Computer, Hack, Hacking, Internet, Technology

Self Hack Report 101

========== Self-Hack Attempt 101 Report =========
So I have two laptops at home, both connected to the same WiFi which I am an admin of.
Today I was trying to simulate a hack on one of the machines, let’s call it A using the second one, B. Both machines are running Linux, but that shouldn’t matter.
Laptop-A was supposed to run a script that performs a hack attack on B using what we call ‘Ping Of Death DoS Attack’. Basically, laptop A launched 20 parallel threads each sending 500 Service-Me requests on laptop B, each millisecond for 30 seconds. That’s a total of 300,000,000 (300 million) requests in just 30 seconds.
To cut the story short, I overlooked the mechanisms that I used, I actually ended up bricking my WiFi LTE router, which I had to hard-reset and I also froze laptop A, the attacker.
Basically, the attack bounced back and attacked the attacking computer, not the target, because each GET-request waited for a response, and they all piled up in a waiting queue, and eventually filled up the RAM, killing my computer (8 Gig RAM, Octa core processing units, intel i7). I had to reboot it.
The target computer did not get affected in the process simply because those thousands of requests could not get served passed the WiFi router. So in essence, if the target laptop, B, was a global web server, it would have not crushed, but just inaccessible. So in other words, I can say that the attack succeeded in terms of DoS definition.
================= End of Report 101 =============
Advertisements
Computer, Internet, Technology

Dark Internet vs Deep Web

Have you heard of “Dark Web” also known as “Deep Web” and another one called “Dark Internet”, also known as “Dark address” or “dark address space”?

These two are parts of the World Wide Web – the Internet. The first, Dark Web or Deep Web, is part of the network which is not publicly accessible or searchable. It is the ‘hard-to-find’ websites. This includes sites that need a special software or configurations to access – like most peer2peer file-sharing networks. Usually contain harmful or illegal distribution of files. Like Torrents ftps and tunnels. This also refers to websites that are accessible on the Internet, yet they are not indexed by standard search engines.

The latter, Dark Internet, can be confused with the former. The difference is very little. It is part of the Internet that is kept secret yet contain safe content. It is usually kept secret because people do not need to search for such data and not relevant for the public. For example, I could host an application or website on my personal computer, where I share information only relevant for my job with my colleagues – that means I’ll have to give them my IP address, which may not be the same every time, and give them some login credentials.

Really, feel free to confuse the two! They are just similar, really! But not so similar in the exam room. Lol

Ok! That’s enough for the day!

Technology, Uncategorized

Did you know why your Microwave Oven spins inside?

Have you ever wondered why most microwave ovens spin while operating? Here’s a quick break down for you.

Alright, this is my home microwave oven. If you look at the right wall, there is a silver patch. That is a called “Radiator”, well, at least there is a radiator behind it.

During operation, electromagnetic waves called “microwave” are generated by what is known as “magnetron”. Those waves are projected through that silver patch into the food-compartment. So the plate has to keep turning to ensure that your food gets a far amount of heat, otherwise you will have only one side of your food cooked – we both know that you don’t wanna end your day with a meal like that.

 

With other designs, like those that do not spin, the energy is projected directly into the center of the  plate and at an angle to the top of the food-compartment where it would be reflected to the other side of the plate – this just makes sure that the energy is applied fairly across the food.