Showing posts with label cybersecurity. Show all posts
Showing posts with label cybersecurity. Show all posts

17 Feb 2019

TOP 10 HACKING APPS FOR ANDROID IN 2019

Top 10 Hacking Apps For Android

1. Kali Linux NetHunter

Kali Linux NetHunter is the first open source penetration testing platform for Android - powered devices. It supports Wireless 802.11 frame injection, HID keyboard, 1-click MANA Evil Access Point setups, BadUSB MITM attacks, etc.

 2. AndroRAT

The feature in this useful android hacking app include collecting information like contacts, and location. The app also allows you to remotely monitor received message and state of the phone, making phone call and sending texts, taking pictures from the camera, opening url in the default browser etc.

3. Hackode

With this app, you get the functionalities like google hacking, SQL injection, MYSQL server, WHOIS, scanning, DNS lookup, IP, MX Records, DNS DIF, Security RSS FEED, Exploits etc. It's a great android hacking app to start with and it doesn't ask for your private information to operate.

4. CSploit

CSploit calls itself the most advanced and complete IT SECURITY TOOLKIT for the Android Operating System. It's a tool that enumerates local hosts, finds vulnerabilities and their exploits, cracks WI-FI password, installs Backdoors, etc. 

5. FaceNiff

FaceNiff is a top android hacking App that allows you to intercept and sniff your WIFI Network Traffic. This tool widely used to snoop into people's FACEBOOK, TWITTER and other Social Media Websites using your Android device. This Hacker-Favorite tool steals cookies from WIFI network and gives an attacker an unauthorized access to victim's account.

Click here to join our official telegram group

Written by- Aayush Sourav

25 Jan 2019

TOP PASSWORD CRACKING TECHNIQUES USED BY HACKERS

Top Password Cracking Techniques Used by Hackers

01. Dictionary Attack

The dictionary attack uses a simple file containing words that can be found in a dictionary, hence its rather straightforward name. In other words, this attack uses exactly the kind of words that many people uses as their password.

 02. Brute Force Attack

Similar to the dictionary attack, the brute force attack comes with an added bonus for the hacker. Instead of simply using words, a brute force attack lets them detect non-dictionary words by working through all possible alpha-numeric combinations from aaa1 to zzz10.

03. Rainbow Table Attack

A rainbow table contains a list of pre-computed hashes - the numerical value used when encrypting a password. This table contains hashes of all possible password combinations for any given hashing algorithm. They reduce the time needed to crack a password hash to simply just looking something up in a list.

04. Phishing

There's an easy easy way to hack : ask the user for his or her password. A phishing emails leads the unsuspecting reader to a faked log in page associated with whatever service it is the hacker want to access, requesting the user to put right some terrible problems with their security. That page then skims their password and the hacker can go use it for their own purpose.

 05. Malware

A keylogger, or a screen scraper, can be installed by malware which records everything you type or takes screenshot during a login process, and then forward a copy of this file to the hacker.

06. Spidering

Savvy hackers have realised that many corporate password are made up of words that connected to the business itself. Studying corporate literature, website sales materials and even the websites of competitors and listed customers can provide the ammunition to build a custom word list to use in a brute force attack.

07. Guess

The password cracker's best friend, of course, is the predictability of the user. Thanks to our brains, emotional attachment to things we like, the chances are those random passwords are based upon our interests, hobbies, pets, family and so on. Password crackers are very likely to look at this information and make a few - often correct - educated guesses when attempting to crack a consumer-level password without resorting a dictionary or brute force attacks.

Written by- Aayush Sourav

23 Jan 2019

TYPES OF COMPUTER VIRUS

A computer virus is a malicious program / software that copy itself into another program. The purpose of creating a computer virus is to infect vulnerable system, gain admin control and steal user sensitive data. It is quite easy and simple for the virus to sneak into a computer by dodging the defense system.

Types of Computer Virus

1. File Virus

This type of virus infects the system by appending itself to the end of a file. It changes the start of a program so that the control jumps to its code. After the execution of its code, the control returns back to the main program. Its execution is not even noticed.

2. Bool Sactor Virus

It infects the boot sector of the system, executing every time system is booted and before operating system is loaded. It infects other bootable media like Floppy disks. These are also known as memory virus as they do not infect file system.

3. Encrypted Virus

In order to avoid detection by antivirus, this type of virus exists in encrypted form. It carries a decryption algorithm along with it. So the virus first decrypts and then executes.

4. Multipartite Virus

This type of virus is able to infect multiple parts of a system including Boot Sector, Memory and Files. This makes it difficult to detect and contain.

Armored Virus

An armored virus is coded to make it difficult for antivirus to unravel and understand. It uses a variety of techniques to do so like fooling antivirus to believe that it lies somewhere else than its real location or using compression to complicate its code.

Written by - Aayush Sourav

21 Jan 2019

WHO IS A HACKER

Who Is A Hacker

A hacker is a creative Programmer, a creative Cryptographer, a human with a good knowledge of Networking, Operating Systems and many more and the best and creative Social engineer who easily control any mind.

How To Become a Great Hacker?

1. Learn TCP/IP, Basic information gathering, Proxies, cc Socks, SSL, VPN, VPS, RDP, FTP, POP3, SMTP, Telnet, SSH.

2. Learn Linux, Unix, Windows - You can do this using vmware or virtual desktop utility.

3. Learn a programming language that's compatible with all OS - Perl, Python, C, ASM.

4. Learn HTML, PHP, Javascript, ASP, XML, SQL, XSS, SQLI, RFI, LFI.

Also read:Ways to avoid being Hacked
5. Learn Reverse engineering and crack some programs for serials easy ones like mirc, winzip, wirar or old games.

6. Code a fuzzer for common protocols - ftp, pop3, 80, 8080 - Pick some free softwares like ftp server, mail server, apache or iis webserver or a webserver all-in-one pack, or teamspeak, ventrilo, mumble.

7. Code a tool that uses grep to sort out unique code in source codes.

8. Make a custom IPtable, IPsec firewall that blocks all incoming traffic and outgoing traffic and add filters to accept certain ports that your software or scripts use.

 9. Pick a kernel in linux or unix, also pick a Microsoft OS version lets say Winxp pro sp2 put them on the virtual desktops (vmware) and find and code a new local exploit in those versions, then install a Apache webserver on the Linux/Unix and a IIS webserver on the winxp pro and attempt to find and code a new local reverse_tcp_shell exploit.

10. Learn Cisco Router and Switch configuration and setup.

11. Learn Checkpoint Setup and Config.

Also read:Top 5 Indian Hackers
12. Learn Wifi scanning, cracking, sniffing.

13. Pick a person in your phonebook for the area code you live in or city then ring the person on a anonymous line like skype or a payphone or a carded sim and attempt to socail engineer the person for his name, address, data of birth, city born, country born, ISP connected with, Phone company connected with, What bank he/she uses and anything else you can get. Then Attempt to ring using a spoof caller ID software with the person's phone number call the ISP and try reset the password to his/her internet connection/web-mail, get access to bank account or ask them to send out a new*** to a new address(drop) with a new pin, reset of phone passwords.

14. Use your information gathering skills to get all the information of a website like a shop then use the spoof caller-id software or hack his phone to show a new number of the Webserver's Tech Support number then ring the shop owner and try get the shop site password.

15. Do the same thing but attempt to use a web attack against a site or shop to gain admin access.

Also read:10 success lessons from Bill Gates

16. Once got access upload a shell and attempt to exploit the server to gain root using a exploit you coded not someone else's exploit.

17. Make your own Linux Distro.

18. Use your own Linux Distro or use a vanila Linux gnome (not kde) keep keep it with not much graphics so you can learn how to depend om the terminal and start from scratch install applications that you will only need for a blackbox (Security test box), make folders for fuzzers, exploits, scanners etc. Then load them up with your own scripts and other tools (By this stage you shouldn't need to depend on other peoples scripts).

19. Learn macosx and attempt to gain access to a Macocx box whether it be your own or someone's else.

20. Create a secure home network and secure your own systems with your own Security policies and firewall settings.

Also read:10 psychological Hacks To make you Smarter!
Also read:15 things about love you need to know
Also read:Divya Narendra is the real founder of Facebook
Also read:Divya Narendra is the real founder of Facebook

20 Jan 2019

TOP 5 INDIAN HACKERS

TOP 5 INDIAN HACKERS

Today we talk about top 5 indian hackers. They all are best. There is not too many comparison so keeo reading and start hacking.

 1. Trishneet Arora

 Trishneet Arora is a Hacking hero. He is an indian author, Cyber Security Expert, and Entrepreneur. Trishneet aroro has writtrn books on Cyber Security, Ethical Hacking, and WEB Defense. He is the founder and ceo of TAC Security, an IT Security Company.

Also read:Ways to avoid being Hacked

2. Vivek Ramachandran

Vivek Ramachandran is the founder and ceo of PENTESTER ACADEMY and SECURITYTUBE TRAINING, He is the author of multiple books - "KALI LINUX: Wireless Penetrating Testing", "MAKE YOUR OWN HACKER GADGET" and "BACKTRACK 5: Wireless Penetration Testing". These are rated 5 stars on amazon and have together sold thousands of copies worldwide. He is a regular speaker/trainer at top security conferences such as BLACKHAT USA and EUROPE, DEFCON, BRUCON, HACKTIVITY etc.

3. Ankit Fadia

Ankit fadia is an indian author, speaker, television host, and self-proclaimed "INDIAN ETHICAL HACKERS" of computers, who skills and ethics have been debated. At the age of 10 he showed his intrest towards ethical hacking when he was read a newspaper article and at the age of 14, he completed his book on "ethical hacking" published by MACMILLANINDIA.

4. Pranav Mistry

Also read:Divya Narendra is the real founder of Facebook

Pranav Mistry is a very popular name in the world of hacking. He is currently working at SAMSUNG on the post of senior vice president in research. He was developed out many of the protection software against hacking and is an inventor as well as a seientist. Pranav has been honored by WORLD ECONOMIC FORUM as the Young Global Leader. He has been a part of many renowned organizations like NASA, MICROSOFT, UNESCO, and GOOGLE etc.

5. Benild Joseph

 Benild Joseph is a 25 year old Limca Book Record Holder and renowned WHITE HAT HACKER with definitive experience in cyber security. Benild Joseph is listed among the Top 10 Ethical Hackers in India by MICROSOFT SOCIAL FORUM and SILICON INDIAN MAGAZINE. Benild has discovered Critical Vulnerabilities in popular websites including FACEBOOK, YAHOO, BLACKBERRY, SONY PICTURES, TESCO, ASTRAZENECA, VODAFONE and DEUTSCHE TELECOM. He is the Co-Auther of "CCI" A Book written for Law Enforcement Agencies in India.

17 Jan 2019

Ways to Avoid Being Hacked

Ways to avoid being hacked




 1. Be suspicious of emails

A lot of cyber attacks are launched through simple malicious email campaigns. Email is a wonderful communication platform because you can sending anything to anyone, but that means it can be a huge security risk.
Phishing, for example, sends victims seemingly innocuous emails that will lead victims to fake websites asking to update their personal information.

2. Checks link locations

Unknown massages contains links to unknown sites. Surfunf to a mysterious website can bring about unintended consequences. For one, it could mimic a site you know and trust and help you fall prey to a phishing scam. Or, it may be unsecure or infected with malware.

3. Never open attachments (unless you're really sure)

A good rule to follow is never open attachments unless you are 120% sure of where they come from. One of the easiest ways for hackers to download malicious code onto victim computers it by sending emails with virus-laden files.

4. Use two-factor authentication

Also read:Divya Narendra is the real founder of Facebook
As bigger companies get hacked, the likelihood that your password is leaked increases. One hackers get passwords, they try to figure out which personal accounts they can access with the data they stole.

5. Use advanced password

This may be the most obvious yet overlooked tip. A strong password includes uppercase, lowercase, numbers, punctuation, and gibbererish. Don't make the password a personal refrense, and don't store a list in a saved files. Most importantly, don't use the same password for multiple accounts.

6. Be wary of the cloud

Here's a food rule of thumb - If you don't want people to access your information, don't share it. This includes cloud storage. No matter how secure platform says it is, you ought to keep in mind that you're giving it to someone else to watch over.

7. In public Wi-Fi? Don't share personal data

Thinking about buying that plane ticket or checking your bank account whole sitting at the coffee shop? You may want to think twice about that, as you have no idea how secure that connection is. The same goes for place like hotels and conference centers. Security researchers just uncovered a vulnerability that made Wi-Fi traffic at some of the world's biggest hotels vulnerable to attack.

Written by- Aayush Sourav

Also read:10 psychological Hacks To make you Smarter! Also read:10 success lessons from Bill Gates

Indian Monsoon 2019: Full Details

Unlike the Indian Meteorological Department, Private Sector Company SkyMet Weather Services says that this year, monsoon will be less th...