Taurids : Halloween fireballs

Hello everyone welcome to KnowledgeSuttra. Today we are discussing about the Halloween fireballs. Guys in the Halloween night you can see the meteor shower we can say Halloween fireballs.

The scenario of the Halloween fireballs are very nice you can show this to children’s as a trick a treat. The Taurids are a yearly meteor shower, related with the comet Encke.

The Taurids are really two separate showers, with a Southern and a Northern part. The Southern Taurids started from Comet Encke, while the Northern Taurids began from the space rock 2004 TG10. They are named after their brilliant point in the group of stars Taurus, where they are believed to originate from in the sky. In light of their event in late October and early November, they are likewise called Halloween fireballs.

Appearance of the Halloween fireballs

Regularly, Taurids show up at a rate of around 5 every hour, moving gradually over the sky at around 28 kilometers for each second, or 100,800 km/h . In the event that bigger than a rock, these meteors may progress toward becoming bolides as brilliant as the moon and abandon smoke trails.

Because of the gravitational bothers of planets, particularly Jupiter, the Taurids have spread out after some time, permitting separate sections named the Northern Taurids and Southern Taurids to end up recognizable. The Southern Taurids are dynamic from about September 10 to November 20, while the Northern Taurids are dynamic from about October 20 to December 10. Basically these are two cross segments of a solitary, expansive, ceaseless stream in space. The Beta Taurids and Zeta Perseids, experienced by the Earth in June or July, are additionally cross segments of the stream that methodology from the Earth’s daytime side and, thusly, can’t be watched outwardly in the way the  Northern and Southern Taurids of Octobth or November can. Space experts Duncan Steel and Bill Napier even propose the Beta Taurids could be the reason for the Tunguska occasion of June 30, 1908.

Common myth in dieting

HI,welcome to KnowledgeSuttra. Today we are talking about common myth in dieting Lets clear them all .

What are the common myths in dieting?

Dieting myth

#1  Carbs are bad for you :

  • Carbs can cause insulin insensitivity but only in people with pre-diabetes that overeat high sugar carbs.
  • If you don’t exercise and your diet consists mostly of these type of carbs then they will negatively affect your health
  • However ,if yo follow a well balanced diet and exercise regularly ,quality carbs will actually be necessary to fuel your workout.

#2 Fat is bad for you:-

1)cutting all fat your diet can be dangerous since yiur vody needs it for hormone production (low fat diets can increase your testosterone).2)many low fat products. Contain more calories than their normal counter part (eat omega 3 and 6 fatty acids).3)there is no evidence that saturated fats are the direct cause of heart problem 4) trans fat is only kind of fat that is directly linked to heart problem

#3  Protein is bad for you :-

1. Healthy adults who exercise have no problem with consuming high amount of protein both in regards to kidney problems or other health problems.

2. If you have an existing renal disease or existing kidney problems than limit your protein intake

3. Elderly individuals at risk of bone density issue and osteoporosis should aim to consume more protein (when you take more protein).

 #4 Avoid salt at all cost :-

 1. Salt(sodium) is an essential mineral its consumption is critical to our health .

2.The average person consume double the recommended intake .

3. In most people there appears to be little to no  association between salt consumption and hypertension (high blood pressure)


Brief description on micronutrients

Hello everyone welcome to knowledgesuttra. Lets have another quick guide on  macronutrients.  Lets focus on its advantages and disadvantages also.

What is micro-nutrients?

It involves all the vitamins ,hence it is called as micronutrients .

Following all are micronutrients and its advantages

Vitamins A 

  1.  Vitamin A is Fat soluble vitamin needed to maintain eyesight and prevent night blindness.
  2.  Improves immune system helps with fat storage and protects against infection
  3. Also needed to grow new cell, lower cholesterol and reduce the risk of heart disease

Vitamin B :-

several B vitamins that work together in the body this group includes the following:-

  1. Thiamine(B1)
  2. Riboflwin(B2)
  3. Niacin(B3)
  4. Pantothenic acid(B5)
  5.  Pyridoxine (B6)
  6. Cyanocobalamin(B12)
  7. Folic acid


It is specially work on skin, hair, eyes, mouth

Vitamin c :-

acts as an antioxidant needed for many

  • Metabolic function, including new tissue growth and repair
  •  Helps produce anti-stress hormone’s
  •  Heal wounds as burns and protects against abnormal blood clotting
  •  Vitamin c is a superstar amount of vitamins and actors and antioxidant which we need for more than 300 metabolic function including new tissue growth and repair
  •  Many diseases are caused by low level of anti stress hormones which vitamin c help to produce
  • It also helps wounds and burns to heal and protects against abnormal blood clotting

 Vitamin D :-

• It is also fat soluble vitamin needed for growth, development and maintenance of bones and teeth
• Regulating heartbeat
• Protects against muscle weakness
• Body can produce it when skin exposed to the ultraviolet rays

Vitamin E

• It is fat soluble vitamin with several health benefits
• Effective preservation of foods
• Prevention of disease such as cancer
• Promotion of a healthy nervous system

Vitamin K :-

• Blood clotting
• Growing and repairing bones
• Conversion of glucose into glycogen
• This are the main Vitamin are important for our body as well as following are nutrients are also important for our body

  • calcium
  • Magnesium
  •  Phosphorus
  •  Potassium
  •  Sodium
  •  Copper
  • Iron
  • Zinc

These How you can Break the HTTPS secured connection

Hi,welcome to KnowledgeSuttra. Let’s have quick guide on How to break HTTPS secured connection. HTTPS provide security as well authority to your site as well it helps to increment in Page rank in Google search .  Earlier I have upload a blog on difference between HTTP and HTTPS. If you didn’t know about what exactly HTTP and HTTPS, then kindly go through the earlier blog. Let’s get through the Breaking the Security of SSL layer.

SSL layer is for Secured Socket Layer.

Working of SSL layer.

“passing the user end data to the server end with encryption and decryption techniques with security”

Breaking SSL layer requires the Backtrack OS(Operating System). Which comes with the built-in feature of Python Built with SSLSTRIP configures. There’s just a need of opening it.

How to do so ?

  • move to the directory /pentest/web/sslstrip
  • and open the root terminal there
  • type the following commands
  • chmod +x sslstrip.py
  • python sslstrip.py

Now it will prompt as

Sslstrip 0.8 by moxie MarlinSpike running

What can be done ?

What are the benefits ?

Get through the screenshot provided. You will get everything that can be done.

Quick Guide on “nmap : Cheat Sheet”

There is need of some basics commands for information gathering. But a single tool can have multiple commands as many of us played any Video Game, PlayStation, PS2, PS3, PS4 games, nearly every games have some Cheat Sheets. For ex. GTA on PC have cheat of leavemealone, seaways, etc. In the same manner our main tools of information gathering also have Cheat Sheets.

Also Raed:- Information Gathering Online Tools

Here we are discussing about the well known tool called as nmap.

Many commands surely everyone knows. But that are 2 out of 10, here I am giving you a total commands of nmap.

Before proceeding its humble request to go through the warning.

Warning : Scanning any website, webapp, organization without the owner’s permission is illegal. According to the particular country might be it is crime. This is only for educational purpose, #TeamKnowledgeSuttra is neither encourage you nor advise you to do so. Do this at your own risk.


Target Specification

Scan a single IP
Scan specific IPs
Scan a range
nmap scanme.nmap.org
Scan a domain
nmap -iL targets.txt
 Scan using CIDR notation
 Scan targets from a file
nmap -iR 100 Scan 100
 random hosts
nmap –exclude
 Exclude listed hosts
nmap -sS
 TCP SYN port scan (Default)

 Scan Techniques

nmap –sTTCP connect port scan
nmap -sU UDP port scan
nmap TCP ACK port scan
nmap -sW TCP Window port scan
nmap -sMTCP Maimon port scan



  Host Discovery
nmap -sL
No Scan. List targets only
nmap -sn
Disable port scanning
nmap -Pn
 Disable host discovery. Port scan only
nmap -PS22-25,80
 TCP SYN discovery on port x. Port 80 by default
nmap -PA22-25,80
TCP ACK discovery on port x. Port 80 by default
nmap -PU53
UDP discovery on port x. Port 40125 by default
nmap -PR
 ARP discovery on local network
nmap -n
 Never do DNS resolution


 Port Specification
nmap -p 21 Port scan for port x
nmap -p 21-100 Port range
nmap -p U:53,T:21-25,80 Port scan multiple TCP and UDP ports
 nmap -p- Port scan all ports
nmap -p http,https Port scan from service name
nmap -F Fast port scan (100 ports)
nmap –top-ports 2000 Port scan the top x ports
nmap -p-65535 Leaving off initial port in range makes the scan start at port 1
nmap -p0- Leaving off end port in range makes the scan go through to port 65535

Service and Version Detection

nmap -sVAttempts to determine the version of the service running on port
nmap -sV –version-intensity 8 Intensity level 0 to 9. Higher number increases possibility of correctness
 nmap -sV –version-light Enable light mode. Lower possibility of correctness. Faster
 nmap -sV –version-all Enable intensity level 9. Higher possibility of correctness. Slower
nmap -AEnables OS detection, version detection, script scanning, and traceroute
nmap -O Remote OS detection using TCP/IP stack fingerprinting
nmap -O –osscan-limit If at least one open and one closed TCP port are not found it will not try OS detection against hosts
nmap -O –osscan-guess Makes Nmap guess more aggressively
nmap -O –max-os-tries 1 Set the maximum number x of OS detection tries against a target
nmap -A Enables OS detection, version detection, script scanning, and traceroute.

Timing and Performance

nmap -T0 Paranoid (0) Intrusion Detection System evasion
nmap -T1 Sneaky (1) Intrusion Detection System evasion
nmap -T2 Polite (2) slows down the scan to use less bandwidth and use less target machine resources
nmap -T3 Normal (3) which is default speed
nmap -T4Aggressive (4) speeds scans; assumes you are on a reasonably fast and reliable network
nmap -T5 Insane (5) speeds scan; assumes you are on an extraordinarily fast network

NSE Scripts

nmap -sC Scan with default NSE scripts. Considered useful for discovery and safe
nmap –script default Scan with default NSE scripts. Considered useful for discovery and safe
nmap –script=banner Scan with a single script. Example banner
nmap –script=http* Scan with a wildcard. Example http
nmap –script=http,banner Scan with two scripts. Example http and banner
nmap –script “not intrusive” Scan default, but remove intrusive scripts
nmap –script snmp-sysdescr –script-args snmpcommunity=admin NSE script with arguments

 Firewall / IDS Evasion and Spoofing

-f nmap -f Requested scan (including ping scans) use tiny fragmented IP packets. Harder for packet filters
nmap –mtu 32 Set your own offset size
nmap -D,,, Send scans from spoofed IPs
nmap -D decoy-ip1,decoy-ip2,your-own-ip,decoy-ip3,decoy-ip4 remote-host-ip Above example explained
nmap -S www.microso.com www.facebook.com Scan Facebook from Microso (-e eth0 -Pn may be required)
nmap -g 53 Use given source port number
nmap –proxies, connections through HTTP/SOCKS4 proxies
nmap –data-length 200 Appends random data to sent packets


-oN nmap -oN normal.file Normal output to the file normal.file
nmap -oX xml.file XML output to the file xml.file
nmap -oG grep.fileGrepable output to the file grep.file
nmap -oA results Output in the three major formats at once
nmap -oG – Grepable output to screen. -oN -, -oX – also usable
 nmap -oN file.file –append-outputAppend a scan to a previous scan file
nmap -v  Increase the verbosity level (use -vv or more for greater effect)
nmap -d Increase debugging level (use -dd or more for greater effect)
nmap –reason Display the reason a port is in a particular state, same output as –vv
nmap –open Only show open (or possibly open) ports
nmap -T4 –packet-traceShow all packets sent and received

Miscellaneous Options

nmap –iflist Shows the host interfaces and routes
nmap –resume results.file Resume a scan
-6 nmap -6 2607:f0d0:1002:51::4 Enable IPv6 scanning
nmap -h nmap help screen
nmap -iR 10 -PS22-25,80,113,1050,35000 -v -sn Discovery only on ports x, no port scan
nmap -PR -sn -vv Arp discovery only on local network, no port scan
nmap -iR 10 -sn -traceroute Traceroute to random targets, no port scan
nmap -sL –dns-server Query the Internal DNS for hosts, list targets only









Quick guide on: “How high protein intake may damage your kidney and liver”

Hi,welcome to KnowledgeSuttra. When it comes Bodybuilding, then our first priority is proper diet. And here comes disadvantage “The high protein intake may damage your kidney and liver”. Lets have quick guide and figure out how it will effect as well as what is optimal dose of protein

How high protein diet effect on our liver?

Protein is important factor of our body and specially when person wants to build muscle or good physique In such scenario our body needed lot of protein.

I recently quoted regarding how Protein beneficial for us and on the other hand today topic contradict it directly. 

Let make things clear, in order to know the perfect answer  we need to understand function of LIVER .

Liver play the important role of digestion. When we take high protein diet ,our liver having difficulties to digested that protein it means our liver that time suffering from very bad condition and that caused our liver damaged .


Many international Pro Bodybuilder have varying there amount of protein, hence they don’t suffer from liver damaged .  .

what is optimal dose of per day of protein intake?

To live Healthy Life
0.5 to 0.7 Gram’s per pound of body weight
)to build muscle

0.8 to 1 Gram’s per pound of body weight

Passwords on Sale : Know your social media password worth

Hi,welcome to KnowledgeSuttra.  well I am not going to talk about how to secure your Social Media Account at all. As you all know everything is available for sale, just you have to know proper place for buy it. Your every single identity is already put on sale.  Now here comes the fun part.

We recently heard about Facebook Data Breach and Google+ Data Breach, Data mining Firm like Cambridge Analytic Row and many other are always active extract user data from different platform.

According Report “ These Year  Cambridge Analytic had stolen 5.6M user data among them 5.62 Lakh User are Indian “

   Cost Of Your Password

Cost of your social media account passwords or say other info ,it various depend upon platform. Like A single User Id from Instagram can Sold for 620/-INR ($60) .

There is different Market place for all such stuff named as DARK WEB. If you belongs to Technology field or had knack about hacking and other stuff , you already it might chances you already knows about Dark Web

Type Of Account Average Price
$5.20   [381.04/- INR]
$1.50  [109.92/- INR]
$7[512.94/- INR]
$60 [620/- INR]

Still all leading Social media sites take strict action to stop identity theft action. Many fake ID

How AI could fix which we can’t

Hello everyone welcome to KnowledgeSuttra. Today we are discussing about the How AI Could Fix What Seems Unfix-able. A profound learning AI framework can be made into a specialist at taking a gander at examples.

With access to an administration level of data, it rapidly could decide if a protest was probably going to be solid. It could be anchored so the protest would not spill. It could decide close in a split second if a protestation was clearly false.

Problem solving with AI

Something that truly annoys me in the result of the hearings is the absence of spotlight on the issues they raised. For example, we send our children to class with the end goal to guarantee their future, yet we see kids getting shot, being murdered by associates because of inception, and being explicitly mishandled.

An AI can both sort and rank issues dependent on the criteria that the voters’ esteem, and propose ways to deal with take care of that issue separate from lobbyists, remote governments or political gain. I would recommend that protecting youngsters ought to be one of our most noteworthy need.

One result may be to present classes on male-female collaborations. Such a methodology could battle the current pattern to applaud young men for being forceful and not taking no as an answer.

It could ensure ladies by urging ladies to secure one another and even, if necessary, to help ensure male companions who likewise may be focuses of maltreatment.

It could score a grumbling’s potential validity and forward it to the proper office for facilitated handling and private examination. It additionally could give the complainant suggestions with respect to what to do as an individual, educate about close to home dangers involved by venturing outside the procedure, and even draw in law authorization to ensure the complainant and the hopeful, or prescribe criminal activities against either whenever justified.

Ever Wonder Where your all FAT gone??

Hi,welcome to KnowledgeSuttra.Have you ever wonder “where all the FAT GOES?” , when you follow a FAT LOSS  Schedule. Let take small quick guide and try to find out above tricky question answer.

Also Read:- Health & Fitness : Different Types Of Fat And There IMP

  Where the fat gone when we are doing fat loss program?

Firstly what is the answer above the question by your opinion? . You might fat converts into muscles or fat converts in energy . If you thinking about this answer you were totally wrong . Then where the fat gone when we are doing fat loss program.

 Correct answer is  when we doing fat loss program that time the fat converts to carbon dioxide and water when you exhale that time carbon dioxide and the water mixes into your circulation until it’s lost as urine or sweat.

So this the correct answer it will shocking for many people who don’t know about it . let take an example how actually fat converts into urine or sweat?

When you lose 10kg fat that time 8.4 kg comes through out from our lungs and remaining 1.6 kg is converts into water .in simple word mostly fat we lose from exhaled.

This this information about where the fat is gone.we hope this might be interesting topic for you guys

Know anyone’s location by sending link through message(WhatsApp, Facebook, etc).

Where’s my boy/girlfriend ? Where he/she spend maximum time ? Do you think he/she lied to you ?

Well know about his/her location by sending just a link to them. How is it possible ? There are many services available which are providing such details, we are going to discuss one of the trusted credential provider which is Grabify. It is the worldwide based IP provider. Today we will use Grabify as your primary weapon and later on we will use IP2LOCATION to get the exact location of our victim.

Steps to get locations :

  • Go to Grabify

You will see the page looks like

Rather than getting confused Enter any available existing live site URL which you want to show to your victims and then click on Create URL.

Also Read :-  Internet Response Codes with meaning.

Now it will create any temporary link which grabs the information of victims. If you are unable to understand jumo to its dashboard, it will automatically jump to the dashboard, no need to do anything.

The URL that has been pasted earlier. And this is the page on which our victim will be redirected.

  1. URL which we will send to our victims.
  2. In the other link you will have options to select other type of URL shortners.
  3. This is the Access token that is used for accessing the our account and regain the session
  4. This is very important link that used to access our session without creating an account on grabify.

Now deceive the intended user/victim to click on the link. Once he/she clicks on the link your important data will start generating. And resultant you can see the Date and time, IP address of the user, Country, service used by user to access the link, whether it was referred by Facebook/Whatsapp/Twitter, etc. As well as you can see the Host name and ISP service provider name.

I tried mine, and successfully got the better result.

Now what about location.

Get that IP address and paste it in IP2LOCATION

Paste that grabbed IP in this search box. Now its done.

This is what we wanted ever. Latitude and Longitude. Now use the Google maps. And get the exact location of the victim.

Note :- Gathering anyone’s information without their permission is illegal, don’t do this even if you are having qualities. I never did this to compromise anyone’s safety. If you want to know anyone’s location just call them and ask about their respective location. #TeamKnowledgeSuttra neither encourages you nor advice you to do such illegitimate things. This is just for knowledge purpose.