<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html">
    <channel>
        <title><![CDATA[Stories by Hamza Paracha on Medium]]></title>
        <description><![CDATA[Stories by Hamza Paracha on Medium]]></description>
        <link>https://medium.com/@parachaham?source=rss-74a0cf235140------2</link>
        <image>
            <url>https://cdn-images-1.medium.com/proxy/1*TGH72Nnw24QL3iV9IOm4VA.png</url>
            <title>Stories by Hamza Paracha on Medium</title>
            <link>https://medium.com/@parachaham?source=rss-74a0cf235140------2</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Thu, 07 May 2026 08:55:21 GMT</lastBuildDate>
        <atom:link href="https://medium.com/@parachaham/feed" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <item>
            <title><![CDATA[Kali Linux: Nmap]]></title>
            <link>https://medium.com/@parachaham/kali-linux-nmap-c4e588dda8b5?source=rss-74a0cf235140------2</link>
            <guid isPermaLink="false">https://medium.com/p/c4e588dda8b5</guid>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[nmap]]></category>
            <category><![CDATA[kali-linux]]></category>
            <dc:creator><![CDATA[Hamza Paracha]]></dc:creator>
            <pubDate>Thu, 07 Sep 2023 20:34:49 GMT</pubDate>
            <atom:updated>2023-09-07T20:34:49.888Z</atom:updated>
            <content:encoded><![CDATA[<p>Kali Linux and How it Works with Nmap:</p><p>Kali Linux:</p><p>Kali Linux is like a super operating system in the world of cybersecurity and ethical hacking. It’s built specifically for tasks like penetration testing, digital forensics, and network security checks. People in the know use it because it comes packed with a ton of tools that make life easier for security professionals in the industry and enthusiasts like me!</p><p>Nmap in Kali Linux:</p><p>Nmap, which stands for “Network Mapper,” is one of the essential tools that come with Kali Linux. What’s cool is that it’s seamlessly integrated into Kali’s system, so you don’t have to jump through hoops to use it. You can get to it from the command line or through a user-friendly graphical interface.</p><p>Here’s how Nmap fits into Kali Linux:</p><p>Using the Command Line: If you’re comfortable with the command line, you can open a terminal window in Kali Linux and simply type “nmap” followed by the specifics of your scan, like the IP addresses or hostnames you want to check. Nmap’s command-line magic lets you fine-tune your scans as much as you want.</p><p>Going Graphical: Kali Linux also has a user-friendly version of Nmap called “Zenmap.” It’s like the point-and-click version of Nmap, perfect for those who prefer a more visual approach. Zenmap offers different scanning profiles and even some cool ways to visualize the data.</p><p>Why Nmap in Kali Linux is Awesome:</p><p>Having Nmap integrated into Kali Linux makes this duo pretty amazing for security pros and even aspiring hackers. Here’s why:</p><p>Sleuthing Networks: Nmap is your detective when it comes to finding out what’s on a network. It can scan the network, identify devices, spot open doors (ports), and even tell you what services are running behind those doors.</p><p>Hunting for Weak Spots: For the security experts, Nmap is the tool to hunt down vulnerabilities. It sniffs out open ports and services, helping you figure out what needs fixing or securing.</p><p>Cyber Sneak Attacks: If you’re into penetration testing, Nmap is your sidekick. It helps you simulate cyberattacks, checking how strong or weak a system or network’s defenses are.</p><p>Spotting Intruders: Nmap’s regular scans in Kali Linux can act like a security alarm. It helps detect any odd changes, new devices, or suspicious activity on a network, which is crucial for keeping out unwanted intruders.</p><p>In a nutshell, Kali Linux is the superhero OS for cybersecurity, and Nmap is one of its trusty tools. Together, they simplify tasks like network checks, vulnerability assessments, and penetration testing, making them essential for anyone working to secure computer systems and networks. Just remember to use these tools responsibly and stay within the boundaries of ethical and legal guidelines.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=c4e588dda8b5" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[White Hat Tools]]></title>
            <link>https://medium.com/@parachaham/white-hat-tools-8e2534b076ff?source=rss-74a0cf235140------2</link>
            <guid isPermaLink="false">https://medium.com/p/8e2534b076ff</guid>
            <category><![CDATA[cybersecurity]]></category>
            <dc:creator><![CDATA[Hamza Paracha]]></dc:creator>
            <pubDate>Thu, 19 Jan 2023 20:43:13 GMT</pubDate>
            <atom:updated>2023-01-19T20:43:13.187Z</atom:updated>
            <content:encoded><![CDATA[<p>Nowadays, computer technology is a common skill for people to learn, or at least many people already have some knowledge about it. With every good coming, there will always be a badcoming, and the same implies for technology. For example, when Windows (the most famous operating system for PCs) came out, it was revolutionary and to this day it is the most popular OS, but it didn’t come out without flaws, hackers and other malicious people and bots found loads of vulnerabilities and bugs in the system that were abused and caused catastrophe to the basic user.</p><p>Today, the term “Hackers’ is mostly used when someone has found an exploit in a system and uses that for malicious purposes, who is a blackhat hacker, which isn’t always the case. There are white, gray, and blackhat hackers who only do as they please. Blackhats are the hackers that do illegal things, steal info, and spread malicious software. Whitehat hackers, which in modern day terms are called ethical hackers, are hackers that only use their skills for good to find vulnerabilities and help that company/system to fix them and ensure maximum security. Grayhats are usually in the middle, and their main purpose is to make the maximum amount of money. They will do illegal things and they will also partake in bug bounties and perform vulnerability tests for a reward.</p><p>Today I will talk about blackhat hackers and their tools and software. First and foremost, <strong>every single hacker </strong>must know networking and computer technology in and out. They must know and understand it 100% and can reverse engineer to find bugs. Later on, computer science and hardware engineering comes into play for bots and the tools I will talk about.</p><p><strong>USB Rubber Ducky</strong></p><p>A USB Rubber Ducky is a small USB device that connects into anyone’s computer simply through the USB slot. It is masked as a keyboard so Windows and MACos defense systems cannot block the connection as the device isn’t used for a very good purpose. Let’s first talk about the hardware.</p><p>A USB Rubber Ducky is an SD card to USB that is enforced with a force code. A force code is a code that is embedded into the hardware, something that forces the USB to run on the PC and overrides the system’s default security. It cannot block it because it is masked as a keyboard and you need a keyboard to use a PC. You can write and store code inside the SD card. When the SD card and the Rubber Ducky have a successful connection with the PC, it automatically runs and finishes in seconds. Usually, the code is written in python or in a batch file, which both run extremely fast on a PC. You can deploy web servers, ransomware, viruses, RATs, and all sorts of malicious software to harm your victim.</p><p><strong>WiFi Pineapple</strong></p><p>A WiFi pineapple is an advanced wifi extender which acts like you are the official network administrator. Pineapples are usually used in public networks like coffee shops and malls. When people connect to the network without any virtual private networks, then the Pineapple makes the encrypted traffic visible to you. You can see who is the sender, the destination, its content (by using its built-in encryption software) and info about the sender itself. You can forward a connection to longer ranges and act as if your pineapple is a valid extender. Most of it happens automatically because of the brute-force mechanism and the encrypter that unpacks packets to find the keys. Once the WiFi key is found, it connects right away and forwards info to one of the valid routers, but it stores the info so you can see all the network traffic.</p><p>Both of these amazing devices used together can be an amazing start to becoming a professional blackhat hacker, you can insert a USB into someone’s laptop without their knowledge, or, have them connect to your WiFi pineapple which is masked as the shop’s network. Either one of the ways can cause a lot of harm to the users because if your software can multiply it can indefinitely spread to each and every person who is discoverable on that network. These types of viruses are called trojan horses or virus worms, depending on the creator’s means of the attack.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=8e2534b076ff" width="1" height="1" alt="">]]></content:encoded>
        </item>
    </channel>
</rss>