Today we will make Kali Linux in our Windows 10.
So, the official Kali Linux app has appeared in the store, we need to install it.
Chntpw: Reset and bypass the Windows password
chntpw is a utility for viewing some information and changing user passwords in the Windows NT/2000, XP, Vista, 7 SAM user database file, usually located in \WINDOWS\system32\config\SAM in the Windows file system. In Kali Linux, it is already installed natively.
TheFatRat: Massive Exploit Tool
Thefatrat is a massive tool that allows you to bypass most antivirus programs.
A simple tool for creating a backdoor to bypass AV and an easy tool for a post-exploitation attack, such as a browser attack, DLL.
This tool compiles malware with a popular payload, and then the compiled malware can be run on Windows, Android, Mac.
Fsociety - framework for hacker
Greetings, dear reader! Today we will talk about the Fsociety framework. This framework contains all the tools used in the notorious Mr. Robot series. The framework structure consists of a huge set of tools for conducting penetration testing sorted by categories from information collection to post-operation. The advantage of Fsociety is that it can be run on Windows, Linux and Android. For the framework to work, you need to have Python 2.7.
How mobile operators analyze our data
Mobile operators receive a lot of data and metadata, from which you can learn a lot about the life of a single subscriber. And having understood how this data is processed and stored, you will be able to track the entire chain of information passing from the call to debiting money. If we talk about the internal intruder model, then the possibilities are even more enormous, because data protection is not included in the tasks of the mobile operator's pre-billing systems at all.
Fundamentals of information security
Each of us has heard a lot about the concept of "information security" (IS), but for most these words remain an empty sound. For the vast majority of those who have an idea about information security, its basic principles are a sealed secret and only a few professionals can tell what information security is. Practitioners will not learn anything new, but it will be useful for "ordinary people".
Information security
Information protection
Wikipedia
The practice of preventing unauthorized access, use, disclosure, distortion, modification, research, recording or destruction of information. This universal concept applies regardless of the form that data can take. The main task of information security is the balanced protection of confidentiality, integrity and availability of data, taking into account the expediency of application and without any damage to the productivity of the organization. This is achieved mainly through a multi-stage risk management process, which allows identifying fixed assets and intangible assets, sources of threats, vulnerabilities, potential impact and risk management capabilities.