Saturday, 13 August 2016

Time To Cover Webcams: Wannabe Hackers Invading Your Privacy Using RAT

Time To Cover Webcams: Wannabe Hackers Invading Your Privacy Using RAT

Digital hacking and learning about hacking has now become easier than you ever imagined, investigation report by the Digital Citizens Alliance reveals — Remote Access Trojan (RAT) Openly Available, Privacy Invasions at its Peak.
We all are aware of the fact that people have an open access to the Internet, and anyone can find any piece of information, provided they know how and where to find it. Thus, hackers are openly tapping into the most lucrative and valuable resource i.e. the Internet, to publicize the privacy-invading tools.
A non-profit advocacy group named Digital Citizen Alliance revealed that the Internet is filled with information related to hacking, everything is out there, openly available, and within an easy access of the wannabe hackers.The hackers are selling Remote Access Trojan (RAT) to the interested wannabe hackers, and believe it or not, most of the purchasers of these malware programs are youngsters and novice hackers. The malware and Trojans being provided by the hackers will allow anyone to take control of the targeted electronic device, eventually attacking the victim. The report calls them “ratters.”

The report also reveals that hackers are uploading malware programs and applications on the websites that receives a lot of teenage users. Young Internet users are the easiest target of the hackers because their risk threshold is on the higher side and they are more prone to click on unacquainted websites and weblinks.
This is the reason why researchers have seen sudden increase in the webcam videos of people who clicked unconsciously on a malware link and eventually opening their computer to the vulnerabilities and anonymous criminals who are determined to blackmail, mock and/or spy onto the victim’s personal life and data stored on their computer.
Remote Access Trojans are specifically targeted towards the most vulnerable audience i.e. young people, who usually feel embarrassed or frightened to share about the threats with their parents.
Surprisingly, there is not much being done to combat these disturbing privacy invasions. But the organization believes that the individuals and corporations can take certain steps to fix this ever increasing problem.
FACTS ABOUT REMOTE ACCESS TROJANS (RATS)
The report reveals some unbelievable facts about the malware. We have included it here:
  • RATs are openly available.
  • RATs are an inexpensive tools and technically simple to use.
  • Usage of RATs in one-on-one attacks against consumers has become a growing problem, confirmed by law enforcement firms.
  • Devices infected with RAT are being openly sold by hackers, thus generating money from the malicious attacks on consumers.
  • Devices destined for girls are sold at higher rates than the devices destined for boys.
  • Websites like YouTube and other sites that provide unlicensed music and movies are the best platforms to spread RATs.
  • Thousands of tutorials are openly available on YouTube, presenting how to use and spread RATs.
  • About 40 percent of these RAT tutorials uploaded on YouTube have advertisements beside the videos. And hackers are generating money through YouTube Partner Program.
  • WHAT IS REMOTE ACCESS TROJAN (RAT) AND HOW HACKERS ARE USING IT
    Remote Access Trojan, widely known as RAT, is one of the six kinds of Trojan. It is the most popular and the simplest computer hacking tool available.
    RATs are basically a malicious code that can be concealed within the photographs, documents, videos, and music too, as these are the easiest and simplest ways to trick the targeted audience into downloading the malware onto the computer.
    The malicious software or application, in front of your screen, is just a simple code. But once it gets an access into your computer, that simple piece of code will allow the hacker to perform all those tasks on your computer which you can perform, and that too without your consent.
    All your content and data including your documents, pictures, videos and any other personal information will be at the hacker’s fingertips.
    Additionally, the hacker can use your computer system to victimize you, either by turning on the webcam to spy on you or by sending malicious emails to your contacts, and what’s more risky is that the hacker can even launch a massive RAT attack using your computer to harm others.
    “That computer is a window into your digital world. But what you may not realize is that computer is a window into your private life. The camera on your computer, when hacked, can become a tool to spy on you in your own home. And it’s easy.”
    Adam Benson, Deputy Executive Director of the Digital Citizens Alliance said,
    “Ratters are disturbingly comfortable with spreading misery and fear. It’s like a game for them. We saw them chat about it on Hack Forums and then share videos showing off how they scare young people, spy on people in private moments and steal pictures from victims’ accounts.”
    VICTIM’S AND SECURITY FIRM’S RESPONSE ON RAT MALWARE
    The Digital Citizen Alliance worked with California-based teen named Cassidy Wolf, a former Miss Teen USA and the victim of a ratter’s sextortion attempt, said that these cyber attackers and hackers should be treated just as harshly as those committing violent sex crimes in the offline world.
    The security researchers worked with her because it is the best-known and one of the most high-profile story happened in 2013 about how RAT attacks can literally put one’s hopes and dreams at risk.
    Her computer was compromised, the webcam was hacked, and all the data, personal social media accounts as well as some other information was also compromised. And she didn’t even knew that her every action was being monitored and observed for several months!
    One night, Miss Wolf received an anonymous email telling her “to do what I say or else I will post” the lots of pictures and videos.
    According to the report:
    The hacker would go onto threaten Cassidy, saying he wanted her to make a sexually explicit video. If she didn’t comply, he said he would transform her “dream of being a model . . . into [Cassidy being] a pornstar.”
    Wolf said:
    “A crime is a crime, whether it happens in the digital space or the physical world. These ratters don’t see the pain they cause. I went through three months of extortion and threats. There were times I thought it might go on for the rest of my life. The victims we see on ratter’s videos are real people. We need to inform people of this danger and get support from tech companies that can help stop the spread of RATs. RAT victims shouldn’t be reduced to click-bait.”
    Hemanshu Nigam, a former federal prosecutor against online crimes at the US DOJ and a Chief Executive Officer of the cyber security company SSP Blue, said about these RAT attacks:
    “We used to worry about protecting women and teen girls from the dangers of sexual predators in the physical world. Now we also need to protect them from digital rapists. Online rapists inflict pain and suffering repeatedly on innocent victims. We’ve got to prosecute these criminals and do everything we can to take away their platforms.”
    YOUTUBE AND THE RAT PROBLEM
    It has become really easy for anyone to find thousands and thousands of RAT related videos which include tutorials about the usage of RAT and how hackers can use various tools to infect the targeted computer with RAT malware.
    On the YouTube, you will be able to find:
    • Tutorials on how to use RATs and tips on spreading the malware to other devices.
    • Examples of successfully deployed RATs, with the IP address as well as the real faces of victims.
    • Links for ratters to download RATs they can use to slave devices.
    To defend these acts and to help people in requesting the removal of non-consensual videos from the YouTube platform, an online mechanism by Google. The user can use the reporting form to flag and remove the content of the slaved computer systems. But originally this reporting system was launched to address revenge porn videos being uploaded on YouTube.
    But in order to report these privacy invasions, the victimized people must need to know about it first. Despite of the fact that there are thousands of videos on YouTube – most of which can easily be found by searching for a simple term “rat victims”, but the victims are not even aware that their computers are slaved and their secret videos are being released publicly.
    RAT is dangerous, be it in a prison or in your computer
    One of the YouTube spokespeople told in an email statement that every minute there are about 400 hours of videos are uploaded which makes it next to impossible to watch and verify the content. But he also said, “[the website] has clear policies that outline what content is acceptable to post, and we remove videos violating these policies when flagged by our users.”
    He also added any user is free to flag a video for a review by the team, and if the matter is serious then YouTube policies allow them to remove those videos.
    HOW YOU CAN PROTECT YOUR PRIVACY
    As a precautionary measure, Mr. Benson recommends every computer user to “tape” their webcam. At least that is exactly what he does when he is not using the webcam. “I have tape on both my work computer and home computer,” he said. He also advised that people should keep their computer’s antivirus software and operating system up to date, and refrain from clicking on the web links leading to ambiguous destinations.
    RATs are so powerful malware tool that it can affect the victim in less visual but equally disturbing ways because it grants hackers a complete access to the computer, and the computer cannot be safeguarded just by the installing antimalware and antivirus applications.
    Even the professionals who are aware of the malware and the risks involved, cannot completely protect themselves from such harmful malware.

Friday, 22 July 2016

What is Remote Access Trojan?

 RAT (Remote Access Trojan)
A remote access Trojan (RAT) is a malware program that includes a back door for administrative control over the target computer. RATs are usually downloaded invisibly with a user-requested program -- such as a game -- or sent as an email attachment. Once the host system is compromised, the intruder may use it to distribute RATs to other vulnerable computers and establish a botnet .Because a RAT enables administrative control, it makes it possible for the intruder to do just about anything on the targeted computer, including:
  • Monitoring user behavior through keyloggers or other spyware.
  • Accessing confidential information, such as credit card and social security numbers.
  • Activating a system's webcam and recording video.
  • Taking screenshots.
  • Distributing viruses and other malware.
  • Formatting drives.
  • Deleting, downloading or altering files and file systems.

The Back Orifice rootkit is one of the best known examples of a RAT. A hacker group known as the Cult of the Dead Cow created Back Orifice to expose the security deficiencies of Microsoft's Windows operating systems.
RATs can be difficult to detect because they usually don't show up in lists of running programs or tasks. The actions they perform can be similar to those of legitimate programs. Furthermore, an intruder will often manage the level of resource use so that a drop in performance doesn't alert the user that something's amiss.
To protect your system from RATs, follow the same procedures you use to prevent other malware infections: Keep antivirus software up to date and refrain from downloading programs or opening attachments that aren't from a trusted source. At the administrative level, it's always a good idea to block unused ports, turn off unused services and monitor outgoing traffic.
The 7 Most Common RATs In Use Today
Here’s a rundown of seven of the most common RATs in use today:
RAT 1: Sakula is believed to be associated with the recent OPM attack. It is signed, looks like benign software, and provides the attacker with remote administration capabilities over the victim machine. Sakula initiates simple HTTP requests when communicating with its command and control (C&C) server. The RAT uses a tool called “mimkatz” to perform “pass the hash” authentication, which sends the hash to the remote server instead of the associated plaintext password.
RAT 2: KjW0rm is believed to be associated with the recent breach of TV stations in France. KjW0rm was written in VBS, which makes it even harder to detect. The Trojan creates a backdoor that allows the attacker to take control of the machine, extract information, and send it back to the C&C server. (For more information about KjW0rm read this SentinelOne blog .)
RAT 3: Havex targets industrial control systems (ICS). It is very sophisticated and provides the attacker with full control over the infected machine. Havex uses different variants (mutations) and is very stealthy. The communication with its C&C server is established over HTTP and HTTPS. Its footprint inside the victim machine is minimal.
RAT 4: Agent.BTZ/ComRat is one of the most notorious and well known RATs. Believed to be developed by the Russian government to target ICS networks in Europe, Agent.BTZ (also known as Uroburos) propagates via phishing attacks. It uses advanced encryption to protect itself from analysis, provides full administration capabilities over the infected machine, and sends extracted sensitive information back to its C&C server. Agent.BTZ uses advanced anti-analysis and forensic techniques.
RAT 5: Dark Comet provides comprehensive administration capabilities over the infected machine. It was first identified in 2011 and still infects thousands of computers without being detected. Dark Comet uses Crypters to hide it existence from antivirus tools. It performs several malicious administrative tasks such as: disabling Task Manager, Windows Firewall, and Windows UAC.
RAT 6: AlienSpy targets Apple OS X platforms. OS X only uses traditional protection such as antivirus. AlienSpy collects system information, activates webcams, establishes secure connections with the C&C server, and provides full control over the victim machine. The RAT also uses anti-analysis techniques such as detecting the presence of virtual machines.
RAT 7: Heseber BOT deploys Virtual Networking Computing (VNC) as part of its operation. Since VNC is a legitimate remote administration tool, this prevents Heseber from being detected by any antivirus software. Hesber uses VNC to transfer files and provide control over the infected machine.

Sunday, 12 June 2016

Ways to crack passwords(Part-1)

Ways to crack password (Part-1)
Brute-force Attacks
With time, brute-force attacks can crack any passwords. Brute-force attacks try every possible combination of letters, numbers, and special characters until the right password is found. Brute-force attacks can take a long time. The speed is determined by the speed of the computer running the cracking program and the complexity of the password. Below I will show you how Brutus can be used against the same FTP server but this time using the brute-force option.
1. Put in the target and port the same way you did for the dictionary attack. For the pass mode choose Brute-force and click range.

2. If you have an idea of what the password might be, then you can choose the right option. For example if you know a site that requires your password to be a certain length then you’ll know what to put down as a minimum length thus narrowing down the end results and shortening the cracking process.

3. I chose lowercase alpha which has the second smallest amount of combinations. Even at second smallest it came up with 321, 272,407 possible password combinations. Now you know why it can take so long to crack one password.

(This method has least preference to crack password as its a time taking process)

Saturday, 11 June 2016

crack windows password

How to crack the password of Windows
In this tutorial i will teach you to hack Window 7 password using free open source software called ophcrack. This hack also works on Windows XP and Windows Vista. So let get started.
Opcrack is an open source windows password cracker based on rainbow tables. It comes with Graphical user interface(GUI) and runs on multiple platform such windows, linux and mac. It allows you to recover or hack windows password.
Before you start doing this you will need a blank CD or DVD to burn the live image of ophcrack.
  1. Download Opcrack Live Cd by
clicking here.
2. Download windows xp or windows 7 live cd depending on platform you are wishing to hack. For example:
Windows 7 or Windows Vista: Click on ophcrack Vista/7 LiveCD.
Windows XP: Click on ophcrack XP LiveCD.

2. Now burn the live image on to the cd.
  3. Insert the disc into drive and restart you computer.
  4. If everything goes right you will see screen like above.
5. After you see screen like above wait for ophcrack to boot automatically or you may press Enter to advance.
6. Now you will see several lines of code printed on screen or they might disappear very quickly (you dont need to worry about that).
7. Then you will see screen like below it is ophcrack password recovering software. At the Ophcrack screen it shows the Administrator and Guest account. Notice the word “ empty ”. This means that if the account is enabled you could log in without a password.

8. Ophcrack WILL NOT CRACK THE PASSWORD because the hash table which it needs is not available for free. But it does show the NTLM hash.
9. Copy this hash value which is under
NT Hash field .
10. Navigate to http://crackstation.net/ which is an online hash cracking tool.
11. Type in the hash value you copied down in Step 9, Enter the captche and click on Crack Hashes.

Wednesday, 8 June 2016

how to hack WhatsApp account II

How to hack WhatsApp account II
1. Read chats from locked WhatsApp
[This workaround don't work after the recent update of WhatsApp]
If you believe locking your whatsapp with password, makes it secure then you are wrong. Even after locking whatsapp with applock, one can read all your chats easily. All they need is access to your device for a minute.
How it's done ?
The secret lies behind the fact, that whatsapp takes daily backup of all your conversation, And if you can get the backup, you can read the chat. Now there is 2 way to get the backup.
First by finding the backup file using the file manager and then send it to other device using Bluetooth. But this file is encrypted. But thankfully this can be extracted. How this can be done, is beyond the scope of this article.
It is in (/sdcard/WhatsApp/Databases/msgstore.db.crypt)
Second method is my favorite which I accidently discovered while I was testing some other app. By using auto backup apps like backup text for whatsapp , one can directly email all the whatsapp chat in plain text.



All you need to do is take your friend’s phone, install this app, take backup, and then send it and once you are done uninstall the app. All this can be done in less than a minute while the whatsapp is locked with password.
How to prevent it?
Block the access to file manager and lock the play store and settings as well and make sure you don’t allow installation from unknown source by going to setting > device security.
2. Read all messages with WhatsApp Sniffer
This application claims to read all the chats taking place over the same WiFi network.
How does it work?
WhatsApp sniffer was once available on PlayStore but was soon removed after the detection it’s vulnerability to WhatsApp. It use ARP request to spoof all the messages. Back then WhatsApp messages were simple plain text, so anyone could read it. But not now, from August 2012 onward WhatsApp has started encrypting it’s messages.
How to prevent it ?
I often see some forums in deepweb that whatsapp sniffer still works. But I asked the same question on several forums and got the same answer. No, WhatsApp sniffer no longer works. However if someone outside your circle is anxious to use your WiFi then be careful.
3. Spoof mac address on android
Many forum has now verified it’s working.More more information on this Click here
How does it work?
Every device have unique mac address and whatsapp uses it to verify that you are not using whatsapp on two different device with same no. So if the hacker is able to spoof mac address than he will be able to see all your whatsapp activity.
How to prevent it?
Unfortunately there is nothing much you can do. But this WhatsApp hack can’t be performed by normal user. It requires rooted phones and deep knowledge of commands, in short advance computer skills. So unless you are having some very interesting WhatsApp conversation, no one is going through that much trouble.
4. Using third-party spyware
There are some websites like bossay, zealspy and other third party spyware which claim to hack WhatsApp conversation. Although I have never use these app, however from what I have read, they are yet another WhatsApp Hack Scam.
App like this are paid and often require you to install small piece of software in victim. Not to forget, there is no guarantee that it will work even after that.
5. Using WhatsDog
So apparently there is new kid in town, called whatsdog. Although this application stands long way from hacking whatsapp, however I found it little creepy.
Whatsdog can track anyone’s whatsapp activity, all you need is their phone number. To get started, you have to enter the phone no. of the victim and the app register it for tracking.
Over time whatsdog keep an eye on the victim’s whatsapp usage and maintain a report. Using whatsdog, one can find out when a person is online, how often are they online, analyse their whatsapp usage by preparing charts and calender.
Whatsdog is no longer available on PlayStore but you can still found them on the internet though.


How to stop it ?
Sadly, there is no way to stop whatsdog. Since it’s not doing anything that goes against whatsapp. If you don’t want people to see your last seen or online activity then turn it off by going to your whatsapp privacy setting. But then you won’t be able to see others time stamp as well.

Tuesday, 7 June 2016

How to hack an Facebook account

How to Hack Any FB Account Using Cookie Stealing

Today in this  post I am going to explain how to steal cookies of different accounts using Cain – Abel and Wireshark software and how to use it to access our victim's accounts.
First off I need to say that this will NOT steal anyones password unless they log in while you are monitoring them. This will however give you their cookies which you can use to steal there session and have full acess to their account. This will work for Facebook, a lot of emails (sorry no gmail). If you are familiar with SSLstrip you can use this method to hijack any session (paypal, bank websites, any email, etc.)
Facebook Cookie Stealing And Session Hijacking
Wireshark for capture cookies:
Wireshark is the best free packet sniffer software available today. Actually, it was developed for making a network secure. But, the same software is now used by hackers to test for vulnerability and security loopholes in the network and to attack the network accordingly. Cookie stealing being one of the types of hacks implemented using this Wireshark software.
Requirements:
Cain and Abel : http://www.oxid.it/cain.html
Wiresharkhttp://www.wireshark.org/
Firefox 3 (or one compatable with add n edit) : http://www.oldapps.com/firefox.php?old_firefox=59
Add n Edit (cookie editor for firefox) : https://addons.mozilla.org/en-US/firefox/addon/add-n-edit-cookies/
Acess to the network with user you want to hack(like connect to the same Wi-Fi that victom is using)
(Note: It works if only the victim is using http protocol instead of https)
Network traffic
Download and install all above programs. To add “Add n Edit” to your browser just open firefox, go to tools, then click add-ons. you can drag and drop the program from wherever you saved it into the little box that popped up and install it from there.
Below, I have listed steps on how to capture Facebook and other accounts cookies. This will help you to know how Wireshark and Cain-Abel can be used to sniff packets and capture cookies.
Just follow the following steps to gain access to a Facebook or other account:
Step 1: Gain acess to the Network. Open networks or your own network would be easy but if you have a specific slave you want you should be able to gain acess using Backtrack.
(Note: use reaver to exploit WPS for WPA/WPA2 encryptions, WEPs are easy to crack given time and OPN means there is no password.)
Step 2: Right click on Cain and choose ‘run as administrator.’ on the top bar go to ‘configure’ and be sure to select your wireless card/adapter. now click where it says ‘Sniffer’ then this litte button towards the top left:

Next click any empty white box then the blue “+” symbol near the button you pressed just before. choose okay
It should look like following snapshot:

These are all the devices it was able to detect.
Now we go to APR on the bottom bar. Once again click any empty white box then the blue cross. It’s easiest to just go one by one and choose all possibilities.

Now we have to poison them so we choose the little yellow hazard symbol towards the top left. should now look like the following snapshot:

we are done here, just minimize Cain for now.
Step 3: Run wireshark as administrator. On the top bar choose ‘Capture’ then ‘Interfaces.’ Here you will have to choose your interface that is connected to the Network we are sniffing from. if you wait a few seconds you might see some traffic being collected as seen in my photo, just choose that interface b/c thats most likely it.

Wireshark will list and color-code all the traffic it sees for you. To make this simpler we can use the filter to only see the traffic we want, Type “http.cookie” in the filter. (Something to consider is to just filter to “http” and scroll through the entries looking for ones that start with the word “POST” this means that information was submitted to the webpage noted such as a username and a password! so if you see this just look through the details and you should see the info you want, most passwords will be hashed but use this site to decript them: http://www.md5decrypter.co.uk/ )
Here I provided a snapshot:

You can either look through this information manually or use the search function to find what you want. In my case i want to hijack the session of a user on the forum freerainbowtables.com so i will use the search function (press Ctrl+F, or go to edit -> search) and type in the information i know for sure will be in the entry. if your hijacking someones facebook put ‘facebook’ there. Most of the time to be safe i do not use the first entry i see b/c this will only work if the person is auto logged in, so just go down a few more until you see one you think will work (just use common sense).

What we need are the cookies. Here are what mine look like and how to get there. With practice you will be able to tell which cookies are used for logins and be able to limit failed attempts.

Copy the cookies as value and save them into a notepad (As shown in snapshot above). I would suggest to seperate everywhere you see a “;” bc this suggests that is the begining of the next entry. The text to the left of the = is the name of the cookie and the text to the right is its value.
Step 4: Open up your firefox browser with Add n Edit enabled. You can get to your add ons by going to tools and they should all be listed in the drop down tab. First go to the website you are hijjacking the session from then open your cookie editor. Should look something like below snapshot:

The last thing to do is to change your cookies to match the ones you captured. If the cookies given to you by the site expire (like the ones in my picture do) you will have to delete them and add all the ones we captured earlier in. if they do not expire you can just edit them. Bottom line is all the cookies must match the cookies you captures in the earlier steps EXACTLY! Make sure you do not add any extras and that you did not miss anything. Also all fields must be filled in (Path and Domain as well as Name and Value). My path is “/” and my domain is “.freerainbowtables.com”
mine looks like this:
You are now done, Just close the cookie editor and reload the webpage. If done correctly with the correct cookies you should be logged in as the user you attacked!
So guys, I hope this
Facebook Cookie Stealing And Session Hijacking
will help you to hacking facebook as well as different types of account like hotmail yahoo etc by stealing their coolkies.
If you have any problem in above Facebook Cookie Stealing And Session Hijacking tutorial, please mention it in comments below.

Sunday, 5 June 2016

What is meant by https and how is it works?


Know the HTTPS and how is works

HTTPS: HTTPS (HTTP over SSL or HTTP Secure) is the use of Secure Socket Layer (SSL) or Transport Layer Security (TLS) as a sublayer under regular HTTP application layering. HTTPS encrypts and decrypts user page requests as well as the pages that are returned by the Web server. The use of HTTPS protects against eavesdropping and man-in-the-middle attacks. HTTPS was developed by Netscape. Instead of HyperText Transfer Protocol (HTTP), website uses HyperText Transfer Protocol Secure (HTTPS ).
Using HTTPS, the computers agree on a "code" between them, and then they scramble the messages using that "code" so that no one in between can read them. This keeps your information safe from hackers.
They use the "code" on a Secure Sockets Layer (SSL) , sometimes called Transport Layer Security (TLS) to send the information back and forth.

How HTTPS works: In the beginning, network administrators had to figure out how to share the information they put out on the Internet.
They agreed on a procedure for exchanging information and called it HyperText Transfer Protocol (HTTP).
Once everyone knew how to exchange information, intercepting on the Internet was not difficult. So knowledgeable administrators agreed upon a procedure to protect the information they exchanged. The protection relies on SSL Certificate to encrypt the online data. Encryption means that the sender and recipient agree upon a "code" and translate their documents into random-looking character strings.
The procedure for encrypting information and then exchanging it is called HyperText Transfer Protocol Secure (HTTPS).
With HTTPS if anyone in between the sender and the recipient could open the message, they still could not understand it. Only the sender and the recipient, who know the "code," can decipher the message.
Humans could encode their own documents, but computers do it faster and more efficiently. To do this, the computer at each end uses a document called an "SSL Certificate" containing character strings that are the keys to their secret "codes."
SSL certificates contain the computer owner's "public key."
The owner shares the public key with anyone who needs it. Other users need the public key to encrypt messages to the owner. The owner sends those users the SSL certificate, which contains the public key. The owner does not share the private key with anyone.

The security during the transfer is called the Secure Sockets Layer (SSL) and Transport Layer Security (TLS).
The procedure for exchanging public keys using SSL Certificate to enable HTTPS, SSL and TLS is called Public Key Infrastructure (PKI).
Upcoming posts:

  • How to hack Facebook using cookie hijacking.
  • More methods to spy on WhatsApp account.
  • Some precautions must be taken to prevent yourself getting hacked.
  • How to use WordPress like a pro.

Saturday, 4 June 2016

How to bypass android pattern?

Bypass Android Pattern Lockscreen using CMD

Make sure that your computer is set up with ADB (Android Debug Bridge ).
Download ADB Drivers
Make sure that your computer is equipped with necessary drivers and use your native USB Cable.
Follow this Steps :
• Plug-in your device to your PC using your USB cable (works on Windows, Mac and Linux). Make
sure that you have an active pattern screenlock.

Now Right Click with pressing SHIFT button on adb folder and open with command window here

•On the cmd window type in ”adbdevices” (no quotation marks) then hit enter.

•On the cmd window type in ”adbshell” (no quotation marks) then hit enter.

•Now shell is open, type ”su” (no quotation marks) (superuser now you are a root user)
•After entering type ”rm/data/system/gesture.key” (no quotation marks) then hit enter.

•After your phone fresup unplug it to your PC then you are good to go... CONGRATULATIONS you successfully bypassed your Pattern Lock Screen , your phone now will accept any pattern you will draw on the lockscreen as VALID and CORRECT.
This is very cool ,you can enter any type of gesture, your phone accept it. _
Now if you’re thinking that your phone’s lockscreen is not working properly. You can create a new Pattern password as normal as you did before the process like nothings happend. This will not hurt your phone’s functions if you follow the steps.
To create Pattern Password just go to:
Home>Apps>Settings>Security>Screenlock>Pattern (4.0.3IceCreamSandwich) Home>Apps>Settings>Lockscreen>Pattern (4.1.2JellyBean)

Wednesday, 1 June 2016

Earn talktime by simple ways


Best Free Recharge Android Apps To Earn Talktime

Ever wanted to earn free recharge just by sitting at home? If so, then this article is for you! Now, you can easily top up your mobile with following Top 2 Highest Paying Android Apps which gives Free Recharge

CashNinja
CashNinja is a new free recharge app which gives you talktime for playing quizzes. It will also give you rewards for daily logging into the app.


GoPaisa:
The quintessential Indian consumer is extremely price sensitive and justifiably so! While expendable incomes are on the rise, so are expenses - making it all the more important for consumers to save every paisa they can.
Fortunately, we at GoPaisa have been working hard for the last 4 years to provide you and other Indian online shoppers with an aggregated offering that helps you find great deals while also saving big bucks! GoPaisa's co-founders Aman and Ankita Jain built this platform to benefit shoppers with the best deals online. With extra cashback options, coupon offers, deals and discounts, you will enjoy a great shopping experience for anything, be it grocery, holidays or electronics - and also saving significantly! Use this refer code to get earn extra "DWTS23".

Tuesday, 31 May 2016

Spying on WhatsApp

Methods for spying on WhatsApp
Method 1) Using a keylogger: A Keylogger is a malicious software program used for real time monitoring on someone's computer or smartphone. Their are many keyloggers in market but best recommended keylogger are:

  • MSpy(For mobile): MSpy was launched as a product for mobile monitoring in 2011 by a London-based tech company. By 2014, the business has grown nearly 400%, and mSpy user number have exceeded the 1 million mark. In September 2014, the company officially released its computer monitoring software for Windows and Mac OS . mSpy advertises itself as having two potential uses: as a parental control solutionand as an employee monitoring tool .mSpy offers three types of packages including Basic, Premium and Bundle Kit. Option is available for monthly, 3 months and yearly subscription.You can download MSpy from here
                            
  • Revealer Keylogger(For PC):Revealer Keylogger Free is a simple and easy-to-use application that records everything that is typed into your PC. The application is covert in its operations and sits quietly on your system and records everything that is being typed, including simple text documents and user-names and passwords (without asterisks) entered on any webpage.

Key features:
Password protection: prevents someone else from opening the program.
Keystroke recorder: records text, passwords and conversations.
Saves logs in TXT.
Easy to operate user interface.
Revealer Keylogger Free includes other configuration options that only come with the Pro version of the application. These include a screencapture feature, full invisible mode that hides in Task Manager, on system startup and on drive, and the remote monitoring function, whereby you can send log files via email, ftp or local network.
Overall, Revealer Keylogger Free is a simplistic program with a standard user interface that is easy to operate. The application has some good functions, but for the more security conscious, it may be worth getting the Pro version.You can download revealer keylogger from here

                                                         
Method 2) Spoofing the MAc Address:The Difficult Way:
The other way to spy on someone’s WhatsApp messages is to spoof the MAC address of the target phone from your phone. This method is somewhat considered difficult and require a moderate amount of technical skills to perform. Let me explain.
WhatsApp has a small vulnerability which allows you to run the same WhatsApp account on two phones provided they both have the same MAC address. For this, you will have to gain access to the target phone to record its MAC address and spoof the same on your device. This is how you can find the MAC address of the target phone:
For Android – Head over to settings —> About phone —> Statu s—> Wi-Fi MAC address
For iPhone – Head over to Setting s—> General —> About —> Wi-Fi address
For Windows Phone – Head over to Settings —> About —> More info —> MAC address
For BlackBerry – Head over to options —> Device —> Device and Status info —> WLAN MAC
Once you have recorded the target phone’s MAC address, you will have spoof Wi-Fi Mac address on your android phone.After this is done, install WhatsApp on your phone, configure it using the target person’s phone number and verify the WhatsApp account using the verification code received on the target phone.
If you successfully manage to execute all the above mentioned steps, you will have a replica of the target user’s WhatsApp account running on your phone. That means you will receive notifications on your phone for each and every activity of the target WhatsApp user. For spying on WhatsApp, I still recommend the usage of mSpy as this method is lot simpler than that of spoofing MAC address

How to spoof Wi-Fi Mac address?

Spoofing MAC Address on Android Devices
Even though Wi-Fi MAC address is embedded on the hardware device during manufacture, it can still be spoofed to input a new one of your choice by a simple trick. Here is a detailed instruction on how to spoof Wi-Fi MAC address on your Android phone.
Before you spoof the MAC address, you need to record the original/current MAC address of your device for backup which can be done according to the instruction below:
On the Home Screen of your phone, tap Menu button and go to Settings.
Tap About Device and go to Status
Now scroll down to record the 12-digit code shown under Wi-Fi Mac address. An address would read something like:

Example MAC address: E5:12:D8:E5:69:97
Requirements for Spoofing the MAC Address:

  • Rooted Android Phone
  • BusyBox app installed on your phone
  • Once BusyBox is installed, you need to install Terminal app

Once the above requirements are satisfied, follow the instructions below to spoof your MAC address:
Step 1) Open the Terminal app and type the commands as listed below:

$ su [HIT ENTER]

$ busybox iplink show eth0 [HIT ENTER]
(This will show your current MAC address, just for your confirmation)

Step 2) Type the following command:
$ busybox ifconfig eth0 hw ether XX:XX:XX:XX:XX:XX [HIT ENTER]
(In the above command, replace XX:XX:XX:XX:XX:XX with your new MAC address)
You have now spoofed your MAC address successfully. To check for the change enter the following command again:

$ busybox iplink show eth0 [HIT ENTER]
(Now you should see your new MAC address)

Sunday, 29 May 2016

Add Encrypt / Decrypt Options to Windows 7 / Vista Right-Click Menu

If you use the built-in file encryption in Windows 7 or Vista, you might be interested in adding an option to the right-click menu to more easily encrypt and decrypt your files, rather than having to use the file properties dialog.
Steps for adding encrypt/decrypt option to the right click menu are following:
Step 1) Open up "regedit.exe" through the start menu search box,
Step 2) Then find the following registry key:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced

Step 3) In the right-hand pane, create a new 32-bit DWORD value called
"EncryptionContextMenu" and give it a value of 1.
Now when you right-click on a file, you’ll see a new option called Encrypt.

When you choose this option, you’ll receive the following dialog, asking if you want to encrypt just the file, or also the parent folder. You can also choose just the file as the default.

Once the files are encrypted, you’ll notice that the title of the file is now green, indicating that it’s been encrypted. The right-click option will also now change to Decrypt.

Definitely much simpler… makes me wonder why this wasn’t a built-in option.

Saturday, 28 May 2016

Crash a computer by simple key strokes

Kill Windows with 3 Keystrokes
Have you ever to show off your skills by taking down Windows with just a couple of keystrokes? All you have to do is add one registry key, and then you can impress your friends...
This isn’t a bug, it’s a “feature” in Windows that is designed to let users trigger a crash dump for testing purposes. There’s even a whole
Microsoft official article on the subject .
To enable this feature, open up regedit and then browse down to one of these keys, depending on your keyboard type:
USB Keyboard
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\kbdhid\Parameters
PS/2 Keyboard
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\i8042prt\Parameters

Now right-click on the right-hand pane and add a new DWORD key named
"CrashOnCtrlScroll", giving it a value of 1.
Reboot your computer, and when it starts back up you can trigger the Blue Screen of Death by using the following keyboard shortcut:
Hold down Right Ctrl and hit Scroll Lock twice

To remove this “feature” you can just delete the registry key and then restart your computer again.
Please note that following this article WILL crash your computer… really isn’t very useful, but it’s lots of fun😀

A-Z Linux commands

All Linux A-Z Commands

apropos: Search through the Help manual pages
apt-get: Install and search for software packages
aspell: Spell checker
awk: It lets you find text and replace it



basename: Strips suffixes off files and directories
bash: GNU Bourne-Again Shell
bc: Arbitrary precision calculator language
bg: Sends to the background
break: Exit from a loop
builtin: Run a shell builtin
bzip2: Compresses or decompresses files

cal: Displays calendar
case: Perform a command conditionally
cat: Displays the content of the files after concatenation
cd: Change Directory
cfdisk: Partition table manipulator
chgrp: Changes the ownership of a group
chmod: Changes the access permissions
chown: Changes the owner and group of a file
chroot: Run a command, but with a different root directory
cksum: It displays the CRC checksum ad byte counts
clear: Clears the terminal screen
cmp: Compares two files
comm: Compares two sorted files line by line
continue: Resumes the next iteration of a particular loop
cp: Makes a copy of files to a different location
cron: Executes scheduled commands
crontab: Schedules a command that will run at a specified time
csplit: Splits a file into context-determined pieces

date: Changes the date and time
dc: Desk Calculator
ddrescue: Disk recovery tool
declare: Declares the variables and gives attributes
df: Gives the free space on your disk
diff: Prints the differences between two files
dig: Looks up the DNS
dir: Lists directory contents briefly
dirname: Changes a full pathname into just a path
dirs: Shows you the list of directories that are remembered
du: Get an estimation of the file space usage

echo: Displays message on the screen
egrep: Searches for files that have lines matching an extended expression
enable: Disable/enable bulletin shell commands
ethtool: Ethernet card settings
eval: Evaluates many commands
exec: Executes a command
exit: Exiting the shell
expand: Converts all the tabs to spaces
export: Sets an environment variable
expr: Evaluates expressions

false: Do nothing, unsuccessfully
fdformat: Perform low level format of a floppy disk
fdisk: Partition table manipulator for Linux systems
fg: Sends a task to the foreground
fgrep: Searches through files for tasks that match a string
file: Determines the file type
find: Find files that match a desired criteria
fmt: Reformats paragraph text
fold: Wraps text in order to fit a certain width
format: Formats tapes/disks
free: Reveals the memory usage
fsck: Checks the consistency of the file system and repairs it
fuser: Identifies and kills the process accessing a file

gawk: Finds text within files and replaces it
getopts: Parse positional parameters
grep: Searches in files for lines matching a certain pattern
groupadd: Adds security user groups
groupdel: Deletes a certain group
groupmod: Modifies a group
groups: Prints the names of groups in which a user is located
gzip: Compresses/decompresses files

hash: Complete pathname of a name argument
head: Outputs the first part of files
history: Command History
hostname: Print/set system name

iconv: Converts the character set in files
id: Displays the group ids/user ids
if: Conditional command
ifconfig: Configures network interfaces
ifdown: Stops a network interface
ifup: Starts a network interface app
import: Captures a screen and saves image in X server
Install: Sets attributes and copies files

jobs: Lists jobs that are active
Join: Joins lines on a common field

kill: Stops a process from running
Killall: Kills processes by name

less: Displays the output on a single screen at a time
let: Performs arithmetic on shell variables
link: Creates a link to another file
ln: Creates a symbolic link to another file
local: Creates variables
locate: Finds files
logname: Print the login name being used currently
logout: Use this command to exit a login shell.
lpc: Line Printer Control
lpr: Offline print
lprint: Prints a file
lprintd: Aborts an ongoing print job
lprintq: Lists the print queue
lprm: Removes the jobs from the print queue

make: Recompiles the group of programs
man: Provides help on a command
mkdir: Creates directories
mkfifo: Makes FIFOs
mknod: Creates character special files or block files
more: Displays the output in a single screen at a time
mount: Mounts a particular filesystem
mtools: Manipulates files from MS-DOS
mtr: Network diagnostics command
mv: Moves and renames files and directories
mmv: Mass Move and Rename

netstat: Provides information on networking
nice: Sets the priority of a job or a command
nl: Writes files and number lines
nohup: Runs a command not affected by hangups
notify-send: Sends desktop notifications
nslookup: Queries internet name servers interactively

open: Opens a file in its default application
op: Provides operator access

passwd: Modifies user passwords
paste: Merges lines in files
pathchk: Checks the portability of a file name
ping: Tests network connections
pkill: Stops processes from running
popd: Restores the previous value of the directory you’re currently in
pr: Prepares your files for printing
printcap: Printer capability database
printenv: Print environment variables
printf: Formats and prints data
ps: Process Status
pushd: Changes the directory and saves it first
pwd: Print Working Directory

quota: Displays the disk usage and its limits
quotacheck: Lets you scan a file system to find its disk usage
quotactl: Sets disk quotas

ram: Ram disk device
rcp: Copies files between two devices.
read: Reads a line from standard input
readarray: Reads from stdin into an array variable
readonly: Marks the variables and functions as readonly
reboot: Reboots your system
rename: Renames files
renice: Alters the priority of the processes running
remsync: Synchronises remote files through email
rev: Reverses the lines in a file
rm: Removes particular files
rsync: Synchronises file trees

screen: Run remote shells using ssh
scp: Creates a secure copy
sdiff: Merges two files in a secure manner
sed: Stream editor
select: Accepts keyboard inputs
seq: Prints numeric sequences
set: Manipulates shell functions and variables
sftp: Runs the secure file transfer program
shift: Shifts positional parameters
shopt: Shell Options
shutdown: Shuts down Linux or restarts it
sleep: Adds a delay
slocate: Finds particular files
sort: Sorts text files
source: Runs commands from a file
split: Breaks a file into fixed sizes
ssh: Runs the remote login program
strace: Traces signals and system calls
su: Substitutes the user identity
sudo: Executes commands as a different user
suspend: Suspends the execution of the current shell
sync: Synchronises data from a disk with the memory

tail: Outputs only the last part of a file
tar: Stores a list or extracts files in an archive
tee: Redirects output into multiple files
test: Evaluates conditional expressions
time: Measures the running time of a program
timeout: Puts a time limit on a command
times: Finds the user and system times
touch: Changes timestamps on a file
traceroute: Trace Route to a host
tr: Deletes characters, translates or squeezes them
tsort: Topological sorting

ulimit: Limits the user resources
umask: Determines the file permission for a new file
umount: Unmounts a device from the system
unalias: Removes an alias
uname: Prints the system information
unexpand: Converts the spaces in a file to tabs
uniq: Uniquify your files
units: Converts the units from one scale to another
unset: Removes the variable names or the function names
unshar: Unpacks the shell archive scripts
until: Executes a command until there is an error
uptime: Shows the uptime
usermod: Modifies a user account
users: Gives you a list of users who are currently logged in
uuencode: Encodes binary files

v: Lists the contents of a directory
vi: Text editor
vmstat: Reports on the virtual memory statistics

wait: Directs the system to wait for a process to finish
watch: Displays or executes a program periodically
wc: Prints the word, byte and line counts
while: Executes commands
who: Prints the usernames that are currently logged into the system
whoami: Prints the current name and user id
wget: Retrieves the web pages or files through HTTP, HTTPS or FTP
write: Sends messages to other users

xargs: Executes a utility and passes a constructed argument list
xdg-open: Opens a URL or a file in the user's preferred application

yes: Prints a string until it is interrupted