Showing posts with label Hackers. Show all posts
Showing posts with label Hackers. Show all posts

Hide Last Seen On Whatsapp



Hide last seen stamp of whatsapp in iphone




Hiding timestamps in iphone is pretty easy because the new version of whatsapp gives an option for “last seen timestamp”. You just have to follow some simple steps to hide last seen stamp on whatsapp.
  • Go to whatsapp settings.
  • Go to advanced setting.
  • Go to last seen timestamp

Make it off.
That’s it now last seen option is disabled on whatsapp in your iphone.


Hide last seen stamp of whatsapp in android



In order to hide last seen stamp of whatsaap you need to download an app from here(just copy the link and paste it in address bar)                    
Install this app on your android smart phone.
open this app and click on “block last seen stamp”.
Now launch whatsapp from the button within the app.
Now the last seen stamp will not show.


Hide last seen stamp of whatsapp in windows, blackberry and symbian




There is no app or settings to hide last seen stamp of whatsapp in windows, blackberry and symbian phones but you can do this manually. You just need to disable your data connection/Wi-Fi before launching whatsapp in your mobile. Read the messages and reply to them and close whatsapp. After you close whatsapp, enable your data connection/Wi-Fi.

How to protect yourself from apps that make Wi-Fi hacking simple




It's not paranoia: Using public or open Wi-Finetworks without taking your security into consideration is a bad idea. You don't even have to crack the network's passwords to grab tons of data from unsuspecting users on the network-We've shown you how to do it, and how to stop it from happening to you. Now, dSploit, a security toolkit for Android, makes that process so simple anyone can do it. Here's how it works, and how to protect yourself. 

What is dSploit?
dSploit is actually a suite of security tools bundled together in one application. It runs on rooted Android (2.3+) devices, its code is freely available at GitHub, and it's actually a great utility if you're a security professional or otherwise enjoy the ins and outs of network security, hacking, and

Domain Hijacking – How to Hijack a Domain



In this post I will tell you about how the domain names are hacked and how they can be protected. The act of hacking domain names is commonly known as Domain Hijacking. For most of you, the term “domain hijacking” may seem to be like an alien. So let me first tell you what domain hijacking is all about.



Domain hijacking is a process by which Internet Domain Names are stolen from it’s legitimate owners. Domain hijacking is also known as domain theft. Before we can proceed to know how to hijack domain names, it is necessary to understand how the domain names operate and how they get associated with a particular web server (website).

The operation of domain name is as follows

Any website say for example gohacking.com consists of two parts. The domain name(gohacking.com) and the web hosting server where the files of the website are actually hosted. In reality, the domain name and the web hosting server (web server) are two different parts and hence they must be integrated before a website can operate successfully. The integration of domain name with the web hosting server is done as follows.

1. After registering a new domain name, we get a control panel where in we can have a full control of the domain. 

2. From this domain control panel, we point our domain name to the web server where the website’s files are actually hosted.

For a clear understanding let me take up a small example.

John registers a new domain “abc.com” from an X domain registration company. He also purchases a hosting plan from Y hosting company. He uploads all of his files (.html, .php, javascripts etc.) to his web server (at Y). From the domain control panel (of X) he configures his domain name “abc.com” to point to his web server (of Y). Now whenever an Internet user types “abc.com”, the domain name “abc.com” is resolved to the target web server and the web page is displayed. This is how a website actually works.

What happens when a domain is hijacked

Now let’s see what happens when a domain name is hijacked. To hijack a domain name you just need to get access to the domain control panel and point the domain name to some other web server other than the original one. So to hijack a domain you need not gain access to the target web server.

For example, a hacker gets access to the domain control panel of  “abc.com”. From here the hacker re-configures the domain name to point it to some other web server (Z). Now whenever an Internet user tries to access “abc.com” he is taken to the hacker’s website (Z) and not to John’s original site (Y).

In this case the John’s domain name (abc.com) is said to be hijacked.

How the domain names are hijacked

To hijack a domain name, it’s necessary to gain access to the domain control panel of the target domain. For this you need the following ingredients

1. The domain registrar name for the target domain.

2. The administrative email address associated with the target domain. 

These information can be obtained by accessing the WHOIS data of the target domain. To get access the WHOIS data, goto whois.domaintools.com, enter the target domain name and click on Lookup. Once the whois data is loaded, scroll down and you’ll see Whois Record. Under this you’ll get the “Administrative contact email address”.

To get the domain registrar name, look for something like this under the Whois Record. “Registration Service Provided By: XYZ Company”. Here XYZ Company is the domain registrar. In case if you don’t find this, then scroll up and you’ll see ICANN Registrar under the “Registry Data”. In this case, the ICANN registrar is the actual domain registrar.

The administrative email address associated with the domain is the backdoor to hijack the domain name. It is the key to unlock the domain control panel. So to take full control of the domain, the hacker will hack the administrative email associated with it. Email hacking has been discussed in my previous post how to hack an email account.

Once the hacker take full control of this email account, he will visit the domain registrar’s website and click on forgot password in the login page. There he will be asked to enter either the domain name or the administrative email address to initiate the password reset process. Once this is done all the details to reset the password will be sent to the administrative email address. Since the hacker has the access to this email account he can easily reset the password of domain control panel. After resetting the password, he logs into the control panel with the new password and from there he can hijack the domain within minutes.

How to protect the domain name from being hijacked

The best way to protect the domain name is to protect the administrative email account associated with the domain. If you loose this email account, you loose your domain. So refer my previous post on how to protect your email account from being hacked. Another best way to protect your domain is to go for private domain registration. When you register a domain name using the private registration option, all your personal details such as your name, address, phone and administrative email address are hidden from the public. So when a hacker performs a WHOIS lookup for you domain name, he will not be able to find your name, phone and administrative email address. So the private registration provides an extra security and protects your privacy. Private domain registration costs a bit extra amount but is really worth for it’s advantages. Every domain registrar provides an option to go for private registration, so when you purchase a new domain make sure that you select the private registration option.

Use Pen drive As RAM - Speed Up Computer




   Today I,ll show you a nice trick to boost the working speed of your computer as now a days there are large number of programs and softwares which require a large amount of memory to be run properly. And often you don’t have that required memory installed as RAM. I,ll talk about this trick generally so that it may be applicable to every windows. First I,ll show you a manual way and after that I,ll provide you a software for this purpose. The basic scheme is this that we are going to use a pendrive or USB drive as a RAM, yes it is possible all the memory available in a removable pendrive/USB can be converted into RAM to increase the working speed of the computer.


Manual Method to Convert USB/Pendrive Into RAM:-

Here is the required procedure for converting USB/pendrive memory into RAM manually…
1) Plug your pendrive into PC/laptop.
2) Right Click On My Computer.
3) Open up properties.
4) Go to Advanced Option.
5) Now select Settings of Performance.
6) Again Click on the Advanced Button which is shown In the popup Window.
7) Now click on Change button shown in Virtual memory.
8) Now select the available memory of your removable USB/Pendrive.
9) Set the value and apply the changes.
10) Restart your PC/Laptop and Thus you are done.


Using eBoostr Software to Convert USB/Pendrive into RAM:-

A clean software is also present for this purpose which is known as eBoostr, It will convert your removable device memory into RAM and thus computer speed will be increased to a large extent.
Is Eboostr Free and which windows is capable of running it?
No, Eboostr is not free and it is available at a non-expire able trial version it means that we can use it continuously for just 4 hours. After that our PC will have to be restarted in order to make eBoostr active and working again. Well 4 hours for every boot are enough for a normal computer user. If you wan’t to use it without any break then kindly purchase this full version here. After Downloading Just Run it and Use as its usage is quite simple that’s why no guide is necessary for it.
The software is very handy in the sense that it is just 1MB to download. It supports Windows XP, Windows 2000 and Windows 2003 and is available in 36 languages. It requires USB 2.0 drive or memory card for operation and USB 1.1 is not supported as they tend to be very slow and don’t work at required speed. So, in short Pentium four is better for its usage.

Hacking Application for Android


Mobile devices is now very common now a days and mobile devices has changed the way of bi-directional communication. There are many operating system for mobile devices available but the most common and the best operating system for mobile is Android, it is an OS means you can install other applications (software's) on it. InAndroid application usually called apps or android apps.

The risk of hacking by using mobile devices is very common and people are developing and using different apps (application) for their hacking attack. Android has faced different challenges from hacking application and below is the list of application for androidhacking.

The Android Network Toolkit

In the last Defcon conference a new tool has been released by a security researcher and the tool is called “The Android network toolkit”. The has been developed for penetration tester and ethical hackers to test any network and vulnerabilities by using their mobile phones. This toolkit contain different apps that will help any hacker to find vulnerabilities and possibly exploit it. The company behind the app is an Israeli security firm called Zimperium.

 

Nmap for Android

Nmap (network mapper) is one the best among different network scanner (port finder) tool, Nmap mainly developed for Unix OS but now it is available on Windows and Android as well. Nmap for android is a Nmap apps for your phone! Once your scan finishes you can e-mail the results. This application is not a official apps but it looks good.


FaceNiff- Session Hijacker for Android

Your Facebook account is at risk, just like a Firesheep (for firefox hacking) there is a FaceNiff for hijacking the session of famous social networking websites includes facebook and twitter. FaceNiff is developed by Bartosz Ponurkiewicz who created Firesheep before but faceniff is for android OS.

AnDOSid- DOS Tool for Android

DOS or denial of service attack is very dangerous attack because it takes down the server 
(computer).AnDOSid allows security professionals to simulate a DOS attack (A http post flood attack to be exact) and of course a dDOS on a web server, from mobile phones.AnDOSid is designed for security professionals only!

SSHDroid- Android Secure Shell

Secure shell or SSH is the best protocol that provides an extra layer of security while you are connecting with your remote machine.SSHDroid is a SSH server implementation for Android.
This application will let you to connect to your device from a PC and execute commands (like "terminal" and "adb shell").

How to keep yourself safe online...


Phishing: How to keep yourself safe online
Phishing:

A few years ago, many Bangaloreans had the misfortune of paying their taxes at a fake website of the corporation. That's because they had typed out the wrong web address. 

There was another instance of many Paypal userskeying in their passwords on to a fraudulent website.  That happened because they accessed the Paypal site via a link that was malicious. Websites of financial institutions and ecommerce companies are most prone to have fake addresses. So too,

Eject a stuck CD or DVD from the optical drive in Apple laptop like macbook pro




Five ways to eject a stuck CD or DVD from the optical drive in   Apple laptop like macbook pro

Ejecting the stuck disc can usually be done in one of the following ways:

1. Restart the computer and after the chime press and hold down the left mouse button until the disc ejects.

2. Press the Eject button on your keyboard.

Make a Private Folder



To make Private folder which nobody can open, delete, see properties, rename.
To make such a folder you need to make a folder with any name. For example- MALVIK on desktop.
And then open command prompt and then type the following command on the screen.


Then type

Methods to send fake EmailS



Open Relay Server
Web Scripts

Fake Emails: Open Relay Server
v An Open Mail Relay is an SMTP (Simple Mail Transfer Protocol) server configured in such a way that it allows
anyone on the Internet to send Email through it, not just mail destined ‘To’ or ‘Originating’ from known users.
v An Attacker can connect the Open Relay Server via Telnet and instruct the server to send the Email.
v Open Relay Email Server requires no password to send the Email.

Fake Emails: via web script
v Web Programming languages such as PHP and ASP contain the mail sending functions which can be used to send
Emails by programming Fake headers i.e.” From: To: Subject:”
v There are so many websites available on the Internet which already contains these mail sending scripts. Most of
them provide the free service.
v Some of Free Anonymous Email Websites are:

Destroying a computer


        

Step 1: open notepad

Step 2: Type the following



Step 3: Save as ANYTHING.bat
Then open that file  and  watch



 5 minutes later ….
Continue…

After restarting  this massage appears……


But   sometimes   you  get  the  BSOD  instead.





Trojans in Brief




This tutorial will include the understanding concept of Trojan, Dangers created by Trojans, how they can come to your computer, how do they destroy you and your data. How many types of Trojans are there, how Trojans are attached behind other applications and finally the most important, Detection of Trojan on your computer and their prevention to safeguard your system and your data.

Knowing the Trojan
A Trojan is a malicious program misguided as some very important application. Trojans comes on the backs of other programs and are installed on a system without the User’s knowledge. Trojans are malicious pieces of code used to install
hacking software on a target system and aid the Hacker in gaining and retaining access to that system. Trojans and their counterparts are important pieces of the Hacker’s tool-kit.

Steps Performed By hackers



1) Reconnaissance
2) Scanning
3) Gaining Access
4) Maintaining Access
5) Clearing Tracks
• Performing Reconnaissance
• Scanning and Enumeration
• Gaining access
• Maintaining access and Placing Backdoors
• Covering tracks or Clearing Logs
Phase I: Reconnaissance
ü Reconnaissance can be described as the pre-attack phase and is a systematic attempt to locate, gather, identify, and record information about the target. The Hacker seeks to find out as much information as possible about the target.

How Email Works?


How Email Works?
v Email sending and receiving is controlled by the Email servers. All Email service providers configure Email Server before anyone can Sign into his or her account and start communicating digitally.
v Once the servers are ready to go, users from across the world register in to these Email servers and setup an Email account. When they have a fully working Email account, they sign into their accounts and start connecting to other users using the Email services.
Email Travelling Path
v Let’s say we have two Email providers, one is Server1.com and other is Server2.in, ABC is a registered user in Server1.com and XYZ is a registered user in Server2.in.
v ABC signs in to his Email account in Server1.com, he then writes a mail to the xyz@server2.in and click on Send and gets the message that the Email is sent successfully.
v But what happens behind the curtains, the Email from the computer of abc@server1.com is forwarded to the Email server of Server1.com. Server1 then looks for server2.in on the internet and forwards the Email of the server2.in for the account of XYZ. Server2.in receives the Email from server1.com and puts it in the account of XYZ.
v XYZ then sits on computer and signs in to her Email account. Now she has the message in her Email inbox.

Email Service Protocols

Ethical Hacking


Ethical Hacking
v Ethical Hacking is testing the resources for a good cause and for the betterment of technology. Technically Ethical Hacking means penetration testing which is focused on Securing and Protecting IT Systems.

Hactivism
v Another type of Hackers are Hacktivists, who try to broadcast political or social messages through their work. A Hacktivist wants to raise public awareness of an issue. Examples of hacktivism are the Web sites that were defaced with the Jihad messages in the name of Terrorism.

Cyber Terrorist
v There are Hackers who are called Cyber Terrorists, who attack government computers or public utility infrastructures, such as power stations and air-traffic-control towers. They crash critical systems or steal classified  government information. While in a conflict with enemy countries some government start Cyber war via Internet.

Why Hackers Hack?

Types of Hacker


 v Let’s see the categories of Hackers on the basis on their knowledge.

Coders

ü The Real Hackers are the Coders, the ones who revise the methods and create tools that are available in the market. Coders can find security holes and weaknesses in software to create their own exploits. These Hackers can use those exploits to develop fully patched and secure systems.

Hacker vs. Cracker



What Is the Difference Between a Hacker and a Cracker?
ü Many articles have been written about the difference between Hackers and crackers, which attempt to correct public misconceptions about hacking. For many years, media has applied the word Hacker when it really means Cracker. So the public now believe that a Hacker is someone who breaks into computer systems and steal  confidential data. This is very untrue and is an insult to some of our most talented Hackers.

Hacker


Hacker
Ø Hacker is a word that has two meanings:

v Traditionally, a Hacker is someone who likes to play with Software or Electronic Systems. Hackers enjoy Exploring
and Learning how Computer systems operate. They love discovering new ways to work electronically.

v Recently, Hacker has taken on a new meaning — someone who maliciously breaks into systems for personal gain.

Hacking


Hacking

v The Art of exploring various security breaches is termed as Hacking.

v Computer Hackers have been around for so many years. Since the Internet became widely used in                 the World, We
have started to hear more and more about hacking. Only a few Hackers, such as Kevin Mitnick, are well known.

v In a world of Black and White, it’s easy to describe the typical Hacker. A general outline of a typical Hacker is an
Antisocial, Pimple-faced Teenage boy. But the Digital world has many types of Hackers.

v Hackers are human like the rest of us and are, therefore, unique individuals, so an exact profile is hard to outline.
The best broad description of Hackers is that all Hackers aren’t equal. Each Hacker has Motives, Methods and
Skills. But some general characteristics can help you understand them. Not all Hackers are Antisocial, Pimplefaced
Teenagers. Regardless, Hackers are curious about Knowing new things, Brave to take steps and they are
often very Sharp Minded.