Saturday, 22 August 2020

USE OF CRYPTOGRAPHY IN HACKING

WHAT IS CRYPTOGRAPHY?

The Cryptography is derived from the Greek words "Kryptos". This is the study of secure communication techniques that allow only the sender and recipient of a message to view it's contents of transforming information into nonhuman readable form or vice versa is called cryptography.

As we know that information plays a vital role in running of any business and organizations etc, sensitive details in the wrong hands can leads to loss of business.

Cryptography is the science of ciphering and deciphering messages.To secure communication organizations use cryptology to cipher information .

                            Or

Cryptography is a method of protecting information and communication through the use of codes so that only those whom the information is intended can read and process it.

In Computer Science, Cryptography refers to secure information and communication techniques derived from mathematical concepts , a set of rule based calculations called algorithm to transform message in ways the hard to readable for human.

This is one of the secure way of communications for a hacker with the help of virtual private network(VPN) like Tor Browser which is also very helpful to change the IP Address(Location of the sender ) for illegal purpose to perform crime in cyberspace . I will discuss in brief about the VPN .



How to Encrypt and Decrypt the text in Cryptography?

Open this website with the help of internert surfing for encryption-"http://wwwmd5online.org" 

Open the link for Decrypt the code text-"http://www.md5online.org/md5-decrypt.html"

Type whatever you want for encryption and it will crypt in the code form, copy that code and forward to the intended person whom you want for secure communication and then he/she will Decrypt in the real form.




               
       







More info
  1. Free Pentest Tools For Windows
  2. Hak5 Tools
  3. Pentest Tools
  4. Pentest Tools For Windows
  5. Hacker Tools Hardware
  6. Growth Hacker Tools
  7. What Are Hacking Tools
  8. Hacker Tools Software
  9. Hack Tools For Pc
  10. Hacking Tools For Pc
  11. Pentest Tools Apk
  12. Hacking Tools Online
  13. Hack Website Online Tool
  14. Physical Pentest Tools
  15. Github Hacking Tools
  16. Hacker Tools Mac
  17. Android Hack Tools Github
  18. Pentest Tools Framework
  19. Easy Hack Tools
  20. Pentest Tools Online
  21. Best Hacking Tools 2020
  22. Hacker Tools For Pc
  23. Hacking Tools Github
  24. Beginner Hacker Tools
  25. Hack Tools For Ubuntu
  26. What Is Hacking Tools
  27. Pentest Recon Tools
  28. Hack And Tools
  29. Pentest Tools Subdomain
  30. Hacker Tools List
  31. Hacking App
  32. Pentest Automation Tools
  33. Github Hacking Tools
  34. Hacker Tools Windows
  35. Pentest Tools Github
  36. Growth Hacker Tools
  37. Hack App
  38. Hacker Search Tools
  39. Hack Tools For Windows
  40. Hacker Security Tools
  41. Hack Tools
  42. Nsa Hack Tools Download
  43. Hacks And Tools
  44. Hacker Tools Free
  45. Kik Hack Tools
  46. Pentest Tools Find Subdomains
  47. Android Hack Tools Github
  48. Install Pentest Tools Ubuntu
  49. Hackrf Tools
  50. Pentest Tools Alternative
  51. Hacking Tools For Pc
  52. Hacker Tools Apk
  53. Best Hacking Tools 2020
  54. Hak5 Tools
  55. Easy Hack Tools
  56. Hacking Tools Usb
  57. Pentest Box Tools Download
  58. Pentest Tools List
  59. Hacking Tools Windows
  60. Hacker Tools Apk
  61. Physical Pentest Tools
  62. Hack Tools
  63. What Are Hacking Tools
  64. Hack Tools Pc
  65. Hacks And Tools
  66. What Is Hacking Tools
  67. Termux Hacking Tools 2019
  68. Pentest Tools List
  69. Hacking Tools Mac
  70. Hack Tools For Games
  71. How To Make Hacking Tools
  72. Hacking Tools For Windows
  73. World No 1 Hacker Software
  74. Underground Hacker Sites
  75. Pentest Tools Windows
  76. Pentest Tools Subdomain
  77. Tools For Hacker
  78. Hacker Tools
  79. Wifi Hacker Tools For Windows
  80. Android Hack Tools Github
  81. Pentest Tools Subdomain
  82. Hack Tools
  83. Hacking Apps
  84. Pentest Reporting Tools
  85. Hacking Tools For Windows
  86. Hacker Tools
  87. Hack Rom Tools
  88. Hacking Tools Hardware
  89. Free Pentest Tools For Windows
  90. Hacking Tools For Pc
  91. How To Hack
  92. Game Hacking
  93. Underground Hacker Sites
  94. Hack Tools For Games
  95. Hacker Security Tools
  96. Hack Tools 2019
  97. Pentest Tools Github
  98. Hackrf Tools
  99. Hack Tools 2019
  100. Usb Pentest Tools
  101. Hacker Tools Hardware
  102. Hacking Tools Name
  103. Pentest Tools For Android
  104. Hacking Tools Windows
  105. Hacker Techniques Tools And Incident Handling
  106. Pentest Tools Subdomain
  107. Pentest Tools Tcp Port Scanner
  108. Android Hack Tools Github
  109. Hacking Tools Mac
  110. Hack Apps
  111. Termux Hacking Tools 2019
  112. Hacking Tools 2020
  113. Hacker Security Tools
  114. Hacking Tools Software
  115. Hacker Tools Github
  116. Install Pentest Tools Ubuntu
  117. Hacker Techniques Tools And Incident Handling
  118. Hacker
  119. How To Install Pentest Tools In Ubuntu
  120. How To Make Hacking Tools
  121. New Hacker Tools
  122. Hacker Tools For Windows
  123. Hacking Tools Hardware
  124. Hacker Tools Free
  125. Underground Hacker Sites
  126. Hacker Techniques Tools And Incident Handling
  127. Usb Pentest Tools
  128. Pentest Automation Tools
  129. Hack Tools Pc
  130. Nsa Hacker Tools
  131. Hacking Tools For Games
  132. Hacking Tools For Kali Linux
  133. Install Pentest Tools Ubuntu
  134. Hacks And Tools

No comments:

Post a Comment