Translate

Friday 2 October 2015

How To Create Hotspot With Cmd (Without Any Software)

 Create Hotspot With Command Prompt For windows 7, 8, 10


Want to share your internet on your cellphone and on your other devices without using any software like Connectify, which cost you a lot, you are already buying your Internet connection so why to pay for sharing your connection to your other devices......

So here I have found a way to share my Internet with my other devices with the help of a inbuilt command prompt with some simple command steps as follows


1. Click on start button, and type "cmd" without quotes in search bar

2. Then right click on cmd and open it as an administrator

3. Now type the following command


 netsh wlan set hostednetwork mode=allow ssid="connection_name" key="password"


Note:- This command set your hotspot to work with the details. And instead of "connection_name" & "password" you can change it to any characters but without quotes........ SSID is the name of name of your hotspot you are creating and in password is your password needed to connect to your hotspot by other devices of yours

    Now after typing the ssid and password hit Enter

4. Now type


netsh wlan start hostednetwork


Note:- This is to start the hosted hotspot of yours

5. Now the last typing command


netsh wlan show hostednetwork


Note:- This is to show your connection which you have hosted to your wifi connecting devices

6. Now open your control panel, and open "Network and Sharing Center"

7. On the left panel in Network and Sharing Center click on "Change Adapter Settings"

Now all your Internet connections will shown in the panel

8. Right click on the internet connection you are using or want to share with other devices

9.  Click on the sharing tab and select "Allow Other Networks Users To Connect Through This Computer's Internet Connection"

10. And select the network you are using as your hotspot.


Last If you want to turn off your Hotspot just open your cmd as Administrator and type


netsh wlan stop hostednetwork

And press Enter

Finally Your Hotspot is created and you can use Internet on your other devices now.......ENJOY....... :-)

Tuesday 29 September 2015

Start Hacking From the very Beginning Pt.3 (Download eBook Hacking For Dummies 3rd Ed in PDF format)

Want to Learn Hacking......




  Third Step....

 

 

 

 

About This Book

Hacking For Dummies, 3rd Edition, is a reference guide on hacking your systems
to improve security. The ethical hacking techniques are based on written
and unwritten rules of computer system penetration testing, vulnerability
testing, and information security best practices. This book covers everything
from establishing your hacking plan to testing your systems to plugging
the holes and managing an ongoing ethical hacking program. Realistically,
for many networks, operating systems, and applications, thousands of possible
hacks exist. I cover the major ones on various platforms and systems.
Whether you need to assess security vulnerabilities on a small home office
network, a medium-sized corporate network, or across large enterprise systems,
Hacking For Dummies, 3rd Edition, provides the information you need.

 

 

 Different Section Included In This Book

Part I: Building the Foundation
for Ethical Hacking

Part II: Putting Ethical Hacking in Motion

Part III: Hacking the Network

Part IV: Hacking Operating Systems

Part V: Hacking Applications

Part VI: Ethical Hacking Aftermath

Part VII: The Part of Tens

About The Author

by- Kevin Beaver

As founder and principal consultant of Principle Logic, LLC, Kevin Beaver
has over 16 years of experience in IT and specializes in information security.
Before starting his own information security services business, Kevin served
in various information technology and security roles for several Fortune
500 corporations and a variety of consulting, e-commerce, and educational
institutions. In addition to ethical hacking, his areas of information security
expertise include network and wireless network security, e-mail and instant
messaging security, and incident response
Kevin is also author of the book The Definitive Guide to Email Management and
Security by Realtimepublishers.com and co-author of the book The Practical
Guide to HIPAA Privacy and Security Compliance by Auerbach Publications. In
addition, he is technical editor of the book Network Security For Dummies by
Wiley Publishing, and a contributing author and editor of the book Healthcare
Information Systems, 2nd ed. by Auerbach Publications.
Kevin is a regular columnist and information security expert advisor for
SearchSecurity.com and SearchMobileComputing.com and is a Security Clinic
Expert for ITsecurity.com. In addition, his information security work has been
published in Information Security Magazine, HIMSS Journal of Healthcare
Information Management, Advance for Health Information Executives as well
as on SecurityFocus.com. Kevin is an information security instructor for the
Southeast Cybercrime Institute and also frequently speaks on information
security at various workshops and conferences around the U.S. including
TechTarget’s Decisions conferences, CSI, and the Southeast Cybercrime
Summit.
Kevin is the founder and president of the Technology Association of Georgia’s
Information Security Society and serves as an IT advisory board member for
several universities and companies around the southeast. Kevin earned his
bachelor’s degree in Computer Engineering Technology from Southern Polytechnic
State University and his master’s degree in Management of Technology
from Georgia Tech. He also holds CISSP, MCSE, Master CNE, and IT Project+
certifications. Kevin can be reached at kbeaver@principlelogic.com.


  Note:- If you want to read the Part 2nd of this page click here

  Note:- If you want to read the Part 1st of this page click here

 

Wednesday 4 February 2015

Start Hacking From the very Beginning Pt.2 (Download eBook Hacking For Dummies 2nd Ed in PDF format)

Want to Learn Hacking......


Second Step....

After the very first step in my last post for the beginners here I am taking you to next.This is a whole new level to hacking and I think this time you are going to learn a lots and lots of interesting thing.

We all have a Wi-Fi connection even your neighbor must having one and I tried to hack it and I think you all must have been trying and after when you got failed you just stopped trying now its time for you to learn and know behind the scenes, actually whats happening behind the network, and how wireless network work, what are its vulnerabilities and the very final step how to take advantage of those vulnerabilities and get into the network access.


With the help of this e-book you can get all the knowledge of Wireless Networks and I know this is for the very beginners so if you have no knowledge of Networks and Hacking, and you have that interest of learning something good then you should try this e-book.


About The Author

by- Kevin Beaver

Is founder and information security advisor with Principle
Logic, LLC, an Atlanta-based information-security services firm. He has over
17 years of experience in the IT industry and specializes in information
security assessments for those who take security seriously — and incident
response for those who don’t. Before starting his own information-security
services business, Kevin served in various information-technology and security
roles for several healthcare, e-commerce, financial, and educational
institutions.
Kevin is author of Hacking For Dummies as well as the e-book The Definitive
Guide to Email Management and Security (Realtimepublishers.com). In addition,
Kevin co-authored The Practical Guide to HIPAA Privacy and Security
Compliance (Auerbach Publications). He was also a contributing author and
editor of Healthcare Information Systems, 2nd ed., (Auerbach Publications),
and technical editor of Network Security For Dummies.
Kevin is a regular columnist and information-security expert for SearchSecurity.
com, SearchWindowsSecurity.com, SearchNetworking.com, SearchExchange.
com, and SearchSmallBizIT.com. He also serves as a contributing editor
for HCPro’s Briefings on HIPAA newsletter and is a Security Clinic Expert
for ITsecurity.com. In addition, Kevin’s information-security work has
been published in Information Security Magazine, SecurityFocus.com,
and Computerworld.com. Kevin is an information-security instructor for
the Southeast Cybercrime Institute, and frequently speaks on information
security at various conferences for CSI, TechTarget, IIA, SecureWorld Expo,
and the Cybercrime Summit.
Kevin earned his bachelor’s degree in Computer Engineering Technology from
Southern Polytechnic State University and his master’s degree in Management
of Technology from Georgia Tech. He also holds MCSE, Master CNE, and IT
Project+ certifications. Kevin can be reached at kbeaver@principlelogic.com.
Peter T. Davis (CISA, CMA, CISSP, CWNA, CCNA, CMC, CISM) founded Peter
Davis+Associates (a very original name) as a firm specializing in the security,
audit, and control of information. A 30-year information-systems veteran,
Mr. Davis’s career includes positions as programmer, systems analyst, security
administrator, security planner, information-systems auditor, and consultant.
Peter is also the founder (and past President) of the Toronto ISSA chapter,
past Recording Secretary of the ISSA’s International Board, and past Computer
Security Institute Advisory Committee member. Mr. Davis has written or
co-written numerous articles and 10 books, including Wireless Networks For
Dummies and Securing and Controlling Cisco Routers. In addition, Peter was
the technical editor for Hacking For Dummies and Norton Internet Security
For Dummies. Peter is listed in the International Who’s Who of Professionals.
In addition, he was only the third editor in the three-decade history of
EDPACS, a publication in the field of security, audit, and control. He finds
time to be a part-time lecturer in data communications at Seneca College
(http://cs.senecac.on.ca). He lives with his wife Janet, daughter Kelly,
two cats, and a dog in Toronto, Ontario.



Download Link For PDF format :- Hacking Wireless Networks For Dummies 2nd Edition.pdf 
 Download Link For EPUB format :- Hacking Wireless Networks For Dummies 2nd Edition.epub



 Note:- If you want to read the Part 1st of this page click here 

 Note:- If you want to read the Part 3rd of this page click here

Sunday 25 January 2015

Start Hacking From the very Beginning (Download eBook Hacking For Dummies in PDF format)

Want to Learn Hacking......








The very beginning :- Step 1

 






People daily asking me we are interested in Hacking but don't know where to start so this Post is dedicated to all those who really interested in hacking and for those who want to take the very first step towards the Hacking world.

 Don't know where to start so here is the first step for the very beginners to start with. Downloading this e-Book will be the first step to your Hacking world but I hope it will help you a lot for the starting.




Heard the name of Mr. Mark Zuckerberg (Founder of the social networking site Facebook.com). He started his career as with this book Hacking For Dummies. Which created his interest in IT world so after further research he created software's in his middle school.
He was more than a hacker, as he was a programmer also(BASIC Programming). Which further helped him to hack his own college website and his web development skills helped him to creat a website facemash.com  which compares the college students face with animals.......

This e-Book is for the very beginners, who has interest in hacking but don't know where to start.

About The Author

by- Kevin Beaver


As founder and principal consultant of Principle Logic, LLC, Kevin Beaver
has over 16 years of experience in IT and specializes in information security.
Before starting his own information security services business, Kevin served
in various information technology and security roles for several Fortune
500 corporations and a variety of consulting, e-commerce, and educational
institutions. In addition to ethical hacking, his areas of information security
expertise include network and wireless network security, e-mail and instant
messaging security, and incident response
Kevin is also author of the book The Definitive Guide to Email Management and
Security by Realtimepublishers.com and co-author of the book The Practical
Guide to HIPAA Privacy and Security Compliance by Auerbach Publications. In
addition, he is technical editor of the book Network Security For Dummies by
Wiley Publishing, and a contributing author and editor of the book Healthcare
Information Systems, 2nd ed. by Auerbach Publications.
Kevin is a regular columnist and information security expert advisor for
SearchSecurity.com and SearchMobileComputing.com and is a Security Clinic
Expert for ITsecurity.com. In addition, his information security work has been
published in Information Security Magazine, HIMSS Journal of Healthcare
Information Management, Advance for Health Information Executives as well
as on SecurityFocus.com. Kevin is an information security instructor for the
Southeast Cybercrime Institute and also frequently speaks on information
security at various workshops and conferences around the U.S. including

TechTarget’s Decisions conferences, CSI, and the Southeast Cybercrime

Summit.
Kevin is the founder and president of the Technology Association of Georgia’s
Information Security Society and serves as an IT advisory board member for
several universities and companies around the southeast. Kevin earned his
bachelor’s degree in Computer Engineering Technology from Southern Polytechnic
State University and his master’s degree in Management of Technology
from Georgia Tech. He also holds CISSP, MCSE, Master CNE, and IT Project+
certifications. Kevin can be reached at kbeaver@principlelogic.com.





                   Download Hacking For Dummies PDF

Download Link:-     Hacking For Dummies

Sunday 18 January 2015

How to Bypass Windows 8 Password

How to Bypass Windows 8 Password 

Login Screen?



In this tutorial, I will teach you how to bypass the Windows Password Login Screen using KON-Boot.It helps in bypassing the default windows password protection and upon reboot, it leaves no trace. The password isn't changed nor any system settings, it will be just bypass the login screen and deletes all the its temporary files after reboot. At the end of this tutorial, you will be able to log into password protected Windows OS (Tested on: Windows XP, Windows 7, Windows 8, Windows 8.1).







What is KON Boot?


Kon-Boot  is an application that modifies the contents of the Windows kernel on the fly / at boot time, bypassing the authorization system and allowing Windows to enter a password-protected user account without a password. Whatever is your favorite password, it is not overwritten when you restart Windows and the original contents of the nucleus and its authorization procedure restored. Kon-Boot boot from floppy / cd / usb, runs in a quiet mode automatically

Requirements


The following will be required to successfully execute this hack.

1. KON-Boot v2.4 - You can download it from here for free and then you will need to install it onto a Bootable USB.

2. USB Pendrive - You need to have a pendrive which is formatted to FAT32. Note: It is important that is formatted to FAT32 for this to work. For formatting, just right click on the USB drive and select "Format" and select "FAT32" from the File System drop down list.

How to Install KON-Boot onto USB


1. First Extract the .zip file. Go to the folder "kon-bootUSB".

2. Now, insert your USB drive into your computer. Make sure, no other USB drive is attached.

3. If you are using Windows 7 or higher,Right click on "usb_install_RUNASADMIN.bat" and click on "Run as Administrator". We need to run this .bat file using administrator rights. Once you open this file, you will get a series of notifications, for which you will have to click on "Okay". If you are using Windows XP or lower.Click on "USB_INSTALL_DIFF.vbs" and follow the instructions.

4. If there has been no problem, you will get the below confirmation dialogue box.




Now that we have successfully installed KON-Boot onto our computer, we can now move into our main step, that is, how to bypass your victim's loging screen.

Bypassing Windows Password Protection


1. You will need to open the BIOS setup. For this, you will need to switch on their computer and as soon as it turns on, you will get a series of options at the lower screen. Click on the appropriate action to "Enter BIOS Setup".It depends entirely on which computer brand your victim uses. My Lenovo computer for instance, opens BIOS when I press "Fn+F10". You can Google for more details.

2. Once you have entered the BIOS setup, you will have to find the "Boot Options". In those options you have to change the order of priority such that the first priority is given to "USB Drive" and then to your Hard Disk. Doing so, will let your computer boot through USB first, instead of the usual Windows through your Hard Disk.

3. Additionally, if your computer has EFI support, please "Disable EFI" in the BIOS settings. It will be near the BIOS settings.

4. After the above changes have been made to the BIOS, you save it and exit. Let the computer restart. You will get 2 options where you click on "KON-Boot (Current Version)" for Windows 7 and higher versions and "KON-Boot (Old Version)" for Windows XP and lower.

5. It might take some time initially to boot the first time, you will also be displayed the KON-Boot logo.That is completely normal. After which the default Windows OS will load.

6. That's it! Now when the Login screen appears, DO NOT type anything for the password, just click the login button and you would have logged on without any problem!



Additional Information


You can see the konbootWin_guide.pdf which is included in the KON-Boot download for more information and troubleshooting.Below is the list of supported versions of Windows whose Login screen can be bypassed!
  • Microsoft Windows XP Home Edition (Service Pack 2+) - Yes
  • Microsoft Windows Vista Home Basic 32Bit/64Bit - Yes (FULL SUPPORT)
  • Microsoft Windows Vista Home Premium 32Bit/64Bit - Yes (FULL SUPPORT)
  • Microsoft Windows Vista Business 32Bit/64Bit - Yes (FULL SUPPORT)
  • Microsoft Windows Vista Enterprise 32Bit/64Bit - Yes (FULL SUPPORT)
  • Microsoft Windows Server 2003 Standard 32Bit/64Bit - Yes (FULL SUPPORT)
  • Microsoft Windows Server 2003 Datacenter 32Bit/64Bit - Yes (FULL SUPPORT)
  • Microsoft Windows Server 2003 Enterprise 32Bit/64Bit - Yes (FULL SUPPORT)
  • Microsoft Windows Server 2003 Web Edition 32Bit/64Bit - Yes (FULL SUPPORT)
  • Microsoft Windows Server 2008 Standard 32Bit/64Bit - Yes (FULL SUPPORT)
  • Microsoft Windows Server 2008 Datacenter 32Bit/64Bit - Yes (FULL SUPPORT)
  • Microsoft Windows Server 2008 Enterprise 32Bit/64Bit - Yes (FULL SUPPORT)
  • Microsoft Windows 7 Home Premium 32Bit/64Bit - Yes (FULL SUPPORT)
  • Microsoft Windows 7 Professional 32Bit/64Bit - Yes (FULL SUPPORT)
  • Microsoft Windows 7 Ultimate 32Bit/64Bit - Yes (FULL SUPPORT (normal BIOS + EFI BIOS))
  • Microsoft Windows 8 and 8.1 (32Bit/64Bit) - Yes (FULL SUPPORT (normal BIOS + EFI BIOS)). Local and online authorization.

Friday 16 January 2015

PHP

Introduction To PHP......






Writing PHP applications is pretty easy. Most people grasp the syntax rather quickly and will within short time be able to produce a script that works using tutorials, references, books, and help forum forums like the one we have here at PHP Freaks. The problem is that most people forget one of the most important aspects that one must consider when writing PHP applications. Many beginners forget the security aspect of PHP. Generally, your users are nice people, they will do as they are told and you will have no problem with these people whatsoever. However, some people are not quite as nice. Some people are outright malicious and are seeking to do damage on your website. They will scrutinize your application for security flaws and exploit these holes. Many times the beginner programmer did not know that these things would even be a problem and therefore it might be a problem to fix the holes. In this tutorial we will look at some of these issues so you can learn how to deal with them, and better yet, prevent them. Obviously I will not promise you that by following this tutorial you will never get successfully attacked. As you become bigger you will also become a bigger and therefore more interesting target - something we have experienced ourselves here at PHP Freaks.

You can download PHP eBook from :- Beginning PHP 5.3

Thursday 15 January 2015

What is DDoS?

What is a denial-of-service (DoS) attack?




In a denial-of-service (DoS) attack, an attacker attempts to prevent legitimate users from accessing information or services. By targeting your computer and its network connection, or the computers and network of the sites you are trying to use, an attacker may be able to prevent you from accessing email, websites, online accounts (banking, etc.), or other services that rely on the affected computer.
The most common and obvious type of DoS attack occurs when an attacker "floods" a network with information. When you type a URL for a particular website into your browser, you are sending a request to that site's computer server to view the page. The server can only process a certain number of requests at once, so if an attacker overloads the server with requests, it can't process your request. This is a "denial of service" because you can't access that site.
An attacker can use spam email messages to launch a similar attack on your email account. Whether you have an email account supplied by your employer or one available through a free service such as Yahoo or Hotmail, you are assigned a specific quota, which limits the amount of data you can have in your account at any given time. By sending many, or large, email messages to the account, an attacker can consume your quota, preventing you from receiving legitimate messages.

What is a distributed denial-of-service (DDoS) attack?

In a distributed denial-of-service (DDoS) attack, an attacker may use your computer to attack another computer. By taking advantage of security vulnerabilities or weaknesses, an attacker could take control of your computer. He or she could then force your computer to send huge amounts of data to a website or send spam to particular email addresses. The attack is "distributed" because the attacker is using multiple computers, including yours, to launch the denial-of-service attack.

How do you avoid being part of the problem?

Unfortunately, there are no effective ways to prevent being the victim of a DoS or DDoS attack, but there are steps you can take to reduce the likelihood that an attacker will use your computer to attack other computers:
  • Install and maintain anti-virus software.
  • Install a firewall, and configure it to restrict traffic coming into and leaving your computer
  • Follow good security practices for distributing your email address. Applying email filters may help you manage unwanted traffic.

How do you know if an attack is happening?

Not all disruptions to service are the result of a denial-of-service attack. There may be technical problems with a particular network, or system administrators may be performing maintenance. However, the following symptoms could indicate a DoS or DDoS attack:
  • unusually slow network performance (opening files or accessing websites)
  • unavailability of a particular website
  • inability to access any website
  • dramatic increase in the amount of spam you receive in your account

What do you do if you think you are experiencing an attack?

Even if you do correctly identify a DoS or DDoS attack, it is unlikely that you will be able to determine the actual target or source of the attack. Contact the appropriate technical professionals for assistance.
  • If you notice that you cannot access your own files or reach any external websites from your work computer, contact your network administrators. This may indicate that your computer or your organization's network is being attacked.
  • If you are having a similar experience on your home computer, consider contacting your internet service provider (ISP). If there is a problem, the ISP might be able to advise you of an appropriate course of action.

Monday 12 January 2015

How to Crack Windows Administrator Password

Crack Windows Admin Password

Download


Note: Some links may be offsite.
CD release, see below on how to use
  • cd140201.zip (~18MB) - Bootable CD image.(md5sum: f274127bf8be9a7ed48b563fd951ae9e)
  • usb140201.zip (~18MB) - Files for USB install(md5sum: a60dbb91016d93ec5f11e64650394afb)
Previous release:
  • cd110511.zip (~4MB) - Bootable CD image.(md5sum: fe0d30a1c540ec6757e748c7c09e2e4f)
  • usb110511.zip (~4MB) - Files for USB install(md5sum: 50ced8d2a5febe22199f99acec74e63b)
The files inside the USB zip are exactly the same as on the CD. See below for instructions on how to make USB disk bootable.

Floppy release (not updated anymore), see below on how to use them
  • bd080526.zip (~1.4M) - Bootdisk image (md5sum: 37889e4c540504e59132bdcdfe7f9bb7)
  • drivers1-080526.zip (~310K) - Disk drivers (mostly PATA/SATA) (md5sum: 72ac1731c6ba735d0ac2746a30dbc3ee)
  • drivers2-080526.zip (~1.2M) - Disk drivers (mostly SCSI) (md5sum: 30172bec657c85a5f1a0b43601452fb7)


NOTE: Versions before 0704xx will corrupt the disk on VISTA/win7/8!

NOTE THAT THE BOOTDISK CONTAINS CRYPTHOGRAPHIC CODE, and that it may be ILLEGAL to RE-EXPORT it from your country.

How to make the CD

Unzipped, there should be an ISO image file (cd??????.iso). This can be burned to CD using whatever burner program you like, most support writing ISO-images. Often double-clikcing on it in explorer will pop up the program offering to write the image to CD. Once written the CD should only contain some files like "initrd.gz", "vmlinuz" and some others. If it contains the image file "cd??????.iso" you didn't burn the image but instead added the file to a CD. I cannot help with this, please consult you CD-software manual or friends.
The CD will boot with most BIOSes, see your manual on how to set it to boot from CD. Some will auto-boot when a CD is in the drive, some others will show a boot-menu when you press ESC or F10/F12 when it probes the disks, some may need to have the boot order adjusted in setup.

How to make an bootable USB drive









  • Copy all the files that is inside the usbXXXXXX.zip or on the CD onto an usb drive, directly on the drive, not inside any directory/folder.
  • It is OK if there are other files on the USB drive from before, they will not be removed.
  • Install bootloader on the USB drive, from command prompt in windows (start the command line with "run as administrator" if possible)
    • X:syslinux.exe -ma X:
  • Replace X: with the drive letter the USB drive shows up as (DO NOT USE C:)
  • If it seems like nothing happened, it is usually done.
  • However, a file named ldlinux.sys may appear on the USB drive, that is normal.
  • It should now in theory be bootable.
  • Please know that getting some computers to boot from USB is worse than from CD, you may have to change settings, or some will not simply work at all.

    How to make the floppy

    The unzipped image (bdxxxxxx.bin) is a block-to-block representation of the actual floppy, and the file cannot simply be copied to the floppy. Special tools must be used to write it block by block.

    • Unzip the bd zip file to a folder of your choice.
    • There should be 3 files: bdxxxxxx.bin (the floppy image) and rawrite2.exe (the image writing program), and install.bat which uses rawrite2 to write the .bin file to floppy.
    • Insert a floppy in drive A: NOTE: It will lose all previous data!
    • Run (doubleclick) install.bat and follow the on-screen instructions.
    • Thanks to Christopher Geoghegan for the install.bat file (some of it ripped from memtest86 however)
    Or from unix:
    dd if=bd??????.bin of=/dev/fd0 bs=18k

    How to make and use the drivers floppy


    • Simply copy the zip file onto an empty floppy.
    • You MUST NOT UNZIP THE ZIP FILE!
    • Depending on your hardware you may only need one of the driver sets or the other, or maybe both.
    • To use, insert one of the driver floppies when asked for it after booting, the zip file will be unzipped to memory.
    • If no drivers matched (no harddisk found), you can select 'f' from the main menu to load the other driver set.
    • Then select 'd' to auto-start the new drivers (if it matches your hardware)
    • Sometimes it fails detecting the floppy change and you get an error, just select 'f' again, it works the second time.
    • For more advanced users that uses this often, it is possible to unzip just the drivers you need and zip them up into a new zip archive. The zip file name must start with "drivers", the rest is ignored. (it unzips drivers*.zip)



    Other places to go for password and disk recovery

    • Other ways to recover lost password etc at MCSE World

  • BIG DISCLAIMER

    THIS SOFTWARE COMES WITH NO WARRANTY WHATSOEVER. THE AUTHOR IS NOT RESPONSIBLE FOR ANY DAMAGE CAUSED BY THE (MIS)USE OF THIS SOFTWARE! 

    Sunday 4 January 2015

    How to Spy WhatsApp?

    Spy Your Friend On WhatsApp



    In my last post here,I discussed about the growing lure of using WhatsApp and the basic security concerns that comes with it from point of a naive user.You all know it is very easy to Spy on Facebook if know your partner\friends password, but you know that till now it is not possible to Spy on whats app and after reading this post you will definitely know that it is possible.Now I will take you one step higher to the level of a script kiddie....

    1.  How does WhatApp identify you in billions? The answer is the unique MAC address that each digital device on this earth holds. If any one changes his/her device,then automatically the MAC address also changes and the user is requested to re-verify their WhatsApp account. Means he/she cannot access same WhatsApp account from two devices. But is MACSPOOFING not existing? So,if the Mac is spoofed,then who stops from seeing your friends traffic that includes his/her chats,downloads etc!!!although for a naive user this may be look of some technical nature but for the young gen which has lots of techno enthusiasts there should be no stopping....that would include rooting your phone and installing Busybox. How to get your friends MAC address,here it goes :


    For Android phone users simply go to settings—> About phone—> Status—> Wi-Fi MAC address.

    For iPhone users go to Settings—> General—> About—> Wi-Fi address.

    For Windows Phone users go to Settings—> About—> More info—> MAC address.

    and for BlackBerry users go to options—> Device—> Device and Status info—> WLAN MAC.


    3.   And the best part is that your Android can be anyone starting from version 1.6 on wards till date.


    Enjoy:Hacking :-P

    CHECK OUT HOW YOU CAN BE HACKED!!!!!

    Whats App !!!!




    1.   WhatsApp had set a new record with 27 billion messages in a day on in Jun 2013...now that's hell of a lot, a huge success by any means in terms of revenue generation and collection of info...as I really wonder if all these naive users most of them who are actually not aware of the kind of critical information they have allowed to be passed on...such applications are currently enjoying huge success banking on the naive users....who don't actually realize the repercussions owing to this valuable personal info loss.....just read these few eye raising conditions before any one installs this app :


    - Prevent Phone from sleeping


    - Change Wifi state


    - write sync settings


    - Modify/delete SD card contents


    - read phone state


    - Read contact data


    - Write contact data


    - Record audio


    - Read my location


    - Read my other accounts credentials


    2.  If one goes through the deeper insights of all these aspects that the user has to invariably accept for enjoying the application thinking its free(when he has given invaluable personal info to a stranger) from point of view of security...it starts getting scary...!!!!going through the above terms it is invariably understood that all your contacts info is already gone....now how much is that info depends on how much have you stored...if you have stored the residential address,his email,his other phone numbers etc...that's all gone the moment you install!!!!..and add to this location and hardware details....from a hacker point of view the attack surface is already prepared vide one shot of installation only.





    3.  If WhatsApp says that they respect user privacy and would not submit all the info to any advertising agency or any third party,then why are they collecting all this? Whats their security architecture? How reliable is that? Do they guarantee that we will not be Hacked someday.......

    Saturday 3 January 2015

    Hack Windows Using Social Engineering Kit( For Beginners)


    What is Social Engineering Toolkit?


    “The Social-Engineer Toolkit (SET) is specifically designed to perform advanced attacks against the human element. SET was designed to be released with the http://www.social-engineer.org launch and has quickly became a standard tool in a penetration testers arsenal. SET was written by David Kennedy and with a lot of help from the community it has incorporated attacks never before seen in an exploitation toolset. The attacks built into the toolkit are designed to be targeted and focused attacks against a person or organization used during a penetration test.”

    Actually this hacking method will works perfectly with DNS spoofing or Man in the Middle Attack method. Here in this tutorial I’m only write how-to and step-by-step to perform the basic attack, but for the rest you can modified it with your own imagination :-) .

    In this tutorial we will see how this attack methods can owned your computer in just a few steps….

    FYI : The success possibility of this attack depend on victim browser. If the victim never update their browser, the possibility can be 85% or more.

    Requirement :

    1.  Backtrack 5 (or Backtrack 4)

    Note:- This is for learning purposes only and i ain't responsible for anything you do this should be used for testing security on your website to stop it from being hacked yourself


    15 Steps to Hacking Windows Using Social Engineering Toolkit and Backtrack 5 :


    1. Change your work directory into /pentest/exploits/set/


    2. Open Social Engineering Toolkit(SET) ./set and then choose "Website Attack Vectors" because we will attack victim via internet browser. Also in this attack we will attack via website generated by Social Engineering Toolkit to open by victim, so choose "Website Attack Vectors" for this options.


    3. Usually when user open a website, sometimes they don’t think that they are opening suspicious website that including malicious script to harm their computer. In this option we will choose "The Metasploit Browser Exploit Method" because we will attack via victim browser.



    4. The next step just choose "Web Templates", because we will use the most famous website around the world that already provided by this Social Engineering Toolkit tools.


    5. There are 4 website templates Ready To Use for this attack methods, such as GMail, Google, Facebook, and Twitter. In this tutorial I will use Google, but if you think Facebook or Twitter more better because it’s the most accessed website, just change into what do you want.



    6. For the next step…because we didn’t know what kind of vulnerability that successfully attack the victim and what type of browser, etc, in this option we just choose "Metasploit Browser Autopwn" to load all vulnerability Social Engineering Toolkit known. This tools will launch all exploit in Social Engineering Toolkit database.



    7. For payload options selection I prefer the most use Windows Shell Reverse_TCP, but you also can choose the other payload that most comfortable for you.



    8. The next step is set up the Connect back port to attacker computer. In this example I use port 4444, but you can change to 1234, 4321, etc



    9. The next step just wait until all process completed and also wait until the server running.




    10. When the link given to user, the victim will see looks-a-like Google(fake website). When the page loads it also load all malicious script to attack victim computer.



    12. In attacker computer if there’s any vulnerability in victim computer browser it will return sessions value that mean the exploit successfully attacking victim computer. In this case the exploit create new fake process named "Notepad.exe".




    13. To view active sessions that already opened by the exploit type "sessions -l" for listing an active sessions. Take a look to the ID…we will use that ID to connect to victim computer.



    14. To interract and connect to victim computer use command "sessions -i ID". ID is numerical value that given when you do sessions -l. For example you can see example in picture below.



    15. Victim computer already owned. :-)





    HOW TO CRACK WEBSITE IN JUST 10 STEPS ( For Beginners)

    How To Use Havij Pro



    Note:- This is for learning purposes only and i ain't responsible for anything you do this should be used for testing security on your website to stop it from being hacked yourself



    Windows operating system
    Havij setup file
    Internet Explorer or firefox,chrome,opera or rockmelt
    8MB free space on your hard disk

    How To Use Havij SQL Injection Tool



    1) Download From Here, Run the program and paste the vulnerable link in target box.








    2) Before you paste your target in this target as got to be vunerable otherwise this isnt going to work and must be SQL vunerable i will also make a tutorial on how to find if the website is SQL vunerable usually if you find the website is vunerable you will need to find a page on the website which as a little number on the end for example mine is id=205 this is you injection now you should click on analyze next to your target site





    3) It would start sending feedback and messages, show some patience and wait for about a minute!






     

    4) Then move to another operation, goto tables and wait for 5minutes until this operation has finished.











    5) After finding tables, click on to users for admin password and also be sure to click get the columns!





     6) Now tick username and password, and click get data.




    7) Yes! Got the Id and password as you can see below, now we just need to crack the hashes.



    8) Now we have to paste the hash into md5 hash menu for crack.




    9) Finally you can see below, we have cracked the password through havij.




    10) Now we can control the webpage by entering id and password easily.





    Download Havij Pro :-  Download Havij 1.17 Pro+Patch
    Password:-               Asif