Skip to main content

Posts

Showing posts with the label Hacking Tricks

How To Install Kali Linux in Android using Linux Deploy

The most important tool for every hacker, programmer and forensics expert is nothing other than-Linux. Linux's distros are used in forensics, checking bug in program, networks or system. Its well used from time before till now. Soo for every hacker needs it.    Since it is developing OS for Computer especially for laptops , from before some year it begins to develop OS for Android too.. It can now be more usefull and handy because we can take it into our mobile wherever we want.     Soo today's article is all about how to install Kali linux in Android in Linux Deploy. First of all these conditions are to be checked or fulfilled before proceeding ahead. : *.A device running Android 2.1 and above, rooted. *.At least 5 GB free space on internal or external storage. *.A fast, wireless internet connection. *.Patience to wait for a distribution to bootstrap from the network. *.Rooted Android for full funcality After having this in your hand w

Password Cracking

Online Password Bruteforce Attack With THC-Hydra Tool -Tutorial    According to Kali, Hydra is a parallelized login cracker which supports numerous protocols to attack. It is very fast and flexible, and new modules are easy to add. This tool makes it possible for researchers and security consultants to show how easy it would be to gain unauthorized access to a system remotely. It supports: Cisco AAA, Cisco auth, Cisco enable, CVS, FTP, HTTP(S)-FORM-GET, HTTP(S)-FORM-POST, HTTP(S)-GET, HTTP(S)-HEAD, HTTP-Proxy, ICQ, IMAP, IRC, LDAP, MS-SQL, MySQL, NNTP, Oracle Listener, Oracle SID, PC-Anywhere, PC-NFS, POP3, PostgreSQL, RDP, Rexec, Rlogin, Rsh, SIP, SMB(NT), SMTP, SMTP Enum, SNMP v1+v2+v3, SOCKS5, SSH (v1 and v2), SSHKEY, Subversion, Teamspeak (TS2), Telnet, VMware-Auth, VNC and XMPP. Hydra will work in 4 modes: One username & one password User-list & One password One username & Password list User-list & Password list Hydra has Va

How to track an email?!

Email tracking allow you to track an email and extract information like such as sender’s identity,mail server,sender’s IP address,etc. You can use the extracted information to attack the target’s organization system by sending malicious emails. Here is the detailed guide how to trace an email: 1) Go to Google and search for www.cyberforensics.in 2) Here go to E-mail Tracer .Here you will require the E-mail Header                   Extracting Email Headers Email header is the information contained in every mail message which is used by mail programs to provide the user with a summary of the origin and contents of each message. Outlook.com Log into Outlook.com. Click on the message that you are getting the headers for. Click on the down arrow adjacent to the Reply link in the upper-right corner of the email message. Click View message source. Yahoo Mail Log into your Yahoo! Mail and go to the message. Click the “More” icon above the message near the Delete

How To Find Wi-Fi Password Using CMD Of All Connected Networks

It is very easy to find WiFi password using few cmd commands. This command works even when you are offline or you are connected to some other WiFi network. Using this command, we can further optimize our particular WiFi network like turning on some features such as mac randomization, changing the radio type of your WiFi etc.            Whenever we connect to a WiFi network and enter the password to connect to that network, we actually make a WLAN profile of that WiFi network. That profile is stored inside our computer along with the other required details of the WiFi profile.                                     Instead of using a GUI to find the individual passwords, we can also look for the WiFi password of that particular WiFi network using cmd.These steps work even when you are totally offline or you are not connected to the particular wifi you are looking the password for. How to know the WiFi password using cmd: Open the command prompt and run it as administrato

WHAT IS HACKING ? THINGS YOU SHOULD KNOW ABOUT HACKING.

There are many definitions of hacking. In this article, we will define hacking as identifying weakness in computer systems and/or networks and exploiting the weaknesses to gain access. An example of hacking is using by passing the login algorithm to gain access to a system. A hacker is a person who finds and exploits weakness in computer systems and/or networks to gain access. Hackers are usually skilled computer programmers with knowledge of computer security. Before we go any further, let’s look at some of the most commonly used terminologies in the world of hacking. Types of Hackers Hackers are classified according to the intent of their actions. The following list classifies hackers according to their intent. 1.Ethical Hacker (White hat): A hacker who gains access to systems with a view to fix the identified weaknesses. They may also perform penetration testing and vulnerability assessments. 2.Cracker (Black hat): A hacker who gains unauthorized access to

How to Email Hacking can be possible?

          Email Hacking can be possible                                                Do U Think If Your Email Can Not Been Hackable, Then You Are Wrong... Ur Email-ID Can Be Hack... But Its Can Be Hack Only Fault by User.. Most Of The Peoples Think That Their Has A Software to Hack A Email- ID's But Truth Is Their Is No Software Present For Hacking Ur Mail ID's.. Email Hacking can be possible to many ways like:- 1. Social Engineering 2.Phishing Attacks 3. Cookie Hijacking 4. Keyloggers 1.Social Engineering:  This Process is defined as Hack the human mind without any tools...This has become one of the hottest topics today and it seems to work out most of the times. Social Engineering doesn’t deal with the network security issues, vulnerabilities, exploits,etc. It just deals with simple Psychological tricks that help to get the information we want. This really works!! But it requires a lot of patience.We are all talking about network security and fixing the v

What Is Keylogger And How To Be Safe From Keyloggers?

                               In this tutorial i am going to talk about the most use piece of software besides from RAT(remote access Trojan) by hackers to observe your activities on your computer and that is keyloggers. A keylogger is a software or hardware device which monitors each and every key typed by you on your keyboard. I am going to talk about different types of keylogger and how to be safe from keyloggers. So lets learn somthing about keyloggers.  1. What is keylogger ? You might have heard about keyloggers but really dont know what they are reading this article will clear your mind. A keylogger also know as keystroke logger is software or hardware device which monitors each and every key typed by you on your keyboard. You can not identify the presence of keylogger on your computer since it runs in background and also it is not listed in task manager or control panel. It can be used by parents to keep eye on their childrens or company owner to spy on their employes

What is "USB Stealer" ? & How it is Work?

                              Windows allows the storage of the passwords, as do modern browsers. While this feature is convenient for users, it has imposed itself as a big security risk among organizations. We know that browsers store most passwords on daily basis, like MSN messenger, Yahoo, Facebook passwords, etc. Most people lack time and ask their browsers to save their passwords. As we know, there are many tools available to recover saved passwords, so in this article I will explain to you how to make a USB password stealer and steal saved passwords. Just to explain the concept, we are going to collect some password stealing tools, tools that are freely available on the internet and capable of stealing the passwords stored in the browsers or other windows files. Then, we create a batch program that will execute these combined programs and store the stolen usernames and passwords in a text file. To further spice up the penetration testing demonstration, we will also make

Top 15 Operating Systems For Hackers

                                 Hi Friends Today We Are Discussing About Top 15 Operating Systems For Hackers And Mostly Used By Hackers.. A hacker is someone who seeks and exploits weaknesses in a computer system or computer network. Hackers may be motivated by a multitude of reasons, such as profit, protest, challenge, enjoyment or to evaluate those weaknesses to assist in removing them. Hacking is a type of art, But do you ever wonder which operating systems are good for hacking. In this article we are listed  top 15 favourite operating systems of hackers. The listed operating systems are here based on Linux kernel so it is all free operating systems. I am not including BackTrack on this list because it is no more available officially on their website and the next version of BackTrack is Kali Linux. the listed operating systems are here based on Linux kernel so it is all free operating systems. (Included download links for all Os) :) 1.Kali Linux                      

How to Find Lost or Stolen Android Smartphone ? (3 Best Ways)

Guide to Find Lost or Stolen Android Smartphone : There can be two scenarios, where you’ll not find your phone nearby. One, where you’ll lose it just inside your Home. And Second, when you really lost it or someone stole it. So, Let’s talk about, How to find lost or stolen android smartphone. As explained in above paragraph. We’ll have a look at few inbuilt functionalities of android and some 3rd party applications. I hope these methods will definitely help you in finding your device. Let’s have a look at them. #1. Where’s My Droid : As I have a bad habit of misplacing my phone under my Bed,  pocket of my pants etc. And the worst part is that it is on Silent or Vibration mode. Now, even when I call on it from some other phone, it seems very difficult to hear anything from anywhere. So, I always have Where’s My Droid application installed on my phone. The main advantage of this application is that you simply need to send a special text message to your phone . When your

HACK ACCOUNTS BY SPYING ANDROID MOBILE

How to hack accounts by SPYING Android mobile Hello friends, many persons want to hack their friends social accounts and email accounts. In this article, you will learn syping method to access your victim’s android device. Don’t go to steps. This is so simple trick. It is looking long because I have given in details. To hack anyone’s account we need the verification of that person and this is our problem that we unable to verify. By this method, you will easily be able to hack their social and email accounts. Features: Call List Messages GPS location Auto Answer Requirement Victim’s mobile of your hand only for once. Truth Spy app. Download from  here . Patience Now follow these steps on your PC or mobile…… STEP 1: Create an account on My Truth spy by  clickinghere . Now Take Victim’s mobile and follow the steps: STEP 2:  Install  the truth spy on his mobile. ( You can send him while sending any songs of images to him) STEP 3: A message will pop-up. C