Monday, 31 July 2017

Types Of Hackers

White Hat Hacker:-
A white hat hacker is a computer and network expert who attacks a security 
system on behalf of its owners or as a hobby, seeking vulnerabilities that a
malicious hacker could exploit. Instead of taking malicious advantage of exploits, 
a white hat hacker notifies the system's owners to fix the breach before it is can be
taken advantage of.

Black Hat Hacker:-
A black hat is a person who compromises the security of a computer system without
permission from an authorized party, typically with malicious intent. A black hat
will maintain knowledge of the vulnerabilities and exploits they find for a
private advantage, not revealing them to the public or the manufacturer for
correction.

Grey Hat Hacker:-
A grey hat is a skilled hacker who sometimes will act legally and other times
may not. They are a cross between white hat and black hat hackers. They 

usually do not hack for personal gain or have malicious intentions, but may
 or may notoccasionally commit crimes during the course of their technological exploits.

Which one are you?

How To Unlock The Password Protected/Locked Memory Card Of Phone


--------------------
Requirement: First You Need A File Explorer Like FExplorer Which You Can Download From Here. http://fexplorer.en.softonic.com/symbian/download
1)Insert Card Into Your Phone But Don’t Access It Through Phone.
2)Run FExplorer And you Have To Open The Path C:\System.
3) You Will Find A File Called Mmcstore , Rename The File Mmcstore.Txt
4)Copy That File(Mmcstore.Txt) Into Your Pc And Open With File In Notepad.
5)You Will Find Your Password In That File.

5 Common Mistakes That Fresh Hackers Make


1. If you see a website offering hacking software or offering to hack email ids for money, avoid
them. These websites are nothing but scams and won’t work.

2. A software that claims to hack giants like Google, Facebook, Yahoo and the like is a hoax.
There are no such software available. You may get yourself hacked while trying to get these.

3. Don’t use keyloggers and Trojans found as freeware online. These software aren’t meant to
be free and you will be giving access to your own computer to another hacker.

4. Programming and scripting languages are very important parts of any hacker’s arsenal. If you
plan to use software only then you would also be limited by the software’s functionalities.

5. A good hacker is a good programmer, security expert, developer and good script writer. It is
usually not the other way around. You must known this for cross site scripting like P
So, hacking is not simply about making your way into websites and leaving your mark. You have a
great set of talents a can also get the best jobs in the industry.

Automatic PC Shutdown using CMD Prompt

Automatic PC Shutdown using CMD Prompt
1. Open Run, press Windows + R
and type CMD to open the
Command Prompt.
2. Now type the below commend
by replacing the last numeric
number with the number of
seconds after which you want
to be shut down.
shutdown.exe –s –f –t 3600
1. Now 3600 Seconds mean 1
hour, so you can double these
digits with the number of
hours you want after which
your PC shutdown

Hack Facebook Using Fire Sheep?

Hack Facebook Using Fire Sheep?
....»»...»\.....
1- Tools Needed :
Public wifi access
Firefox Browser
winpcap
Firefox plugin Fire sheep?
Step 1:
Download & install Mozilla
browser and add-
one Fire sheep. ...(no link )
Step 2:
Run Firefox .
Menu Bar go to View >> SideBar
>> Fire sheep
( Ctrl + shift +s ) Shortcut can
also be used to
open Fire sheep.
Step 3:
Fire sheep is now running in
Sidebar.
.
Step 4:
Now Click >> Start Capture Button
Step 5:
Various sessions can be seen on
Sidebar .
Select the authenticated Session
you want to
gain access. Step 6:
You can automatically logged in
the victims
account.
This Tool can be easily used to
get Facebook/
twitter account.
.
Step 7:
This Hack will only work in LAN or
WiFi
networks.

Best Hacking Apps In Android


#1 Hackode- Hackode : The hacker’s Toolbox is an application for penetration tester, Ethical hackers, IT administrator and Cyber security professional to perform different tasks like reconnaissance, scanning performing exploits etc.

#2 Androrat- Remote Administration Tool for Android. Androrat is a client/server application developed in Java Android for the client side and in Java/Swing for the Server.
.
.
#3 APKinspector- APKinspector is a powerful GUI tool for analysts to analyse the Android applications. The goal of this project is to aide analysts and reverse engineers to visualize compiled Android packages and their corresponding DEX code.
.
.
#4 Droidbox- DroidBox is developed to offer dynamic analysis of Android applications.
.
.
#5 Burp Suite- Burp Suite is an integrated platform for performing security testing of web applications. Its various tools work seamlessly together to support the entire testing process, from initial mapping and analysis of an application’s attack surface, through to finding and exploiting security vulnerabilities.

How To Download The Data That Google Has Been Collecting On You

The colourful search engine collects random information about your random searches and in many, it also collects data from your location and other interests so it can provide you with advertisements related to your interests.
This random collection of information sometimes provides with amazing and personalised results. While plenty of times, it is simply a strategy from Google to make money;even though the company does not sell you information directly to other parties, it has its ways.
If you are worried as to what information the tech giant is collecting about you and you want to analyse, these steps will help you download the information that Google has been collecting on you.

Let Us Get Started

Image Source: Google Takeout – Choose the Google products to include in your archive and configure the settings for each product. This archive will only be accessible to you
Go to https://takeout.google.com/settings/takeout in your browser. You will see a wide variety of Google Services that the company offers and collects your information. The services are as diverse as Android Pay, Contacts, Chrome, Photos, and YouTube; even services such as Voice, Search, and Locations are kept in the log.
On the right hand side of the applications, you will see toggle buttons for the services. Check off all the applications and services from which you want to download data. Once you have made the selection, click ‘Next’ at the bottom.




Image Source: Google Takeout – Choose your archive’s file type and whether you want to download it or save it in the cloud.
Once you hit ‘Next’, it will drag you down to the Customise Archive Format section where it will show you the number of the services you have selected. It will then ask you for your ‘File Type’ such as .zip format or .tgz etc. Once you have made the selection, it will ask you to select the size of your ‘Archive Size’. If you select more than 2GB, it will split the data into many files so you can download large data with ease.
Once you finalize the amount of data you want to download, the final step would be to select the ‘Delivery Method’, which provides you with two options: send a download link via email or add the files to Dropbox, Google Drive, or Microsoft OneDrive account. Remember, if you select the email option you will only have that data valid for seven days after which it will expire.
Image Source: Google Takeout – An archive of 27 products is currently being prepared Please note that archives may take a long time (hours or possibly days) to create. You will receive an email when your archive is complete – is the message presented to the users when they create the archive.
Once you are ready, hit ‘Create Archive’. Building the archive can take quite a while, from minutes to days, but Google will send you an email once it’s ready. If you want to view the files, just extract the .zip file on your computer using WinRAR and browse freely.

Windows Commands That Every User Should Know

We all know that Linux is heavy on command line usage as compared to Microsoft Windows. Nevertheless, there are a few tools that require Microsoft’s Command Prompt to diagnose and resolve computer problems. Since there are many commands to work with, we will focus on the ones that you may find useful for troubleshooting.

Listing the Tasks


A screenshot showing results for tasklist command.

The tasklist command was created by the developers to get information about the tasks Windows is running on your system. The tasklist –m command helps identify all the tasks that are using EXE or DLL modules. The tasklist –svc command helps identify the services that are being used by the tasks.

Killing the Tasks


Command Prompt displaying Task Kill command guide.

The taskkill command was created by the developers to kill a process or a task that is currently in use by the operating system.
The taskkill –im command allows the users to stop or kill a program. The taskkill –pid command is used to end programs using their Process ID, which can be obtained using the tasklist command; it helps terminate specific task that is being utilized by the software.

Configuring Internet Protocol


The ipconfig command displaying results.

The ipconfig command is used either to view IP addresses associated with the machine or to modify them. If you want to check your Windows complete IP configuration, you will type ipconfig /all. To get a new IP address, you would have to first type ipconfig /release, which will allow Windows to remove the old IP. Then you can use ipconfig /renew so that your Wi-Fi can get a new IP address. The ipconfig /flushdns command allows users to remove the old cache DNS results, which the Windows saves for later uses.

Pinging Your Connection


                 A screenshot of Command Prompt showing results for the ping command.

ping is used to verify IP/TCP to the host. In order to check and use it, you need to type ping google.com bear in mind that this command will only work if your Internet Control Message Protocol traffic is allowed to pass. However, if your systems firewall is blocking it, then it will fail to ping.
DNS Checking
The nslookup is a useful tool for troubleshooting DNS problems, such as host name resolution. This tool works best when you are having problems related to legacy DNS records. In order to use this tool, you should type nslookup dc2.test.com, where dc2.test.com is the name of the host you are having problems with.

Driver Searching

A screenshot of driverquery command showing results for the installed drivers.
The driverquery is a simple command line tool that provides you with a detailed list of drivers installed on your computer systems. If you want specific information about your drivers, you can change the command to driverquery –v; this is going to display the verbose output results about your driver. You can also use driverquery –si; this is going to show you signed information related to your drivers.

Verification of Signed Files

Command sigverif written in Command Prompt resulting the File Signature Verification GUI window.
To check if the files on your computer system are in their original condition, you can use the sigverif command in Command Prompt. A GUI window will open, which will scan your system to check the shady files. The GUI window has an advanced option where you can change your choices and alter the name of the log file as per your needs.

Checking for Malicious Software

A screenshot of the Command Prompt showing the ongoing process of sfc /scannow command.
Many times when you download a pirated software or you click on a malicious advertisement, the malicious program tries to take over your machine by replacing the important files in your system.
The sfc /scannow command is used to verify the originality of the Windows files [if some of them are found missing], automatically replace them, and bring them back to their original form.

Which VPN service does Anonymous recommend and use?

There are many choices when it comes to VPN providers. There are some VPN providers who offer the service free of charge and there are some which require a fee for service. In general, paid VPN providers are the way to go but we’ll get into that later. We have found that the (paid) VPN provider, IPVANISH, is doing an excellent job when compared to others, including free service providers which are very unreliable, slow and not safe — usually ‘free’ VPN services log your originating IP address and all traffic going back and forth from your device as a trade-off for being free. IPVANISH offers robust gateways, proven security, free software, unmatched speed, unlimited bandwidth, and the best of all: IT DOES NOT LOG TRAFFIC OR IPs! To stay completely and 100% anonymous, they even offer their customers the option of paying via PaySafeCard, however they also offer the usual payment methods and they accept PayPal. On top of all of this, they not only offer VPN software for Windows, Mac, Ubuntu, Chromebook and routers, but they also offer easy-to-install Android & IOS VPN apps. It is really easy to set up the VPN connection, either on PCs or on mobile devices with the apps, everyone can do it within a few clicks.
Click here to get more information and start protecting yourself!

What is a VPN and how does it work?

A VPN, or Virtual Private Network, is a method used to add security and privacy to private and public networks, like Wi-Fi hotspots and the internet. VPNs are most often used by corporations to protect sensitive data, however, using a personal VPN is becoming increasingly popular for every citizen, as more interactions that were previously face-to-face transition to the internet. Privacy is increased with a VPN because the user’s originating IP address is hidden and replaced with one from the VPN provider. This method allows subscribers to obtain an IP address from any ‘gateway’ city that the VPN service provides. For instance, you may live in San Francisco, but with a VPN you can appear to live in Amsterdam, New York, or any number of gateway cities. It, along with TOR or I2P, is also the best method of surfing the web anonymously. 
BONUS FEATURES: You will be able to bypass any regional or local ISP ‘blocks,’ you are able to access foreign content as if you were a local, get to websites back home when you’re abroad and bypass government or workplace censorship of sites like Facebook, Gmail and YouTube. Plus, it allows you the freedom to download torrents and use P2P programs… all anonymously.

How to Hear, Delete and Stop Google from Secretly Recording Everything You Say

In the past, we have published many articles proving that the Internet search giant, Google is secretly spying on people who are using its services.
Particularly, in 2015, we revealed how Google had tracked Smartphone users everywhere they go, indicating it with a red dot on a map, marking and making the user’s location much clearer for identification. This made users very vulnerable to cyber criminals and government agencies.
s 3
In the latest Google spying activities, the company has gone a step further, by recording the voice of its users. Below the article, is a step by step guide to hear the voice being secretly recorded, and how you can delete it, stopping the function permanently.

Views of some Concerned Media Outlets

According to the Free Thought Project, the recording feature secretly picking out voices, without the person’s consent, was built into Google’s search function as a means of delivering accurate search results. However, the sheer accuracy and amount of data Google is now storing, is chilling. Statistics show that Google now processes on average, over 40,000 search queries every second, which translates to over 3.5 billion searches per day and 1.2 trillion searches per year, worldwide.
s 2
The data from these searches is then stored on each individual who conducts them. Using this data – or steering results in a particular direction – the Internet giant effectively has the ability to influence the entire world. Aside from influence, Google can predict the future based on trends it sees, from the illegal records it has been keeping.
Reports suggest that Android users are more vulnerable to the illegal listening recording by Google. However, even if you don’t have an Android device, but still conduct Google searches on iDevices, Google is still listening and recording you.
The Independent points out: “The recordings can function as a kind of diary, reminding you of the various places and situations that you and your phone have been in. But it’s also a reminder of just how much information is collected about you, and how intimate that information can be. You’ll see more if you’ve an Android phone, which can be activated at any time just by saying “OK, Google.” But you may well also have recordings on there whatever devices you’ve interacted with Google using.”
When this was revealed, Google defended itself, saying that the information it is illegally taking away is never personally used against any user, but is rather done solely for the purpose of enlightening users’ experience on the web. But the big questions are: Can you trust Google? Can you imagine what will happen if the information is used against you?
s 4
Tech experts say much of this search history is tied into location data retrieved from the device used to conduct the query. This means that not only does the search engine have information on what your interests are, it has you specific interests based on where you are at any given moment.
To avoid this Google trap, follow these steps provided below by experts; make sure that you remain safe from Google’s seemly diabolical plan. Do not surrender your data to Google. Google cannot be trusted.

How to find and delete your recordings on Google

Click on the hamburger icon on the top left of the page
Scroll through your list to see all the silly things there is audio proof of you asking about
Click on one of the squares to select a recording to delete
Stop using the voice function if you don’t want to listen to yourself again in the future
s 5

Now that you know Google has recorded its users, share this article with your family, friends and others to spread the message. By doing this, they will also wake up to what is happening and, thus, protect themselves.

Sunday, 30 July 2017

Cyber Security in Detail

Cyber Security

-> Network outages, data compromised by hackers, computer viruses and other incidents affect our lives in ways that range from inconvenient to life-threatening. As the number of mobile users, digital applications and data networks increase, so do the opportunities for exploitation.

WHAT IS CYBER SECURITY?

-> Cyber security, also referred to as information technology security, focuses on protecting computers, networks, programs and data from unintended or unauthorized access, change or destruction.

NEEDS OF CYBER SECURITY 

-> Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great deal of confidential information on computers and transmit that data across networks to other computers. With the growing volume and sophistication of cyber attacks, ongoing attention is required to protect sensitive business and personal information, as well as safeguard national security. 
During a Senate hearing in March 2013, the nation's top intelligence officials warned that cyber attacks and digital spying are the top threat to national security, eclipsing terrorism.

Hacking Terminology And Attacks

Identifying Types of Hacking Technologies

->Many methods and tools exist for locating vulnerabilities, running exploits, and com-promising systems. Once vulnerabilities are found in a system, a hacker can exploit that 
vulnerability and install malicious software. Trojans, backdoors, and rootkits are all forms 
of malicious software, or malware. Malware is installed on a hacked system after a vulner-ability has been exploited.

Buffer overflows and SQL injection are two other methods used to gain access into com-puter systems. Buffer overflows and SQL injection are used primarily against application 
servers that contain databases of information.
These technologies and attack methods will each be discussed in later chapters. Many 
are so complex that an entire chapter (Chapter 9, “Attacking Applications: SQL Injection 
and Buffer Overflows”) is devoted to explaining the attack and applicable technologies.
Most hacking tools exploit weaknesses in one of the following four areas:

Operating Systems :   Many system administrators install operating systems with the default 
settings, resulting in potential vulnerabilities that remain unpatched.

Applications : Applications usually aren’t thoroughly tested for vulnerabilities when 
developers are writing the code, which can leave many programming flaws that a hacker 
can exploit. Most application development is “feature-driven,” meaning programmers are 
under a deadline to turn out the most robust application in the shortest amount of time.

Shrink-Wrap Code : Many off-the-shelf programs come with extra features the common 
user isn’t aware of, and these features can be used to exploit the system. The macros in 
Microsoft Word, for example, can allow a hacker to execute programs from within the 
application.

Misconfigurations : Systems can also be misconfigured or left at the lowest common secu-rity settings to increase ease of use for the user; this may result in vulnerability and an 
attack


Identifying Types of Ethical Hacks


Ethical hackers use many different methods to breach an organization’s security during a 
simulated attack or penetration test. Most ethical hackers have a specialty in one or a few 
of the following attack methods. In the initial discussion with the client, one of the question
that should be asked is whether there are any specific areas of concern, such as wireless 
networks or social engineering. This enables the ethical hacker to customize the test to be 
performed to the needs of the client. Otherwise, security audits should include attempts to 
access data from all of the following methods.
Here are the most common entry points for an attack:

Remote Network :  A remote network hack attempts to simulate an intruder launching an 
attack over the Internet. The ethical hacker tries to break or find vulnerability in the out-
side defenses of the network, such as firewall, proxy, or router vulnerabilities. The Internet 
is thought to be the most common hacking vehicle, while in reality most organizations have 
strengthened their security defenses sufficient to prevent hacking from the public network.
Remote Dial-Up Network :  A remote dial-up network hack tries to simulate an intruder 
launching an attack against the client’s modem pools. War dialing is the process of repeti-
tive dialing to find an open system and is an example of such an attack. Many organiza-
tions have replaced dial-in connections with dedicated Internet connections so this method 
is less relevant than it once was in the past.

Local Network :  A local area network (LAN) hack simulates someone with physical access
gaining additional unauthorized access using the local network. The ethical hacker must 
gain direct access to the local network in order to launch this type of attack. Wireless 
LANs (WLANs) fall in this category and have added an entirely new avenue of attack as 
radio waves travel through building structures. Because the WLAN signal can be identi-
fied and captured outside the building, hackers no longer have to gain physical access 
to the building and network to perform an attack on the LAN. Additionally, the huge 
growth of WLANs has made this an increasing source of attack and potential risk to many 
organizations.

Stolen Equipment :  A stolen-equipment hack simulates theft of a critical information 
resource such as a laptop owned by an employee. Information such as usernames, pass-
words, security settings, and encryption types can be gained by stealing a laptop. This is 
usually a commonly overlooked area by many organizations. Once a hacker has access to a laptop authorized in the security domain, a lot of information, such as security configura-
tion, can be gathered. Many times laptops disappear and are not reported quickly enough 
to allow the security administrator to lock that device out of the network.

Social Engineering :  A social-engineering attack checks the security and integrity of the 
organization’s employees by using the telephone or face-to-face communication to gather 
information for use in an attack. Social-engineering attacks can be used to acquire user-
names, passwords, or other organizational security measures. Social-engineering scenarios usually consist of a hacker calling the help desk and talking the help desk employee into 
giving out confidential security information.

Physical Entry :  A physical-entry attack attempts to compromise the organization’s physi-
cal premises. An ethical hacker who gains physical access can plant viruses, Trojans, root-
kits, or hardware key loggers (physical device used to record keystrokes) directly on systems in the target network. Additionally, confidential documents that are not stored in a secure location can be gathered by the hacker. Lastly, physical access to the building would allow a hacker to plant a rogue device such as a wireless access point on the network.These devices could then be used by the hacker to access the LAN from a remote location.