Skip to main content

Free Stuff

Basic Hacking Techniques

Just a starter pack for those who want to learn hacking. These types of hacking tricks basically used and popular now.


!!!READ FULL!!!
DON'T MISS A SINGLE THING
I personally advice to LAZY PEOPLE!!! Never start to read!!!


Here it goes,



Vulnerability scanner:
                             A vulnerability scanner is a tool used to quickly check computers on a network for known weaknesses. Hackers also commonly use port scanners. These check to see which ports on a specified computer are "open" or available to access the computer, and sometimes will detect what program or service is listening on that port, and its version number. (Note that firewalls defend computers from intruders by limiting access to ports/machines both inbound and outbound, but can still be circumvented.)

Password cracking:
                                    Password cracking is the process of recovering passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.


Packet sniffer:
                             A packet sniffer is an application that captures data packets, which can be used to capture passwords and other data in transit over the network.
Spoofing attack (Phishing):
                            A spoofing attack involves one program, system, or website successfully masquerading as another by falsifying data and thereby being treated as a trusted system by a user or another program. The purpose of this is usually to fool programs, systems, or users into revealing confidential information, such as user names and passwords, to the attacker.

Rootkit:
              A rootkit is designed to conceal the compromise of a computer's security, and can represent any of a set of programs which work to subvert control of an operating system from its legitimate operators. Usually, a rootkit will obscure its installation and attempt to prevent its removal through a subversion of standard system security. Rootkits may include replacements for system binaries so that it becomes impossible for the legitimate user to detect the presence of the intruder on the system by looking at process tables.

Social engineering:
                                        When a Hacker, typically a black hat, is in the second stage of the targeting process, he or she will typically use some social engineering tactics to get enough information to access the network. A common practice for hackers who use this technique, is to contact the system administrator and play the role of a user who cannot get access to his or her system. Hackers who use this technique have to be quite savvy and choose the words they use carefully, in order to trick the system administrator into giving them information. In some cases only an employed help desk user will answer the phone and they are generally easy to trick. Another typical hacker approach is for the hacker to act like a very angry supervisor and when the his/her authority is questioned they will threaten the help desk user with their job. Social Engineering is so effective because users are the most vulnerable part of an organization. All the security devices and programs in the world won't keep an organization safe if an employee gives away a password. Black Hat Hackers take advantage of this fact.

Technical:
                        Using technology to get information is also a great way to get it. A hacker can send a fax or an email to a legitimate user in hopes to get a response containing vital information. Many times the hacker will act like he/she is involved with law enforcement and needs certain data for record keeping purposes or investigations.

Trojan horses:
A Trojan horse is a program which seems to be doing one thing, but is actually doing another. A trojan horse can be used to set up a back door in a computer system such that the intruder can gain access later. (The name refers to the horse from the Trojan War, with conceptually similar function of deceiving defenders into bringing an intruder inside.)

Viruses
A virus is a self-replicating program that spreads by inserting copies of itself into other executable code or documents. Therefore, a computer virus behaves in a way similar to a biological virus, which spreads by inserting itself into living cells.
While some are harmless or mere hoaxes most computer viruses are considered malicious.

Worms
Like a virus, a worm is also a self-replicating program. A worm differs from a virus in that it propagates through computer networks without user intervention. Unlike a virus, it does not need to attach itself to an existing program. Many people conflate the terms "virus" and "worm", using them both to describe any self-propagating program.

Key loggers
A key logger is a tool designed to record ('log') every keystroke on an affected machine for later retrieval. Its purpose is usually to allow the user of this tool to gain access to confidential information typed on the affected machine, such as a user's password or other private data. Some key loggers uses virus-, trojan-, and rootkit-like methods to remain active and hidden. However, some key loggers are used in legitimate ways and sometimes to even enhance computer security. As an example, a business might have a key logger on a computer used at a point of sale and data collected by the key logger could be used for catching employee fraud.
For further doubts, feel free to comment.
Enjoy with us.
Support the blog, Click on ads

Comments

Popular posts from this blog

The Essence of a Religion

Every religion is like a river and its followers are like the water molecules. The moment the molecules leave the source, the river gives them their purpose and to always progress towards the destination, the vast infinite ocean of wisdom. The molecules stumble, crumble and fumble, but the river always show them the leading light by treating every molecule the same. Sometimes they pass through the beautiful mountains and cities, sometimes through rocky terrain, but the river tells them that happiness and sadness are part of the journey, and they should not stop until they reach there. Same time the other factors throw in garbage and dirt, the wind brings in dust, the water becomes dirty, but the molecules maintain their true identity and the river tells them that this identity, the inner self, is all that matters while external is temporary and insignificant. The molecules may sometime deviate, evaporate, get stuck at the shores, drunk away, but the natural cycle always bring them bac

Endhiran background

After completing Nayak: The Real Hero in 2001, Shankar announced a project with Kamal Haasan and Preity Zinta titled Robo , to be produced by the now-defunct production company Media Dreams . Despite, announcing the project, due to a lack of backing, the project was cancelled and Shankar began work on Boys . In 2005, Shankar made another project, Anniyan , this was mistaken to be the renamed title for Robot . In early 2007, Shankar stated that his next project would be produced by his production house, S Pictures for 3 months. Several websites claimed that he was set to take his maiden Telugu language film with Chiranjeevi , while others claimed that it was set to be with Mahesh Babu . Tabloid gossip columns reported that Ajith Kumar was considered for the film. Finally, in July 2007, Shahrukh Khan was signed on to be the male lead of Robot as well as the producer of the film. However, in October 2007, Shahrukh Khan and Shankar officially called off the project due to creative

New in ASUS Family of Phones

hen you hear about the word ASUS, you might think of processors, laptops and versatile tablets etc. To be little clear for the understanding, The New ear for smart phone industry have seen a verity and trend in phones. Each day new companies arise and bring out the best of them to the phone market and compete with the market giants like Apple, SAMSUNG and Microsoft.                                             Being a hard (even more harder) fan of new technology in PC, Laptop and mobiles, We daily go through lot of techies day to day lives. ASUS is one such emergent as it uses INTEL Atom Processor for their Zenfone series. Now A New technology is coming out from them.  A 3x OPTICAL ZOOM LENS CAMERA PHONE! It has a 3x optical zoom, but not one that’s inside an unsightly bulge like the Galaxy K Zoom.                           Instead, the Zenfone Zoom uses a system which sees two lenses slide horizontally beside the lens, producing extremely similar results, but taking up f