Thursday, February 21, 2013

Smartphone security



You probably store a lot of personal and financial information on your smartphone that you would not want revealed if it is lost or stolen. Here are some ways that you can help increase mobile phone safety and secure our smartphone.

01) Protect your phone with a password or Personal Identification Number (PIN).
02) Be careful when you install apps on your phone.
03) Install updates for your phone.
04) Make sure your phone has a feature that helps you find it if you lose it or if it is stolen.
05) Don't jailbreak or root your phone.
06) don't use the free Wi-Fi at a coffee shop or other access point if you are doing something sensitive on your phone, like checking a bank account or making a payment.
07) Have updated security software on the phone.
08) Be aware of applications that enable Geo-location. These application will track the user's location anywhere.
09) Use the same precautions on your mobile phone as you would on your computer when using the Internet.
10) If you decide to sell your device or trade it in, make sure you wipe the device (reset it to factory default) to avoid leaving personal data on the device.
11) Turn off tethering, Wi-Fi and Bluetooth when not in use.
12) Install remote data deletion programs in case you lose your smartphone or it gets stolen.
13) Be aware about application permissions/access, as they can:
Read phone state and identity?
Track your location?
Read owner data?
Read contact data?
Record audio – your calls?
Take pictures?
Modify or delete SD card content?
Edit SMS/text or MMS messages?
Write sync settings?
Send SMS messages?
Write contact data?
Full internet access?

Tuesday, February 19, 2013

Chat Like Anonymous

Chat like Anonymous

1. All you need is your friend's IP Address and your Command Prompt.

2. Open Notepad and write this code as it is.....!
@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A

3. Now save this as "Messenger.Bat".

4. now open the file

5. type the IP Address of the computer you want to contact and press enter

6. Now all you need to do is type your message and press Enter.
Start Chatting.......!

#TMS



Is your computer “male” or “female” !!

Is your computer “male” or “female”?

1. Open Notepad

2. Type the following line in notepad:
...
CreateObject("SAPI.SpVoice").Speak"Ctgs Home I Love You"

3. Save file as computer_gender.vbs

4. Run the file.
If you hear a male voice, your pc is a boy

If you hear a female voice, your pc is a girl...try it guyz.......!!! its amazin !!!

Thursday, February 7, 2013

Hacker Dictionary (please read)



Greetz to My Hacker Friend..... (PCA)

You're new to the real hacking?

Do you feel dumb when you don't know the meaning of a certain term?

Well, then this will certainly help you out!

If you are ever unsure about anything, simply scroll down and find that specific word, then read the definition.



Anything includes: Abbreviations, Phrases, Words, and Techniques.

*The list is in alphabetical order for convenience!*



---------------------------------------------------------------------------

Abbreviations



★ DDoS =

Distributed Denial of Service



★ DrDoS =

Distributed Reflected Denial of Service Attack, uses a list of reflection servers or other methods such as DNS to spoof an attack to look like it's coming from multiple ips. Amplification of power in the attack COULD occur.



★ FTP =

File Transfer Protocol. Used for transferring files over an FTP server.



★ FUD =

Fully Undetectable



★ Hex =

In computer science, hexadecimal refers to base-16 numbers. These are numbers that use digits in the range: 0123456789ABCDEF. In the C programming language (as well as Java, JavaScript, C++, and other places), hexadecimal numbers are prefixed by a 0x. In this manner, one can tell that the number 0x80 is equivalent to 128 decimal, not 80 decimal.



★ HTTP =

Hyper Text Transfer Protocol. The foundation of data communication for the World Wide Web.



★ IRC =

Internet Relay Chat. Transmiting text messages in real time between online users.



★ JDB =

Java drive-by, a very commonly used web-based exploit which allows an attacker to download and execute malicious code locally on a slave's machine through a widely known java vulnerability.



★ Malware =

Malicious Software



★ Nix =

Unix based operating system, usually refered to here when refering to DoS'ing.



★ POP3 =

This is the most popular protocol for picking up e-mail from a server.



★ R.A.T = Remote Administration Tool



★ SDB =

Silent drive-by, using a zero day web-based exploit to hiddenly and un-detectably download and execute malicious code on a slave's system. (similar to a JDB however no notification or warning is given to the user)



★ SE =

Social Engineering



★ Skid =

Script Kid/Script Kiddie



★ SMTP =

A TCP/IP protocol used in sending and receiving e-mail.



★ SQL =

Structured Query Language. It's a programming language, that used to communicate with databases and DBMS. Can go along with a word after it, such as "SQL Injection."



★ SSH =

Secure Shell, used to connect to Virtual Private Servers.



★ TCP =

Transmission Control Protocol, creates connections and exchanges packets of data.



★ UDP =

User Datagram Protocol, An alternative data transport to TCP used for DNS, Voice over IP, and file sharing.



★ VPN =

Virtual Private Network



★ VPS =

Virtual Private Server



★ XSS (CSS) =

Cross Site Scripting



Words



Algorithm =

A series of steps specifying which actions to take in which order.



ANSI Bomb =

ANSI.SYS key-remapping commands consist of cryptic-looking text that specifies, using ansi numeric codes to redefine keys.



Back Door =

Something a hacker leaves behind on a system in order to be able to get back in at a later time.



Binary =

A numbering system in which there are only two possible values for each digit: 0 and 1.



Black Hat =

A hacker who performs illegal actions to do with hacking online. (Bad guy, per se)



Blue Hat =

A blue hat hacker is someone outside computer security consulting firms who is used to bug test a system prior to its launch, looking for exploits so they can be closed. Microsoft also uses the term BlueHat to represent a series of security briefing events.



Bot =

A piece of malware that connects computer to an attacker commonly using the HTTP or IRC protocal to await malicous instructions.



Botnet =

Computers infected by worms or Trojans and taken over by hackers and brought into networks to send spam, more viruses, or launch denial of service attacks.



Buffer Overflow =

A classic exploit that sends more data than a programmer expects to receive. Buffer overflows are one of the most common programming errors, and the ones most likely to slip through quality assurance testing.



Cracker =

A specific type of hacker who decrypts passwords or breaks software copy protection schemes.



DDoS =

Distributed denial of service. Flooding someones connection with packets. Servers or web-hosted shells can send packets to a connection on a website usually from a booter.



Deface =

A website deface is an attack on a site that changes the appearance of the site or a certain webpage on the site.



Dictionary Attack =

A dictionary attack is an attack in which a cyber criminal can attempt to gain your account password. The attack uses a dictionary file, a simple list of possible passwords, and a program which fills them in. The program just fills in every single possible password on the list, untill it has found the correct one. Dictionary files usually contain the most common used passwords.



DOX =

Personal information about someone on the Internet usualy contains real name, address, phone number, SSN, credit card number, etc.



E-Whore =

A person who manipulates other people to believe that he/she is a beautiful girl doing cam shows or selling sexual pictures to make money.



Encryption = I

n cryptography, encryption applies mathematical operations to data in order to render it incomprehensible. The only way to read the data is apply the reverse mathematical operations. In technical speak, encryption is applies mathematical algorithms with a key that converts plaintext to ciphertext. Only someone in possession of the key can decrypt the message.



Exploit =

A way of breaking into a system. An exploit takes advantage of a weakness in a system in order to hack it.



FUD =

Fully undetectable, can be used in many terms. Generally in combination with crypters, or when trying to infect someone.



Grey Hat =

A grey hat hacker is a combination of a Black Hat and a White Hat Hacker. A Grey Hat Hacker may surf the internet and hack into a computer system for the sole purpose of notifying the administrator that their system has been hacked, for example. Then they may offer to repair their system for a small fee.

Hacker (definition is widely disputed among people...) = A hacker is someone who is able to manipulate the inner workings of computers, information, and technology to work in his/her favor.



Hacktivist =

A hacktivist is a hacker who utilizes technology to announce a social, ideological, religious, or political message. In general, most hacktivism involves website defacement or denial-of-service attacks.



IP Address =

On the Internet, your IP address is the unique number that others use to send you traffic.



IP Grabber =

A link that grabs someone's IP when they visit it.



Keylogger =

A software program that records all keystrokes on a computer's keyboard, used as a surveillance tool or covertly as spyware.

Leach = A cultural term in the warez community referring to people who download lots of stuff but never give back to the community.



LOIC/HOIC =

Tool(s) used by many anonymous members to conduct DDoS attacks. It is not recommended to use these under any circumstances.



Malware =

Software designed to do all kinds of evil stuff like stealing identity information, running DDoS attacks, or soliciting money from the slave.



Neophyte =

A neophyte, "n00b", or "newbie" is someone who is new to hacking or phreaking and has almost no knowledge or experience of the workings of technology, and hacking.



smith =

Somebody new to a forum/game.



OldFag =

Somebody who's been around a forum/game for a long time.



Packet =

Data that is sent across the Internet is broken up into packets, sent individually across the network, and reassembled back into the original data at the other end.



Phreak =

Phone Freaks. Hackers who hack cell phones for free calling. Free Long distance calling. Etc.



Phreaking =

The art and science of cracking the phone network.



Proxy =

A proxy is something that acts as a server, but when given requests from clients, acts itself as a client to the real servers.



Rainbow Table =

A rainbow table is a table of possible passwords and their hashes. It is way faster to crack a password using rainbow tables then using a dictionary attack (Bruteforce).



Remote Administration Tool =

A tool which is used to remotely control (an)other machine(s). These can be used for monitoring user actions, but often misused by cyber criminals as malware, to get their hands on valuable information, such as log in credentials.



Resolver =

Software created to get an IP address through IM (instant messenger, like Skype/MSN) programs.



Reverse Engineering =

A technique whereby the hacker attempts to discover secrets about a program. Often used by crackers, and in direct modifications to a process/application.



Root =

Highest permission level on a computer, able to modify anything on the system without restriction.



Rootkit (ring3 ring0) =

A powerful exploit used by malware to conceal all traces that it exists. Ring3 - Can be removed easily without booting in safemode. Ring0 - Very hard to remove and very rare in the wild, these can require you to format, it's very hard to remove certain ring0 rootkits without safemode.



Script Kiddie =

A script kid, or skid is a term used to describe those who use scripts created by others to hack computer systems and websites. Used as an insult, meaning that they know nothing about hacking.



Shell =

The common meaning here is a hacked web server with a DoS script uploaded to conduct DDoS attacks via a booter. OR A shell is an script-executing unit - Something you'd stick somewhere in order to execute commands of your choice.



Social Engineer =

Social engineering is a form of hacking that targets people's minds rather than their computers. A typical example is sending out snail mail marketing materials with the words "You may already have won" emblazoned across the outside of the letter. As you can see, social engineering is not unique to hackers; it's main practitioners are the marketing departments of corporations.



Spoof =

The word spoof generally means the act of forging your identity. More specifically, it refers to forging the sender's IP address (IP spoofing). (Spoofing an extension for a RAT to change it from .exe to .jpg, etc.)



SQL Injection =

An SQL injection is a method often used to hack SQL databases via a website, and gain admin control (sometimes) of the site. You can attack programs with SQLi too.



Trojan =

A Trojan is a type of malware that masquerades as a legitimate file or helpful program with the ultimate purpose of granting a hacker unauthorized access to a computer.



VPS =

The term is used for emphasizing that the virtual machine, although running in software on the same physical computer as other customers' virtual machines, is in many respects functionally

equivalent to a separate physical computer, is dedicated to the individual customer's needs, has the privacy of a separate physical computer, and can be configured to run server software.



Warez =

Software piracy



White Hat =

A "white hat" refers to an ethical hacker, or a computer security expert, who specializes in penetration testing and in other testing methods to ensure the security of a businesses information systems. (Good guy, per se)



Worm =

Software designed to spread malware with little to no human interaction.



Zero Day Exploit =

An attack that exploits a previously unknown vulnerability in a computer application, meaning that the attack occurs on "day zero" of awareness of the vulnerability. This means that the developers have had zero days to address and patch the vulnerability.



Hoping that this helped you..............

Tuesday, January 22, 2013

Types of Computer Virus

Types of viruses :-

The different types of viruses areas follows-

1) Boot Sector Virus :- Boot sector viruses infect either the master boot record of thehard disk or the floppy drive.The boot record program responsible for the booting of operating system is replaced by the virus. The virus either copies the master boot program to another part of the hard diskor overwrites it. They infect a computer when it boots up or when it accesses the infected floppy disk in the floppy drive. i.e. Once a system is infected with a boot-sector virus,any non-write-prote ­cted disk accessed by this system will become infected.
Examples of boot- sector viruses are Michelangelo andStoned.


2) File or Program Viruses :- Some files/ ­programs, when executed, load the virus in the memory and perform predefined functions to infectthe system. They infect program files with extensionslike .EXE, .COM, .BIN,.DRV and.SYS .
Some common file viruses areSunday, Cascade.


3) Multipartite Viruses :- A multipartite virus is a computer virus that infects multiple different target platforms, and remains recursively infective in each target. It attempts to attack both the boot sector and the executable, or programs, filesat the same time. When the virus attaches to the boot sector, it will in turn affect the system’s files, andwhen the virus attachesto the files, it will in turn infect the boot sector.
This type of virus can re-infect a system over and over again if all parts of the virus are not eradicated.
Ghostball was the first multipartite virus, discoveredby Fridrik Skulason in October 1989.
Other examples are Invader,Flip, etc.


4) Stealth Viruses :- These viruses are stealthy in nature means it uses variousmethods for hiding themselves to avoid detection. They sometimes remove themselves from the memory temporarily to avoid detection by antivirus. They are somewhat difficult to detect. When an antivirus program tries to detect the virus, the stealth virus feeds the antivirus programaclean image of the file or bootsector.


5) Polymorphic Viruses :- Polymorphic viruses have the ability to mutate implying that they change the viral code knownas the signature each time they spread or infect. Thus an antivirus program which is scanning for specific virus codes unable to detect it's presense.


6) Macro Viruses :- A macro virus is a computer virus that"infects" a Microsoft Word or similar application and causes a sequence of actions to be performed automatically when theapplication is started or something else triggers it. Macro viruses tend to be surprising but relatively harmless.A macro virus is often spread as an e-mail virus.Well-know ­n examples are Concept Virus and Melissa Worm.

Hacking Mobile Using Bluetooth:-

NOTE : Only For Educational Purpose.>!!!

Super Bluetooth hack 2009 is one of the most downloaded Bluetooth
hacking tools. Super bluetooth hack 2009 is used for mobile based
Symbian operating system to hack & manage any mobile near you which is vulnerable to Bluetooth hackin­g attack
.
Download it from [Click Here]

How To Install Super Bluetooth Hack 2009

1) Download to PC
2) Transfer it to your Bluetooth enabled mobile.
3) Run the Installer (Remember, You must have Java enabled phone for installing it)
4) He finds it and you will be able to run program
5) Select the language and configure it.
6) Click > Connection
7) Click > Search Devices
8) Choose the “Victim”
9) And start managing with following hacks mentioned with Bluetooth.

How to send anonymous mail-!-

Many of the people are trying to spam some ones' mail but are sometimes blocked by
Yahoo, Hotmail, Gmail! So this is perfect, in which you can send fake and spam
emails to your friends and victims'!

These are the following steps!
1) First off all goto :- (see first comment)

2) Enter the name of the sender, from which mail you have to send the fake mail.

3) In option enter your victim email, Subject could be anything, If you want to choose the file ( any kind of attachment).

4) Now If you want to add more things in your email, you can add! Hit Send! You are done..

Sunday, January 13, 2013

Deface website

This is a basic methode we can use to deface websites.
Here we upload a file to victim website and that file will help us to deface it

These files called Shells..Basicly Shell is a PHP file.When we run that php file on a sever it will give us some permissions like delete files or upload files..Shells can do lot of things

The problem is how we going to upload it to victims sever??
here we can do some basic things to upload it..

As we are just going to learn or understand this we select a website that let us to upload files to the sever.Some websites use scripts to upload files..So users or Admin can upload files easily.And we can use the same method.

Now we search for those upload scripts using google..Use this dork to search

inurl:upload.php

So google will search for upload.php files.here we go..We got some sites .. select one

Most sites will let you upload images..

Actualy we can’t upload our shell as shell.php..Coz most of upload scripts will not let you to upload php,,But you can upload it as some othe file..Like image file

Rename your shell.php file to shell.php.gif

or you can just use any image format

After uploading search the uploaded file..Most sites will show you the uploaded image.So you wil see a blank image as you just uploaded a php script , not a image..
How ever find the path to the uploaded file.If the site shows the uploaded image then right click on it and “copy image url”..then paset in your browser and pess enter,,,this will load your image..
In this case it will load your shell…

In some severs this will not work..But try some diferent web sites..shell will load up in some severs..

The importent things to remember is that you should rename your shell as shell.php.gif

And you should find the right image path..I mean the direct path.. likehttp://www.site.com/images/upload/shell.php.gif

if you can’t see the uploaded file find it by browsing folders.

First try the image folder http://www.site.com/images

Like that type some folder names and try to find out..Or just use your brain

What is Prorat?

Prorat is one of RAT (Remote Administration Tools) are
widely used to take over the computer system. Tool made by
PRO Group, a group of Turkish hackers community, can be
used as a tool Hacking computers in a network. Use of Prorat
quite simple, you simply enter the IP (Internet Protocol) is the
target computer and then go through one open port. The
hardest part is finding where an open port. But you can use a
variety of network analysis tools such as nmap, Ethercap,
LookHost, etc.


















Here are the features provided by PRORAT:

- Remote Control
- Viewing System Info, application running and the Task Manager
- Add process, file, or download files
- Admin FTP
- Format the HDD (hard disk damage)
- Remotely download
- Running MS-DOS, Batch Script, VBScript
- Adding a Registry Entry
-Keylogger: Password Recording
- Make Screnshoot, see your Windows desktop instantly
- Send messages and chat
- Shutdown, Restart, Control Panel, IExplorer, Registry, Printer and Online Controls


download link..

Saturday, January 5, 2013

The Most Infamous Computer Hacks & Hackers in History::



#1
THE HACKER: Onel de Guzman
THE HACK: The ILOVEYOU computer worm distributed through e-mail
THE RESULT: More than 50 million reported infections across the world with billions of dollars in damage and overwritten files.
#2
THE HACKER: Jonathan James
THE HACK: Accessed vital DTRA and NASA computer servers “for fun”
THE RESULT: 10 military computers were hacked which led to an overhaul of government security systems and $41,000 in damages.
#3
THE HACKER: TiGER-M@TE
The HACK: InMotion/Web Hosting Hub Defacement
THE RESULT: Over 700,000 websites were hacked and defaced.
#4
THE HACKER: Gary McKinnon
THE HACK: Accessed vital U.S. Military and NASA computer servers
THE RESULT: He accessed 97 NASA computers and deleted operating files that caused an additional 2,000 military computers to fail.
#5
THE HACKER: Vladimir Levin
THE HACK: Intercepted Citibank’s dial-up wire transfer accounts
THE RESULT: $11 million intercepted, $10 million never recovered.
#6
THE HACKER: Anonymous
THE HACK: HostGator cPanel
THE RESULT: 200 servers hacked to re-direct visitors to malicious third-party site where Trojan virus was then planted.
#7
THE HACKER: Robert Morris
THE HACK: The invention of the first computer worm
THE RESULT: Over 6,000 computers were rendered useless.
#8
THE HACKER: Kevin Poulsen
THE HACK: Accessed FBI databases and jammed media phone lines
THE RESULT: He won a Porsche 944 S2 and was featured on TV.
#9
THE HACKER: Anonymous
THE HACK: Spread of Malware via a NetworkSolutions.com widget
THE RESULT: It is suspected that anywhere from 500,000 to 5 million domains were infiltrated and infected with the Malware.
#10
THE HACKER: Mark Zuckerberg
THE HACK: Accessed Harvard University’s private student database
THE RESULT: The invention of Facebook

Sunday, December 30, 2012

Interesting facts about Windows



1. You cant create a folder called "CON" 
Try it..

2. Open Notepad and type in:

"Bush Hid The Facts"

Now save the file, reopen and see the magic.

3. Open MS Word and type
=Rand(200, 99)

then press Enter and see the magic. About this 3rd fact the whold MS team including Gates himself couldn't tell the reason behind it.

Saturday, December 29, 2012

F.A.Q

Alot of people ask “How do i learn hacking?”, “Where do i start?”, “How do i become a hacker”… and so on. I answered the question a million times. Now we all can just give them this link to my blog. ^^ This is my opinion about everything. Others might think about it in a different way. Eat it or just throw it away.

What is hacking?

Hacking is a hobby. There are many ways of hacking. Some break security systems, some reverse code. In my opinion everything has to do with hacking. If you want to become a “hacker”. You have to get some knowledge in computer science and love to play around with it. That’s basicly everything a hacker needs Wink .

What do i have to learn?

This really depends on what you want to achieve. For example “I want to learn to break into systems with tools out there and i don’t want to know a programming language”. For me you are no hacker then but then you just need to learn metasploit and co. Wink
There are some main topics in my opinion that are important.

♣Using a computer (Linux, configuration and so on)
♣Networking (Protocols and how does everything work)
♣Software (Developing and Reversing)
♣Hardware (How does your CPU work and so on. Not my best topic but i got some knowledge here)




Using a computer

Most people, who read my blog, have this knowledge. If you don’t i give you the advise to install Linux and play around with it. Configure some Apache servers or something like that. Just play around till you feel comfortable with it. Compile some programs and so on. If you are able to compile your Linux kernel and use it (maybe with an optimized configuration for your pc). This topic should be done for you. You don’t need to know how to compile a kernel. Just feeling comfortable with Linux should proof you know how to use your computer Wink .

The other topics can be learned parallel. There is no need to focus on one topic.

Networking

In my opinion everyone needs to know how to setup a network. Learn how to calculate the subnet mask and co. This should be easy just read something about it. Google helps alot here Wink .
Learn how everything works. Examples are ARP Protocol, TCP/IP Protocol and how WLAN works. With this knowledge you can have alot of fun. You should be able to MitM attack a router and pc with this. With this setup sniffing should be possible. This is enough knowledge here in my opinion but depending on your needs you can lern more. Google topics or interesting tools

♣pcap (for devs, if you want or know software development, this is interesting for you)
♣arpspoof (dsniff package)
♣fragrouter (-B1 was it if i remember right to do forwarding so the network doesn’t break if you hook in there)
♣dsniff tools etc.

All tools you need here are on the net and knowing a network can be quite funny on a LAN Party. Guys never really never ever login private pages on a lan party or something like this. Public networks are public for a network hacker Wink .

Software

This is my favorite. I work as software engineer and i love this topic. For Reversing this blog has a tutorial series, which starts here. Before learning reversing you have to learn software development. I recommend every so called “hacker” to have at least a basic C knowledge. People always ask what language do i have to learn. The question is obsolete. If you know C, which is a functional language, very well and want to learn functional programming in VB. The only thing that differs is the syntax. I read very often there are so many differences and just a hand of people know assembler. This is just plain bullshit. I know more than a hand of people that reverse code (which will be assembler). Wink Other rumor i hear often from wannabe hackers. Are that you use absolute addresses while developing assembler and the compiler creates relative addresses. That’s why nearly no one knows assembler. That means knowing assembler needs basic addition and subtraction. Yeah a assembler developer can’t do that -.-. I recommend to learn this languages in this order:

♣C (functional programming)
♣C++ (Object oriented programming)
♣Assembler (Low level programming)

Assembler
The masterpiece , i know no-one who really develops software with it. Except he is forced to. Knowing this language gives you the following advantages:

♣Basic knowledge for reversing
♣Code optimizing
♣Everyone, who knows assembler. Can imagine what the CPU does.

Hardware:

You should know how a cpu works and how to read/write a circuit by a binary table or formula. This is the basic, which i know. If you want to go deeper in this topic. Microcontroller and/or FPGAs should be your topic. Learning this topic can be expensive. I recommend you to learn the Software part next or better before this topic. Going deep into hardware engineering needs software.

Conclusions:

There is no way to give you a numbered list what todo/learn to be a hacker. Hacker just means that you know computer science and want to do experiments with this knowledge. If i had to start from the beginning i would do it this way.

♣Install Linux and play around with it
♣Setup my network in linux so i got internet Very Happy
♣Learn C/C++ with a book and all it’s examples
♣Go to a lan party or hotspot and play around with the networking tools (don’t do bad things, if you sniff a password be happy, you made it. Don’t use it for bad things! You want to be a hacker not a cracker)
♣Play around with some hardware and develope software

Now some years should be gone and you should have the knowledge to go alone from here on.

I hope this helps some people to make the right decisions. How to start

Thursday, December 6, 2012

INTRO