David Wheeler

“All problems in computer science can be solved by another level of indirection.”

Edsger Dijkstra

“Simplicity is prerequisite for reliability.”

Joel Spolsky

“It’s harder to read code than to write it.”

Martin Fowler

“Any fool can write code that a computer can understand. Good programmers write code that humans can understand.”

Andy Hunt and Dave Thomas

“Don’t repeat yourself. Every piece of knowledge must have a single, unambiguous, authoritative representation within a system.”

Contact Form

Name

Email *

Message *

Tuesday, September 8, 2020

About VPN

 VPN (VIRTUAL PRIVATE NETWORK)

Hello friends welcome to BharamGyani's blog today we will discuss about VPN in the simple language. Most of the peoples confused on VPN its also a network. Network??? Suppose in your home all personal devices are connected with the help of router or modem and able to share files and data because of they create a network into each other. That is your private network. In the large scale all devices are connected each other with the help of a network that is known as Internet. We can surf any website from any where with the help of internet and device IP addresses. In simple tour IP addresses is a internet protocol address who tell all information about device and location. Now simply understand, your device connected to internet and also other device are connected already to internet(which is public network) , your service provider, Government and hacker can track your activity cause of they also connected to this wide network.



What is VPN

The history of VPN technology date back to 1966, when microsoft employee mr. Gurdeep Singh pal developed peer to peer tunneling protocol or PPTP. In 1999 the specification was published(--from internet). In the simple term, virtual private network name also indicate that , its create a private network by using the public network (which is internet) that is connected to world  wide. Private network are connected to world wide vpn server. By using this vpn user surf internet privately. VPN create a tunnel between client and server nobody can see which service you are used on internet. its make you a anonymous. VPN gives end to end privacy.





Why we are using VPN

Now question is that,Should we use vpn or not if yes --why. We already understand about vpn. By using vpn your internet will be invisible in public network, your service provider, Government agency and Hacker nobody can see your activity or hack your network and can't be track you. Well vpn change your location and using a virtual IP which is lie in another country, that means you are in india but some websites are banned here by vpn you can surf these websites from another country with tunnel privacy that is the benefits but remember use only trusted or paid vpn's god's know your vpn service provider are leaking your information intentionally or unintentionally because of its weak server, system or security.

Setting-up VPN

Now question is that how to set-up my vpn in my laptop, desktop or mobiles. There are two ways to set-up first is manually and second is by using a application who manage everything for you. Manually ways are very tricky but in simple you can download application from site or play store for mobile. After downloading login on it and select any counry and enjoy your independent internet without ant fear. 



Examples of VPN :- ProtonVPN, Avast VPN and AVG VPN etc. 



THANK YOU GUYS FOR VISITING...............

Author

Sandeep singh






Sunday, August 30, 2020

What is Metasploit


Metasploit

Hello friends this is BharamGyani and today we will discuss about on METASPLOIT in the simple way. What is Metasploit why we are using metasploit.So let's start with us.....



What is Metasploit

Before starting about metasploit we should know what is hacking, I know if your searching about metasploit that's means you have already knowledge about hacking but we take a little tour , So hacking is process or way by using this you can take access to any other network, system, server or websites with permission or without permissions. white hat hacker's take permissions before hacking any site for checking vulnerability like Pen-Testing.


Now we start metasploit, when we are checking security loops, vulnerability or we are taking unauthorized access, also known as Pen-Testing(Penetration Testing) that's time we have use many tools. That's tools provided by Metasploit. Metasploit is a community in which many hackers and pen testers connected with it. they are earn bread butter with help of it and make it update day by days. Till here government also give websites to this community for checking security loops or vulnerability in written permission. back to metasploit, So metasploit is a project which was started in 2003 and totally written in PURLS programming language after this Metasploit revised in 2007 and witten Ruby language completely. time to time metasploit updated and now day's they reach in stable position. This metasploit preinstall in Kali linux operating system. and made a big space in Kali linux.



Special notes:- If anyone gives you a verbally permission to hack his website so please ignore him don't do any hacking activity on it  take written permission first.


Thanks and regards

 Sandeep singh

Saturday, August 22, 2020

What is Surface web, Deep web, Dark web and marianas web

 What is Surface web, Deep web, Dark web and Marianas web?

Hello friends welcome to BharamGyani's blog. Today we discuss about web , there are mainly three type of web i.e Surface web, Deep web and Dark web besides these there is a another web that is Marianas web but this web have no prove it's exist or not. So we will start discussion one by one.


Below image describe three web in simple way:
 

Surface web

We all browse the internet and serve the websites normally by using search engines that is surface web. surface web is a upper or top layer of the internet which is available for all user who using the internet. suppose we search anything like what is internet on google search engine all website appear on your browser without any authentication because this is available for everyone or indexing on search engines that is on surface web.   


Deep web

Deep web, After the Surface web next layer of the web will appear. In the surface web all content appear on search engine but in deep web content not appear on search engine . confidential site , security company's they want only limited person see our websites who have authentication login details. suppose any company dealing with another particular company and they using internet to transfer and communication to each other they made a website and make a login page now only who access this website who have login details only a particular company will access this because he have its URL and login details this website not indexing on any search engine, user should have a URL for access. Deep web can browse from any browser.

 

Dark web

After the deep web next layer of the web appear that is Dark web. That is bottom and last part. Dark web play his Role in unrecognized way, most of the people don't know what is dark web. Till here normal peoples does not have URL to serve this kind of websites. This kind of website have .ONION 
domain because of dark web security structure that is layering system like onion.
This type of sites not appear on search engine and not recognize by government agency. That is the reason Dark web is used for only illegals activity. All types of illegals activity completed on it. I advise do not go in the dark web if you don't have knowledge cause of this you will trap and you loss your data, privacy and security and got hacked. Now question is that, can it browse from our browser? no absolutely no. The .onion websites browse by only particular browser that is TOR BROWSER .


Marianas web

Marianas web in now day's that is theoretical may be it is exist but it's not have any prof. Marianas will come after Dark web. behind the universe its exist. It is possible that any body or any group operate this confidentially from the world but in normally there is no more knowledge or information.


 



  This content only for education purpose. we recommend that do not enter in Dark Web this dangerous for your security.


Thank you guy's for reading please tell us how you feel after reading this artical 
Author:
Sandeep Singh

Monday, August 10, 2020

Track IP Address via Termux


Track IP Address via Termux 


IP Address tracking is cool thing you can showoff your friends with iptacker. Its also help for serious notes. By using Android mobile you can see which service your target use. what is location of your target and many more details you can get by this tool.

(Note:- This content only for Educational purpose)




What is IP Address

First of all we have to know what is ip and how it help to networking. IP ADDRESS (internet protocol address) is an address of any electronic device which is connected to internet. Ip address is also similar to home address suppose anybody reached at your home with help of your address house number street number area name etc just like that Ip address locate your devices and sites.
For more details click here.

Now start main content

IP TRACKER


FIRSTLY Start your Termux (For more details about termux click here)

Update and upgrade your Termux

 $apt update && apt upgrade

Installing git

$apt install git

Installing Tool from git cloning

$git clone https://github.com/maldevel/IPGeoLocation.git

Now go to IPGeoLocation folder

$cd IPGeoLocation

Installing requirements for Tool

$pip3 install -r requirements.txt --user


Now installation is done tool is ready to use

For help type :-

  ./ipgeolocation.py -h

For target :-

  ./ipgeolocation.py -t <ip address>



special notes:- Termux case sensitive application enter text with accurate type whis is lower case or upper case


Thanks for learning

 


Saturday, August 8, 2020

How to give root permissions in Kali Linux

Get the root access in kali


What is the Root access

Root access give the special permission to the user to do special task, install apt server git cloning and many more.

Without Root, system throw the error like authorization error.

So, do you want to solve this type of issue , come with me..

Check you are Rooted or not

If there is dollar symbol($) that's means you are in normal access


Now start main process to make you system as Root

Now simply open your Kali Linux with your login details
then open your terminal and see you have dollar sign that's means do not have super user permission.
Now Type:-

sudo su  and press enter

Now you Enter in super user after this you have to set your root password for su.

passwd root  and press enter

Now you have to reset your password

Enter the password then verify it and press enter.


Now simply restart you kali and give user name as root and password which was made by us. Make sure dollar($) symbol replaced by hash(#) symbol.

Then simply update and upgrade your kali:-

apt-get update

apt-get upgrade

And Enjoy you Kali Linux with full access........

Remember if root@username:home# That's means you are right way.

Thanks

Author

Sandeep singh


Thursday, August 6, 2020

Installing kali linux on Android via Termux





Installing kali linux on Android via Termux





If you are kali lover but you do not have Desktop or Laptop so, you are in right place.  You can install Kali Linux on your Android phone. If you do not know what is kali linux please click here. And do you want to know what is TERMUX click here to know. There are many ways to install kali on android but from my experience this a fabulous way to use kali linux on CLI (Command Line Interface) as well GUI (Graphical User Interface). Just follow below instruction and enjoy you kali linux. But in this kali linux tool are not pre-install you have to download all tools of kali linux from apt. 

Firstly we have to download these three tool

  1. Termux click here
  2. Anlinux click here
  3. Vnc viewer click here

Setting up all apps after installing

Simply start Anlinux go to navigation and open the dashboard. 


Click on dashboard you got below screen


Now choose the kali and then copy link and past on tumux or directly from last launch option.

then hit enter and installing will be start.

for start kali on CLI enter ;-

./start-kali.sh

For GUI

Go to desktop environment then choose KALI 
then choose Xfce4 Environment 
and then same copy the link and past on termux.
This should setup Xfce and Tiger VNC on the linux system.

Remember you will need to run ./start-kali.sh to run the linux system before using this command.


Thanks for Learning.......... 

Tuesday, July 28, 2020

Basic Termux commands

Termux


Termux is an Android terminal emulator and Linux environment app that works directly with no rooting or setup required. A minimal base system is installed automatically - additional packages are available using the APT package manager.

Basic command :-

Now we start with basic commands

Firstly, after installing and everytimes start we to given thes command.

$ apt update
$ apt upgrade

After this we have to give storage permission to Termux by hitting below command :-

$termux-setup-storage
Then again,
$apt update && upgrade

If you want to know  list of packages which used in termux normally hit below command,

$ apt list

Information about packages

$apt show <package name>

(note:- We can use also pkg instead of apt)

For going to internal storage:-

$ cd /sdcard

Show the files in directory

$ ls             (without hidden files)
$ ls -a         (With hidden files)

For version checking:-

$ ls --version

Details of folders:-

$ ls -lh

For creating files:-

$ touch <files.Extensions>
$ touch BharamGyani.txt

Display data of file:-

$ cat <files.Extensions>
$ cat bharamgyani.txt

For check current directory:-

$ pwd

For creating folders or directory:-

$ mkdir <folder name>
$ mkdir rohan
$ ls

For open folder:-
Go to directory

$ cd rohan

For back to directory:-

$ cd ..

For going to root directory:-

$ cd /

Now you can also copy, cut and past the files on termux, have a look.
For files :-

$ cp <file name> <destination >
$ cp rohan.txt sdcard

For folders :-

$ cp -r <foldername> <location>

For home directory

$ cp rohan.txt $home

For move:-

$ mv <filename> <location>

For folders :-

$ mv -v <folder name> <location>
$mv -v rohan /sdcard/DCIM

For removing the files and folders
For files :-

$ rm <file name>
$ rm helo.py

For folders :-

$ rm -rf <folder name>

If file and folder in same directory copy it :-

$ cp <file name> <folder name>

Check the archeteture of device :-

$ uname -m

For kernel info:-

$ uname -a

For checking ip (local ip and all network) :-

$ ifconfig

(note:- For using ifconfig, firstly install busybox and net-tool simply hit below command :-
$ pkg install busybox net-tools)

For checking public ip:-

$ curl ifconfig.me

For checking Internet working or not:-

$ ping google.com

For given executive permission to a file:-

$ chmod +x <file name>

For given multiple permissions in directory :-

$ chmod +x *

For checking termux running well or not just hit the command, A train running on screen if not that's means something went wrong :-

$pkg install sl
$sl

End...
Termux has not end point we can do lots of thing here these are the basic command of termux after this we will start for use of lot of termux packeges.
Thanks to all for coming.