<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: KARAN JAIN</title>
    <description>The latest articles on Forem by KARAN JAIN (@karanjain2527).</description>
    <link>https://forem.com/karanjain2527</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F2375325%2Fcbdf1c74-5266-4991-865c-77bbf66ffe91.png</url>
      <title>Forem: KARAN JAIN</title>
      <link>https://forem.com/karanjain2527</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/karanjain2527"/>
    <language>en</language>
    <item>
      <title>Phone Numbers as Digital Footprints: Tracking Info with PhoneInfoga!!</title>
      <dc:creator>KARAN JAIN</dc:creator>
      <pubDate>Mon, 24 Feb 2025 15:08:30 +0000</pubDate>
      <link>https://forem.com/karanjain2527/phone-numbers-as-digital-footprints-tracking-info-with-phoneinfoga-a61</link>
      <guid>https://forem.com/karanjain2527/phone-numbers-as-digital-footprints-tracking-info-with-phoneinfoga-a61</guid>
      <description>&lt;p&gt;&lt;em&gt;⚠️ Warning: This guide is for ethical and educational purposes only! Don’t go scanning your ex’s new number out of curiosity (I know what you want to 👀). Be responsible!&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Think Your Phone Number Is Private? Think Again!!!&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fh91s8ou5k9886m9fyctg.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fh91s8ou5k9886m9fyctg.jpg" alt=" " width="461" height="441"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Well, meet PhoneInfoga – my new best friend for digging up information on any phone number faster than your nosy neighbor. It won’t hack into their WhatsApp, but it will spill some public secrets!!!&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Do you want to see how ??&lt;/strong&gt;&lt;/p&gt;
&lt;h1&gt;
  
  
  Step 1: Installing PhoneInfoga in Kali Linux.
&lt;/h1&gt;

&lt;p&gt;--Go to Google and search "phoneinfoga".&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ff83a9t0i8godf3rz3awv.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ff83a9t0i8godf3rz3awv.jpg" alt=" " width="800" height="393"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;--Else click the below link.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://sundowndev.github.io/phoneinfoga/getting-started/install/" rel="noopener noreferrer"&gt;Installation&lt;/a&gt;&lt;/p&gt;
&lt;h1&gt;
  
  
  Step 2: Open the root terminal
&lt;/h1&gt;

&lt;p&gt;--Use the command given in the link above. If you want to explore the documentation in detail, visit the link as well.&lt;br&gt;
--else directly Install phoneinfoga by giving the below command.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;bash &amp;lt;( curl -sSL https://raw.githubusercontent.com/sundowndev/phoneinfoga/master/support/scripts/install )

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fy61eiic1t1dtcm3w7h29.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fy61eiic1t1dtcm3w7h29.png" alt=" " width="800" height="374"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  Step 3: Move the directories
&lt;/h1&gt;

&lt;p&gt;--Pass the below command.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;mv ./phoneinfoga /usr/local/bin/phoneinfoga
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;(This will directly show in the terminal while installing)&lt;/p&gt;

&lt;p&gt;--All the installation part is done now!!&lt;/p&gt;

&lt;h1&gt;
  
  
  Step 4: Commands you must know !!
&lt;/h1&gt;

&lt;p&gt;--For view all the options&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;phoneinfoga
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;OR&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;phoneinfoga -h

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3skpwhy6vb3nwwjnf0l7.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3skpwhy6vb3nwwjnf0l7.png" alt=" " width="800" height="413"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;--To scan Phone Number&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;phoneinfoga scan -n &amp;lt;phone_number&amp;gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fluj32yosgg15s29e6l4x.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fluj32yosgg15s29e6l4x.png" alt=" " width="800" height="379"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F618pv9j09o70jgjljjdd.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F618pv9j09o70jgjljjdd.png" alt=" " width="800" height="413"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;--If you want to use the PhoneInfoga tool in a browser, you need to set up your own port and run it locally!!&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;phoneinfoga serve &amp;lt;Any_Random_Port_Number&amp;gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F67wl554l2csku6lc48c6.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F67wl554l2csku6lc48c6.jpg" alt=" " width="800" height="379"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;--Then go to your browser the type.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;localhost:&amp;lt;Any_Random_Port_Number&amp;gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3ibojw8rh2kjbf9hkb5d.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3ibojw8rh2kjbf9hkb5d.jpg" alt=" " width="800" height="379"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsmu5sr8pspg9ux5et1uv.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsmu5sr8pspg9ux5et1uv.png" alt=" " width="800" height="379"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcbmteakx3rxxlmv27w07.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcbmteakx3rxxlmv27w07.png" alt=" " width="800" height="379"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Hack a little today, meet the FBI tomorrow—free home delivery!!&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fd5005ibqq5xugotzxrcm.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fd5005ibqq5xugotzxrcm.jpg" alt=" " width="720" height="606"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Access Nearby Wi-Fi Passwords with CMD!</title>
      <dc:creator>KARAN JAIN</dc:creator>
      <pubDate>Sun, 12 Jan 2025 14:39:13 +0000</pubDate>
      <link>https://forem.com/karanjain2527/access-nearby-wi-fi-passwords-with-cmd-4286</link>
      <guid>https://forem.com/karanjain2527/access-nearby-wi-fi-passwords-with-cmd-4286</guid>
      <description>&lt;p&gt;&lt;em&gt;Disclaimer: This post is for educational purposes only. Accessing Wi-Fi networks without permission is illegal and unethical. Use this information responsibly and only for networks you own or have permission to access.&lt;/em&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  Here’s how you can use the Command Prompt (CMD) to retrieve saved Wi-Fi passwords on your Windows system. Note: This method works only for networks your system has connected to previously.
&lt;/h1&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5lc68rna2rnlss9te2e5.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5lc68rna2rnlss9te2e5.jpg" alt="Image description" width="217" height="239"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Step 1: Open Command Prompt
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Right-click on the Command Prompt icon.&lt;/li&gt;
&lt;li&gt;Select Run as Administrator for elevated privileges.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Step 2: List All nearby Wi-Fi Networks
&lt;/h2&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;netsh wlan show network
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjkfx04tan51pfx3yxipm.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjkfx04tan51pfx3yxipm.png" alt="Image description" width="800" height="505"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Step 3: List the all user profiles
&lt;/h2&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;netsh wlan show profiles

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fk2mel268m8dixupwq8rl.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fk2mel268m8dixupwq8rl.png" alt="Image description" width="800" height="534"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Step 4: View the Password of a Specific Wi-Fi Network
&lt;/h2&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;netsh wlan show profile name="Wi-Fi_Name" key=clear

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fop77odf5zkyryalbq2x4.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fop77odf5zkyryalbq2x4.png" alt="Image description" width="800" height="628"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;you can see your password at "key content:"&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Explore, Scan, Secure: Nmap for Network Ninjas</title>
      <dc:creator>KARAN JAIN</dc:creator>
      <pubDate>Fri, 10 Jan 2025 18:43:29 +0000</pubDate>
      <link>https://forem.com/karanjain2527/explore-scan-secure-nmap-for-network-ninjas-4p0m</link>
      <guid>https://forem.com/karanjain2527/explore-scan-secure-nmap-for-network-ninjas-4p0m</guid>
      <description>&lt;p&gt;&lt;em&gt;Disclaimer:&lt;br&gt;
This post is for educational purposes only. Unauthorized scanning or hacking of websites or networks is illegal and can lead to severe consequences. Always ensure you have proper permission before performing any scans or security tests.&lt;/em&gt;&lt;/p&gt;
&lt;h2&gt;
  
  
  "Want to Hack a Website? Here’s Where It All Begins!"
&lt;/h2&gt;

&lt;p&gt;The &lt;strong&gt;first&lt;/strong&gt; step is finding all the &lt;strong&gt;open ports&lt;/strong&gt; on the website. These ports act as entry points, and discovering them is crucial.&lt;/p&gt;

&lt;p&gt;To do this, we use a powerful tool called &lt;strong&gt;Nmap&lt;/strong&gt;. It &lt;strong&gt;scans and reveals&lt;/strong&gt; all the open ports, giving you a map of what’s accessible.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwb7h8aajcepn7q34w1wv.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwb7h8aajcepn7q34w1wv.jpg" alt="Image description" width="630" height="630"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Nmap, which stands for Network Mapper, is a free tool that helps you explore networks and check for security issues. It's really helpful for system admins and those interested in cybersecurity.&lt;br&gt;
Common Uses:&lt;br&gt;
Scanning networks, Detecting open ports, Identifying running services, Checking for vulnerabilities&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step.1: Installing Nmap&lt;/strong&gt;&lt;br&gt;
For Linux:&lt;br&gt;
Most Linux distributions include Nmap in their repositories. Install it using:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;sudo apt install nmap 
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;For Windows:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://nmap.org/download" rel="noopener noreferrer"&gt;Nmap official website&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step.2:Give commands:&lt;/strong&gt;&lt;br&gt;
0.For summary of options&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;nmap -h
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;1.Scan a Single Host&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;nmap 192.168.1.1

nmap www.google.com

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;2.Scan All Ports&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;nmap -p- 192.168.1.1

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;3.Scanning Your Local Network&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;nmap -sn 192.168.1.0/24

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ol&gt;
&lt;li&gt;For Aggressive scanning
&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;nmap -A www.google.com
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;5.To scan UDP ports&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;nmap -sU www.google.com
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;6.To scan TCP ports&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;nmap -sT www.google.com
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;7.To scan top ports&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;nmap --top-ports &amp;lt;number&amp;gt; www.google.com
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;8.Scan Excluding the range of port&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;nmap --exclude-ports 1-100 www.google.com
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;9.To increase the scanning speed&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;nmap -F www.google.com
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



</description>
    </item>
    <item>
      <title>How to Search Through Multiple Files for Specific Data Using Grep</title>
      <dc:creator>KARAN JAIN</dc:creator>
      <pubDate>Fri, 03 Jan 2025 14:20:23 +0000</pubDate>
      <link>https://forem.com/karanjain2527/how-to-search-through-multiple-files-for-specific-data-using-grep-4m7p</link>
      <guid>https://forem.com/karanjain2527/how-to-search-through-multiple-files-for-specific-data-using-grep-4m7p</guid>
      <description>&lt;p&gt;Recently, I have been solving some &lt;strong&gt;CTF&lt;/strong&gt; questions, and I came across one that says, 'You have a &lt;strong&gt;bunch of files&lt;/strong&gt;(approx 9090 files), and each contains some information. One of the files contains the &lt;strong&gt;flag&lt;/strong&gt; you need, but it's &lt;strong&gt;impossible&lt;/strong&gt; to open and check each file'.&lt;/p&gt;

&lt;p&gt;In this case we can use &lt;strong&gt;greap&lt;/strong&gt; command, let's see how...&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffgvtmaqo788r2zrgpska.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffgvtmaqo788r2zrgpska.jpg" alt="Image description" width="606" height="616"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Grep is command-line utility(not exactly a tool).&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;The grep command is a crucial tool for anyone working with &lt;strong&gt;text-based&lt;/strong&gt; data and is highly efficient for tasks that require &lt;strong&gt;searching&lt;/strong&gt; and processing &lt;strong&gt;large&lt;/strong&gt; amounts of text.&lt;/p&gt;

&lt;h2&gt;
  
  
  1. Search in a Single File.
&lt;/h2&gt;

&lt;p&gt;If you suspect the flag is in a specific file, you can use the following command&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;grep -i "picoCTF{" filename.txt

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  2.Search in All Files in the Current Directory.
&lt;/h2&gt;

&lt;p&gt;If you want to search through all files in the current directory and its subdirectories&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;grep -r "picoCTF{" .

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  3.Search in All Files in a Directory.
&lt;/h2&gt;

&lt;p&gt;If you are not sure where the flag is located but you know it is within a directory, use this command to search through all files&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;grep -r "picoCTF{" /path/to/directory/

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  4. Display Line Numbers.
&lt;/h2&gt;

&lt;p&gt;The -n option displays the line numbers where the pattern is found&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;grep -n "pattern" filename

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  5. Search for Multiple Patterns.
&lt;/h2&gt;

&lt;p&gt;You can search for multiple patterns by using the -e option.&lt;br&gt;
bash&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;grep -e "pattern1" -e "pattern2" filename

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  6. Count the Number of Matches.
&lt;/h2&gt;

&lt;p&gt;The -c option counts the number of lines that match the pattern.&lt;br&gt;
bash&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;grep -c "pattern" filename

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  7. Search for the Flag Across Multiple Directories or Files.
&lt;/h2&gt;

&lt;p&gt;If you know the flag might be in multiple files or directories, you can combine the directories in the command like this:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;grep -r "picoCTF{" dir1/ dir2/ dir3/

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



</description>
      <category>cybersecurity</category>
      <category>linux</category>
      <category>terminal</category>
    </item>
    <item>
      <title>Is Your Laptop Hacked? Here’s How to Find Out!</title>
      <dc:creator>KARAN JAIN</dc:creator>
      <pubDate>Mon, 30 Dec 2024 12:13:00 +0000</pubDate>
      <link>https://forem.com/karanjain2527/is-your-laptop-hacked-heres-how-to-find-out-51l7</link>
      <guid>https://forem.com/karanjain2527/is-your-laptop-hacked-heres-how-to-find-out-51l7</guid>
      <description>&lt;p&gt;&lt;em&gt;It is a Windows-specific feature and won't work on Linux or macOS.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl8dje169fkq427orj9vx.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl8dje169fkq427orj9vx.jpg" alt="Image description" width="236" height="233"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Step 1: press windows + R&lt;/p&gt;

&lt;p&gt;Step 2: It's open a "Run" tab, Type below command to it.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;netplwiz
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Manage User Accounts&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;View all user accounts on the system.&lt;/li&gt;
&lt;li&gt;Add, remove, or modify user accounts.&lt;/li&gt;
&lt;/ol&gt;

</description>
      <category>cybersecurity</category>
      <category>tutorial</category>
      <category>windows</category>
    </item>
    <item>
      <title>Cyber Attack Chronicles: Types and Real-Life Examples Demystified</title>
      <dc:creator>KARAN JAIN</dc:creator>
      <pubDate>Mon, 23 Dec 2024 12:38:39 +0000</pubDate>
      <link>https://forem.com/karanjain2527/cyber-attack-chronicles-types-and-real-life-examples-demystified-24hd</link>
      <guid>https://forem.com/karanjain2527/cyber-attack-chronicles-types-and-real-life-examples-demystified-24hd</guid>
      <description>&lt;p&gt;MEOW!!!_MEOW!!!&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fm2x1mcqg6zfmmj7xsu9l.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fm2x1mcqg6zfmmj7xsu9l.jpg" alt="Image description" width="236" height="236"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;BOOM!!!!!!!!!!!&lt;/p&gt;

&lt;h2&gt;
  
  
  1. Malware Attacks
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Example :Imagine you download a free game from an unknown website. Once installed, your computer starts acting weird, slows down, or displays unwanted ads. This could be malware.&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  2. Phishing Attacks
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Example : You get an email that looks like it's from your bank, asking you to click a link and enter your password. But the email is fake, and the hacker steals your password.&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  3. Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Example: Think of a prank where thousands of people call your school's office at the same time, preventing others from reaching the school. A DDoS attack floods a website with traffic to make it crash.&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  4. Man-in-the-Middle (MITM) Attacks
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Example: Imagine two friends passing notes in class, but someone intercepts the note, reads it, and changes the message before passing it on. In the digital world, hackers do this with internet connections.&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  5. SQL Injection Attacks
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Example: You enter 1=1 in the search bar of a website, and it shows you private data of other users because the website didn’t protect its database properly.&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  6. Cross-Site Scripting (XSS)
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Example: If a hacker adds a fake script to a school’s website comment box, and when you visit the page, your computer gets infected with malware.&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  7. Password Attacks
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Example: A hacker tries every possible combination (like guessing your birthday or name) until they crack your email password.&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  8. Insider Threats
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Example: If a school employee who knows the Wi-Fi password shares it with outsiders to let them misuse the school’s network.&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  9. Zero-Day Exploits
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Example: If a hacker finds a bug in a popular messaging app before the company fixes it and uses it to access your private chats.&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  10. Social Engineering Attacks.
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Example: Someone calls pretending to be your teacher and asks for your email password, saying they need it to reset the school portal. You give it, but it was a trick.&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  11. Ransomware Attacks
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Example: Imagine all your photos and files are locked, and a hacker says, “Pay me $100 to unlock them.” That’s ransomware.&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  12. Supply Chain Attacks
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Example: A hacker hacks into a book supplier’s system and changes the delivery address of school books to their own address.&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  13. Cryptojacking
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Example: Your computer gets very slow because someone secretly installed software on it to mine cryptocurrency without your knowledge.&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  14. IoT-Based Attacks
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Example: A hacker takes control of a smart home camera or smart light bulb and uses it to spy on you or others.&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  15. Advanced Persistent Threats (APTs)
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Example: A group of hackers slowly and secretly breaks into a school’s database over months to steal student data and use it for illegal activities.&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ff1n9rd8nk9cn32vcr2w3.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ff1n9rd8nk9cn32vcr2w3.jpg" alt="Image description" width="735" height="723"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>beginners</category>
      <category>cyberattacks</category>
    </item>
    <item>
      <title>Hacking the Network: Spying on Devices with Bettercap in Kali Linux</title>
      <dc:creator>KARAN JAIN</dc:creator>
      <pubDate>Thu, 19 Dec 2024 22:01:17 +0000</pubDate>
      <link>https://forem.com/karanjain2527/hacking-the-network-spying-on-devices-with-bettercap-in-kali-linux-22l4</link>
      <guid>https://forem.com/karanjain2527/hacking-the-network-spying-on-devices-with-bettercap-in-kali-linux-22l4</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Here's a step-by-step guide for using Bettercap to spy on devices within a network. Note that this is for educational and ethical purposes only.&lt;/strong&gt; &lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftym4djpzi70fu6lp2qzm.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftym4djpzi70fu6lp2qzm.jpg" alt="Image description" width="564" height="515"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;Disclaimer&lt;/strong&gt;&lt;br&gt;
This guide is for educational purposes only. We are attacking and monitoring our &lt;strong&gt;own Windows machine&lt;/strong&gt; on a private network to track activities. Unauthorized use on other devices or networks is &lt;strong&gt;illegal&lt;/strong&gt;.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;With this method, no additional &lt;strong&gt;Wi-Fi monitoring tools&lt;/strong&gt; are needed. &lt;strong&gt;Bettercap&lt;/strong&gt; itself is &lt;strong&gt;powerful&lt;/strong&gt; enough to intercept and analyze network traffic directly, making it a versatile option for &lt;strong&gt;tracking activities&lt;/strong&gt; on your network or device.&lt;/p&gt;
&lt;h2&gt;
  
  
  Step 1:Installing buttercap tool
&lt;/h2&gt;

&lt;p&gt;--&amp;gt;Open Kali Linux &lt;br&gt;
--&amp;gt;Go to the &lt;strong&gt;terminal&lt;/strong&gt; in Kali Linux&lt;br&gt;
--&amp;gt;For moving from normal directories to &lt;strong&gt;root&lt;/strong&gt; directories, Give the command&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;sudo su
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Enter your &lt;strong&gt;password&lt;/strong&gt;.&lt;br&gt;
--&amp;gt;Install bettercap by giving the command&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;sudo apt install bettercap
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fauxe9axn3fsy1m6xloxa.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fauxe9axn3fsy1m6xloxa.png" alt="Image description" width="793" height="200"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;--&amp;gt;To verify the installation, Run:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;bettercap --version
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;If installed correctly, the version will be displayed.&lt;/p&gt;

&lt;h2&gt;
  
  
  Step 2:Run bettercap
&lt;/h2&gt;

&lt;p&gt;--&amp;gt; Run the command:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;sudo bettercap
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvee612f3e35kmcrg9xzp.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvee612f3e35kmcrg9xzp.png" alt="Image description" width="800" height="271"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Step 3:Getting all device's &lt;strong&gt;IP addresses&lt;/strong&gt; which are connected to the same network in our Kali Linux
&lt;/h2&gt;

&lt;p&gt;--&amp;gt; Just run command&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;net.probe on
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;You have all the IP addresses of connected devices but they are not arranged properly, To arrange them run command:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;net.show
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3263hooy12gmy69hc1le.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3263hooy12gmy69hc1le.png" alt="Image description" width="800" height="393"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  step 4:Set the target devices on which we are spying by giving their IP addresses
&lt;/h2&gt;

&lt;p&gt;--&amp;gt;Enable &lt;strong&gt;ARP spoofing&lt;/strong&gt; to intercept traffic:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;set arp.spoof.targets &amp;lt;target_ip&amp;gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;--&amp;gt;Start ARP spoofing:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;arp.spoof on
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbxlmjudoqeb141ckgk8o.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbxlmjudoqeb141ckgk8o.png" alt="Image description" width="800" height="125"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Step 5:To display captured data from the target device
&lt;/h2&gt;

&lt;p&gt;--&amp;gt;Enable the network sniffer&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;net.sniff on
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ft1yn0u2kk3jz9suohnza.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ft1yn0u2kk3jz9suohnza.png" alt="Image description" width="800" height="125"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;You can see all the data or packets are captured from target device at current time&lt;/strong&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  For Demo
&lt;/h2&gt;

&lt;p&gt;(we are capturing all  current network/data of Windows machine on our kali Linux which is a different machine)&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fte3r7w4o9uym5j7zhy46.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fte3r7w4o9uym5j7zhy46.png" alt="Image description" width="800" height="400"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Now we can see all the activities of target devices&lt;/strong&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Step 6:To exit
&lt;/h2&gt;

&lt;p&gt;--&amp;gt;Run:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;exit
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fg5159htdm33sxwad30vn.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fg5159htdm33sxwad30vn.jpg" alt="Image description" width="474" height="581"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;shhhhhh!!! Keep it a top secret!!&lt;/p&gt;

</description>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>Find the Exact and all connected device's IPs on the virtual machine</title>
      <dc:creator>KARAN JAIN</dc:creator>
      <pubDate>Thu, 19 Dec 2024 07:10:51 +0000</pubDate>
      <link>https://forem.com/karanjain2527/find-the-exact-and-all-connected-devices-ips-on-the-virtual-machine-43o1</link>
      <guid>https://forem.com/karanjain2527/find-the-exact-and-all-connected-devices-ips-on-the-virtual-machine-43o1</guid>
      <description>&lt;p&gt;The IP address &lt;strong&gt;10.0.2.4&lt;/strong&gt; typically indicates that your Kali Linux virtual machine (VM) is using a &lt;strong&gt;NAT (Network Address Translation)&lt;/strong&gt; network configuration. This setup &lt;strong&gt;assigns a private IP address&lt;/strong&gt; to your VM, and the host machine acts as a &lt;strong&gt;bridge&lt;/strong&gt; to access external networks.&lt;/p&gt;

&lt;p&gt;If you want to identify the &lt;strong&gt;current IP address and ensure proper connectivity&lt;/strong&gt;, follow these steps:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpx0zxflfuaar2yq5gssm.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpx0zxflfuaar2yq5gssm.png" alt="Image description" width="800" height="210"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;If you get the same &lt;strong&gt;problem&lt;/strong&gt; as above or can't find the IP addresses of all the connected devices.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5g8776bao6lmimm9bmoj.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5g8776bao6lmimm9bmoj.jpg" alt="Image description" width="474" height="474"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Step 1: Go to your virtual box
&lt;/h2&gt;

&lt;p&gt;--&amp;gt;Go to &lt;strong&gt;settings&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fei6mr69pmd74au1ijvfc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fei6mr69pmd74au1ijvfc.png" alt="Image description" width="800" height="421"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Step 2:Go to the Network
&lt;/h2&gt;

&lt;p&gt;--&amp;gt;Click on "Enabled network adapter".&lt;br&gt;
--&amp;gt;Go to "Attached to:" and &lt;strong&gt;change NAT to bridged adapter&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fi9h8ld6eveno8ihwz3jv.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fi9h8ld6eveno8ihwz3jv.png" alt="Image description" width="800" height="468"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Step 3:Go to Advanced
&lt;/h2&gt;

&lt;p&gt;--&amp;gt;Enabled &lt;strong&gt;promiscuous mode&lt;/strong&gt;&lt;br&gt;
--&amp;gt;Set it to "Allowed all"&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcefuzye44yvw4o3lbcb6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcefuzye44yvw4o3lbcb6.png" alt="Image description" width="800" height="467"&gt;&lt;/a&gt;&lt;br&gt;
--&amp;gt;click on OK and &lt;strong&gt;you are good to go!!&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpxh15o74el33oscykj4r.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpxh15o74el33oscykj4r.png" alt="Image description" width="351" height="164"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;--&amp;gt;you got all the devices &lt;strong&gt;exact IP addresses&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffo7opxvc8lj9b5sccs9e.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffo7opxvc8lj9b5sccs9e.jpg" alt="Image description" width="352" height="318"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>virtualmachine</category>
      <category>help</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>Simplify Your Workflow: Effortless File Transfer Between VM and Windows</title>
      <dc:creator>KARAN JAIN</dc:creator>
      <pubDate>Wed, 18 Dec 2024 17:57:41 +0000</pubDate>
      <link>https://forem.com/karanjain2527/simplify-your-workflow-effortless-file-transfer-between-vm-and-windows-2mi0</link>
      <guid>https://forem.com/karanjain2527/simplify-your-workflow-effortless-file-transfer-between-vm-and-windows-2mi0</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsephnlqzbd3a7y8xh336.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsephnlqzbd3a7y8xh336.jpg" alt="Image description" width="474" height="474"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Step 1: Creating a folder
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F06yoeoeklc1bm78z4asn.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F06yoeoeklc1bm78z4asn.png" alt="Image description" width="800" height="756"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Step 2: Go to properties
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fr9769bh2njtq8mhyojcj.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fr9769bh2njtq8mhyojcj.png" alt="Image description" width="691" height="680"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Step 3: Set the shared folder
&lt;/h2&gt;

&lt;p&gt;--&amp;gt;Go to Sharing &lt;br&gt;
--&amp;gt;Then click on &lt;strong&gt;Advanced sharing&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fv1dbj1jhjyqhtetazkit.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fv1dbj1jhjyqhtetazkit.png" alt="Image description" width="756" height="692"&gt;&lt;/a&gt;&lt;br&gt;
--&amp;gt;Then click on (check box) &lt;strong&gt;share this folder&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnc07zc04s35rhejg4jyt.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnc07zc04s35rhejg4jyt.png" alt="Image description" width="383" height="387"&gt;&lt;/a&gt;&lt;br&gt;
--&amp;gt;Then Go to the &lt;strong&gt;permissions&lt;/strong&gt; and click on the &lt;strong&gt;full control&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxcwl34blo5wrzx44z3da.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxcwl34blo5wrzx44z3da.png" alt="Image description" width="374" height="436"&gt;&lt;/a&gt;&lt;br&gt;
--&amp;gt;Apply and ok &lt;/p&gt;
&lt;h2&gt;
  
  
  Step 4: Access the shared folder
&lt;/h2&gt;

&lt;p&gt;--&amp;gt; open virtual machine(In this we are using &lt;strong&gt;kali linux&lt;/strong&gt;)&lt;br&gt;
&lt;strong&gt;To access the shared folder We have to give permissions through our terminal&lt;/strong&gt;&lt;br&gt;
--&amp;gt;open the terminal and give the below commands&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;sudo usermod -aG vboxsf [username]
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkxvp2g3wqzoybmpqmv36.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkxvp2g3wqzoybmpqmv36.png" alt="Image description" width="800" height="393"&gt;&lt;/a&gt;&lt;br&gt;
--&amp;gt;Enter your password and you are good to go!&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Transfer any file in this shared folder and you can access that file in Windows and a virtual machine both...&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F175ja28o195oh30g0ght.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F175ja28o195oh30g0ght.jpg" alt="Image description" width="236" height="250"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>linux</category>
      <category>virtualmachine</category>
      <category>tutorial</category>
      <category>learning</category>
    </item>
    <item>
      <title>Transform Your GitHub Profile From Noob to Pro ...</title>
      <dc:creator>KARAN JAIN</dc:creator>
      <pubDate>Wed, 27 Nov 2024 16:56:25 +0000</pubDate>
      <link>https://forem.com/karanjain2527/transform-your-github-profile-from-noob-to-pro--59b3</link>
      <guid>https://forem.com/karanjain2527/transform-your-github-profile-from-noob-to-pro--59b3</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F78fco19o0vie2ooek4h4.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F78fco19o0vie2ooek4h4.jpeg" alt="Let's goo" width="473" height="528"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;INTRODUCTION :&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Every developer uses Github on a daily basis. GitHub is an ID card for a developer, which we show everyone every time.&lt;/p&gt;

&lt;p&gt;Below given steps transform your GitHub profile from noob to pro ....&lt;strong&gt;without coding&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;So, Let's goo...&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Step1&lt;/strong&gt; :
&lt;/h2&gt;

&lt;p&gt;Create a new &lt;strong&gt;repository&lt;/strong&gt; with the same name as your user name. Make sure the &lt;strong&gt;README&lt;/strong&gt; file is included, and the repository should be &lt;strong&gt;PUBLIC&lt;/strong&gt;.&lt;br&gt;
(This is a special repository that you can use to your GitHub profile)&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fniaqyc38ii31wt493lft.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fniaqyc38ii31wt493lft.png" alt="Image description" width="766" height="722"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I already created a repo, so it's showing an error.&lt;/p&gt;
&lt;h2&gt;
  
  
  &lt;strong&gt;Step2&lt;/strong&gt;:
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Generate&lt;/strong&gt; code for our cool-looking profile page, you can directly use this &lt;a href="https://rahuldkjain.github.io/gh-profile-readme-generator/" rel="noopener noreferrer"&gt;Link&lt;/a&gt;,&lt;br&gt;
Here’s how:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Fill in your &lt;strong&gt;details&lt;/strong&gt; like your name, skills, and social media links.&lt;/li&gt;
&lt;li&gt;Choose what you want to display on your profile (e.g., badges, stats, etc.).&lt;/li&gt;
&lt;li&gt;Click &lt;strong&gt;Generate&lt;/strong&gt;.
Once you click Generate, the code will be ready for use!&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdydjpn8py9v33m7odjb1.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdydjpn8py9v33m7odjb1.png" alt="Image description" width="800" height="346"&gt;&lt;/a&gt;&lt;br&gt;
&lt;strong&gt;--------------------------------------------------------------------------&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fz5m0hq6302f7v5aglhs1.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fz5m0hq6302f7v5aglhs1.png" alt="Image description" width="800" height="436"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;copy the code and paste on &lt;strong&gt;Notepad&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fr9wzww3zq5ps1rv5guzt.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fr9wzww3zq5ps1rv5guzt.png" alt="Image description" width="800" height="403"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;
  
  
  &lt;strong&gt;Step3&lt;/strong&gt;:
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Add an image or GIF&lt;/strong&gt;.&lt;br&gt;
Here's how:&lt;br&gt;
Go to Google and search for an image or GIF you like.&lt;br&gt;
Copy the &lt;strong&gt;image URL&lt;/strong&gt; (right-click on the image and select Copy image address).&lt;br&gt;
Paste this URL into the following code:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;&amp;lt;img align="right" alt="Coding" width="400" src="https://media1.giphy.com/media/Ws6T5PN7wHv3cY8xy8/200.gif?cid=790b7611ko0bcvwdlohbjv0......."&amp;gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;and then &lt;strong&gt;Add&lt;/strong&gt; this small code to the main code in Notepad.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fi6ktmsshxh12xlrdfp49.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fi6ktmsshxh12xlrdfp49.png" alt="Image description" width="800" height="215"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;step4&lt;/strong&gt;:
&lt;/h2&gt;

&lt;p&gt;Copy the whole code and paste into our &lt;strong&gt;README&lt;/strong&gt; file and click on &lt;strong&gt;preview&lt;/strong&gt; and here we are with your cool-looking profile.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjlock8405edgzw527rwt.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjlock8405edgzw527rwt.png" alt="Image description" width="800" height="506"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;and at last &lt;strong&gt;commit&lt;/strong&gt; that code and refresh the page and &lt;strong&gt;BOOM&lt;/strong&gt;....&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fla08aeo6df56tlyuit69.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fla08aeo6df56tlyuit69.png" alt="Image description" width="800" height="401"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>github</category>
      <category>code</category>
      <category>githubprofile</category>
      <category>tutorial</category>
    </item>
  </channel>
</rss>
