Skip to main content

Posts

Featured post

How To Install Kali Linux in Android using Linux Deploy

The most important tool for every hacker, programmer and forensics expert is nothing other than-Linux. Linux's distros are used in forensics, checking bug in program, networks or system. Its well used from time before till now. Soo for every hacker needs it.    Since it is developing OS for Computer especially for laptops , from before some year it begins to develop OS for Android too.. It can now be more usefull and handy because we can take it into our mobile wherever we want.     Soo today's article is all about how to install Kali linux in Android in Linux Deploy. First of all these conditions are to be checked or fulfilled before proceeding ahead. : *.A device running Android 2.1 and above, rooted. *.At least 5 GB free space on internal or external storage. *.A fast, wireless internet connection. *.Patience to wait for a distribution to bootstrap from the network. *.Rooted Android for full funcality After having this in your hand w
Recent posts

Password Cracking

Online Password Bruteforce Attack With THC-Hydra Tool -Tutorial    According to Kali, Hydra is a parallelized login cracker which supports numerous protocols to attack. It is very fast and flexible, and new modules are easy to add. This tool makes it possible for researchers and security consultants to show how easy it would be to gain unauthorized access to a system remotely. It supports: Cisco AAA, Cisco auth, Cisco enable, CVS, FTP, HTTP(S)-FORM-GET, HTTP(S)-FORM-POST, HTTP(S)-GET, HTTP(S)-HEAD, HTTP-Proxy, ICQ, IMAP, IRC, LDAP, MS-SQL, MySQL, NNTP, Oracle Listener, Oracle SID, PC-Anywhere, PC-NFS, POP3, PostgreSQL, RDP, Rexec, Rlogin, Rsh, SIP, SMB(NT), SMTP, SMTP Enum, SNMP v1+v2+v3, SOCKS5, SSH (v1 and v2), SSHKEY, Subversion, Teamspeak (TS2), Telnet, VMware-Auth, VNC and XMPP. Hydra will work in 4 modes: One username & one password User-list & One password One username & Password list User-list & Password list Hydra has Va

How to track an email?!

Email tracking allow you to track an email and extract information like such as sender’s identity,mail server,sender’s IP address,etc. You can use the extracted information to attack the target’s organization system by sending malicious emails. Here is the detailed guide how to trace an email: 1) Go to Google and search for www.cyberforensics.in 2) Here go to E-mail Tracer .Here you will require the E-mail Header                   Extracting Email Headers Email header is the information contained in every mail message which is used by mail programs to provide the user with a summary of the origin and contents of each message. Outlook.com Log into Outlook.com. Click on the message that you are getting the headers for. Click on the down arrow adjacent to the Reply link in the upper-right corner of the email message. Click View message source. Yahoo Mail Log into your Yahoo! Mail and go to the message. Click the “More” icon above the message near the Delete

How To Find Wi-Fi Password Using CMD Of All Connected Networks

It is very easy to find WiFi password using few cmd commands. This command works even when you are offline or you are connected to some other WiFi network. Using this command, we can further optimize our particular WiFi network like turning on some features such as mac randomization, changing the radio type of your WiFi etc.            Whenever we connect to a WiFi network and enter the password to connect to that network, we actually make a WLAN profile of that WiFi network. That profile is stored inside our computer along with the other required details of the WiFi profile.                                     Instead of using a GUI to find the individual passwords, we can also look for the WiFi password of that particular WiFi network using cmd.These steps work even when you are totally offline or you are not connected to the particular wifi you are looking the password for. How to know the WiFi password using cmd: Open the command prompt and run it as administrato

HIDE DRIVE USING CMD

НОW TО HIDE DRIVES WITH CMD ? Тоdау i am going to share the meethod  tо Hide Drives with CMD wіthout any thіrd раrtу расkаgе. Тhеrе аrеа sеvеrаl frее аnd duе sоftwаrе’s ассеssіblе tо hide local  drіvеs, hоwеvеr і аm nоt gоnnа mеntіоn to hіdе а local drіvе еmрlоуіng а расkаgе. In  thіs tutоrіаl і wіll shоw уоu an еаsіеst mеthоd tо hide nаtіvе drіvе with CMD. thіs mау sаvе уоur еасh саsh аnd tіmе.                           Step 1. Сlісk оn Start – Run , or just hold down windows key and press   ” R “. Step 2. Run bох will appear, kіndly type ” сmd ” аnd hіt Еntеr. Step 3. Now you will see Command promt windows, Type ” Dіskраrt ” аnd hіt Еntеr.. Step 4. Now you have to type   ” lіst vоlumе ” аnd Hit Enter to see the list of all drives details Step 5. Now i have some personal data in my drive E which i dont want any other person to peep in, So i want to hide it, For that i will type ” Select volume E ”  and hit Enter. Іf уоu wіsh tо hide  vоlumе D , Then you will

WHAT IS HACKING ? THINGS YOU SHOULD KNOW ABOUT HACKING.

There are many definitions of hacking. In this article, we will define hacking as identifying weakness in computer systems and/or networks and exploiting the weaknesses to gain access. An example of hacking is using by passing the login algorithm to gain access to a system. A hacker is a person who finds and exploits weakness in computer systems and/or networks to gain access. Hackers are usually skilled computer programmers with knowledge of computer security. Before we go any further, let’s look at some of the most commonly used terminologies in the world of hacking. Types of Hackers Hackers are classified according to the intent of their actions. The following list classifies hackers according to their intent. 1.Ethical Hacker (White hat): A hacker who gains access to systems with a view to fix the identified weaknesses. They may also perform penetration testing and vulnerability assessments. 2.Cracker (Black hat): A hacker who gains unauthorized access to

How to Email Hacking can be possible?

          Email Hacking can be possible                                                Do U Think If Your Email Can Not Been Hackable, Then You Are Wrong... Ur Email-ID Can Be Hack... But Its Can Be Hack Only Fault by User.. Most Of The Peoples Think That Their Has A Software to Hack A Email- ID's But Truth Is Their Is No Software Present For Hacking Ur Mail ID's.. Email Hacking can be possible to many ways like:- 1. Social Engineering 2.Phishing Attacks 3. Cookie Hijacking 4. Keyloggers 1.Social Engineering:  This Process is defined as Hack the human mind without any tools...This has become one of the hottest topics today and it seems to work out most of the times. Social Engineering doesn’t deal with the network security issues, vulnerabilities, exploits,etc. It just deals with simple Psychological tricks that help to get the information we want. This really works!! But it requires a lot of patience.We are all talking about network security and fixing the v