Convert ur image to ASCII with Backtrack

Saturday 31 March 2012

We make many or search many sms or photos in ASCII

now it will be not a problem now u can make any image or even ur image in ASCII
How to do it

Heres' the SECRET


** Open ur backtrack 5

*** in that open terminal
*** and type in command

apt-get install jp2a   this command will install the software ::

then put any ur image or any image having extension jpg on the dekstop

then type the command

cd Desktop and hit enter

then type command

ls to check the list of all the image u have in ur desktop in backtrack 5 :)


then command to convert the image is

jp2a (name of the image with extension .jpg) and press enter

like for example

jp2a pprasoon.jpg and press enter ur done ::


heres' the video tutorial see and do it ::  Click on me


© pprasoon nigam

HAPPY HOLI

Wednesday 7 March 2012


                          !!!! WISH U VERY VERY COLOR FULL HOLI !!!!




                                                              

Saade rang ko galti se aap naa kora samjho,
Isi mey samaaye indradhanushi saaton rang,
Jo dikhe aapko zindagi saadagi bhari kisi ki,
To aap yun samjho satrangi hai duniya usiki, 
Holi aayi satrangi rango ki bouchar laayi,
Dher saari mithai aur mitha mitha pyar laayi,
Aap ki zindagi ho mithe pyar aur khusiyon se bhari,
Jisme samaaye saaton rang yahi shubhkamna hai hamaari.



The First Person To Wish You “HAPPY HOLI”…
`
Rangon se bhi rangeen zindagi hai humari, rangeeli rahe yeh bandagi hai humari, kabhi na bigde ye pyar ki rangoli, aye mere yaar aisi HAPPY HOLI.
`
Fulo Ne Khilna Chhod Diya Taro Ne Chamkna Chhod Diya Holi Me Baki Hai 2 Din Fir Aapne Abhi Se Nahana Q Chhod Diya. Happy Holi
`
Holi Ke din ki ye mulakat yaad rahegi, rango ki ye barsaat yaad rahegi! Aap ko mile rangeen duniya aese hamesha, ye meri dua rahegi! Holi Mubarak…

********************************************************

Try some new HACKS and Interesting tricks


Download ANDROID Applications => Click on me :))

WIFI hacking GUI version => Click on me :))

VIRTUAL MACHINE

What is VIRTUAL MACHINE ?

HERES' THE SECRET

                A self-contained operating environment that behaves as if it is a separate computer. For example, Jave applets run in a Java virtual machine (VM) that has no access to the host Operating system. This design has two advantages:
  • System Independence: A Java application will run the same in any Java VM, regardless of the Hardware and Software underlying the system.
  • Security: Because the VM has no contact with the operating system, there is little possibility of a Java program damaging other files or applications.
The second advantage, however, has a downside. Because programs running in a VM are separate from the operating system, they cannot take advantage of special operating system features.


System virtual machines
  • multiple OS environments can co-exist on the same computer, in strong isolation from each other
  • the virtual machine can provide an instruction set architecture (ISA) that is somewhat different from that of the real machine
  • application provisioning, maintenance, high availability and disaster recover
The main disadvantages of VMs are:
  • a virtual machine is less efficient than a real machine when it accesses the hardware indirectly
  • when multiple VMs are concurrently running on the same physical host, each VM may exhibit a varying and unstable performance (Speed of Execution, and not results), which highly depends on the workload imposed on the system by other VMs, unless proper techniques are used for temporal isolation among virtual machines.
Multiple VMs each running their own operating system (called guest operating system) are frequently used in server consolidation, where different services that used to run on individual machines to avoid interference are instead run in separate VMs on the same physical machine.


Imp Note ::
                        If u have a windows 98 O.S running in your system :: just install virtual machine and you can run windows 7 and linux and evey O.S u want ::

Virtual machine is very helpful for the beginners who have started studying learning ethical hacking :::  make virus run on virtual machine this will not make any damage to your system

Virtual machine help to make work on any software :: it will help ya in everything you want ::

Download Virtual machine => Click one me



NMAP Tutorial (BACKTRACK)

Tuesday 6 March 2012

What is NMAP ?

HERES' THE SECRET

Nmap (Network Mapper) is a security scanner used to discover hosts and services on a computer network, thus creating a "map" of the network. To accomplish its goal, Nmap sends specially crafted packets to the target host and then analyzes the responses. Unlike many simple port scanners that just send packets at some predefined constant rate, Nmap accounts for the network conditions during the run.
Nmap has been able to extend its discovery capabilities beyond simply figuring out whether a host is up or down and which ports are open and closed

NMAP can determine the
                             operating system of the target,
                                       names and
                                              versions of the listening services,
                                                          estimated up time,
                                                                      type of device,
                                                                                and presence of a FIREWALL.

Nmap runs on
                       Linux,
                                Microsoft Windows,
                                                Solaris
                                                     ,HP-UX
                                                           and
                                                               BSD
 Linux is the most popular Nmap platform with Windows following it closely

****************************
Hack WIFI with the GUI version in BACKTRACK => Click on me :))
******************************************

Features of NMAP

Nmap features include:
  • Host Discovery – Identifying hosts on a network. For example, listing the hosts which respond to pings or have a particular port open.
  • Port Scanning – Enumerating the open ports on one or more target hosts.
  • Version Detection – Interrogating listening network services listening on remote devices to determine the application name and version number
  • OS Detection – Remotely determining the operating system and some hardware characteristics of network devices.
  • Scriptable interaction with the target – using Nmap Script Engine  [WIKIPEDIA HELP]
**********
Make BACKDOOR help of BACKTRACK TERMINAL => Click on me :))

*********************************
COMMANDS OF NMAP

Open ur konsole in backtrack and type all the commands and see their working and do connect to internet also :)

* type nmap and press enter :: to see all the commands of nmap

** Nnow how to scan ips in range and to see how many are alive :: command is
           nmap -sP 192.168.254.0/24
*** Now how to scan ip in a specific range :: command is
            nmap -sP 192.168.254.99-106
like we are scanning ip from 99 to 106

**** Now we will do stealth scan to see how many ports are open on the specific ip :: command is
            nmap -sS 192.168.254.102 and press enter
***** Now to find what operating system running on the ip address :: command is
             nmap -O 192.168.254.102

****** Now to scan for TCP connect :: command is
             nmap -sT 192.168.254.102

******* Just a null scan to check wether ip is alive or not :: command is
             nmap -sN 192.168.254.102

******** Now to scan for UDP connect :: command is
             nmap -sU 192.168.254.102

********** To scan for IP Protocol :: command is
            nmap -sO 192.168.254.102

*********** To check  ACKNOWLEGMENT (ACK) :: command is
            nmap -sA 192.168.254.102
************* To scan for which windows is running :: command is
            nmap -sW 192.168.254.102

© pprasoon nigam