosure,
    ·        Penetration Testing and Tools ,
    ·        Exploits 101,
    ·        Vulnerability Analysis,
    ·        Malware Analysis

    6.     HACKING WIRELESS NETWORK WITH DUMMIES

    Today wireless networks are everywhere.
    The following Features include in this book:
    ·        Perform ethical hacks without compromising a system
    ·        Combat denial of service and WEP attacks
    ·        Understand how invaders think
    ·        Recognize the effects of various hacks
    ·        Protect against war drivers and rogue devices
    (to be continued)