Skip to main content

Free Stuff

Basic Hacking Techniques

Just a starter pack for those who want to learn hacking. These types of hacking tricks basically used and popular now.


!!!READ FULL!!!
DON'T MISS A SINGLE THING
I personally advice to LAZY PEOPLE!!! Never start to read!!!


Here it goes,



Vulnerability scanner:
                             A vulnerability scanner is a tool used to quickly check computers on a network for known weaknesses. Hackers also commonly use port scanners. These check to see which ports on a specified computer are "open" or available to access the computer, and sometimes will detect what program or service is listening on that port, and its version number. (Note that firewalls defend computers from intruders by limiting access to ports/machines both inbound and outbound, but can still be circumvented.)

Password cracking:
                                    Password cracking is the process of recovering passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.


Packet sniffer:
                             A packet sniffer is an application that captures data packets, which can be used to capture passwords and other data in transit over the network.
Spoofing attack (Phishing):
                            A spoofing attack involves one program, system, or website successfully masquerading as another by falsifying data and thereby being treated as a trusted system by a user or another program. The purpose of this is usually to fool programs, systems, or users into revealing confidential information, such as user names and passwords, to the attacker.

Rootkit:
              A rootkit is designed to conceal the compromise of a computer's security, and can represent any of a set of programs which work to subvert control of an operating system from its legitimate operators. Usually, a rootkit will obscure its installation and attempt to prevent its removal through a subversion of standard system security. Rootkits may include replacements for system binaries so that it becomes impossible for the legitimate user to detect the presence of the intruder on the system by looking at process tables.

Social engineering:
                                        When a Hacker, typically a black hat, is in the second stage of the targeting process, he or she will typically use some social engineering tactics to get enough information to access the network. A common practice for hackers who use this technique, is to contact the system administrator and play the role of a user who cannot get access to his or her system. Hackers who use this technique have to be quite savvy and choose the words they use carefully, in order to trick the system administrator into giving them information. In some cases only an employed help desk user will answer the phone and they are generally easy to trick. Another typical hacker approach is for the hacker to act like a very angry supervisor and when the his/her authority is questioned they will threaten the help desk user with their job. Social Engineering is so effective because users are the most vulnerable part of an organization. All the security devices and programs in the world won't keep an organization safe if an employee gives away a password. Black Hat Hackers take advantage of this fact.

Technical:
                        Using technology to get information is also a great way to get it. A hacker can send a fax or an email to a legitimate user in hopes to get a response containing vital information. Many times the hacker will act like he/she is involved with law enforcement and needs certain data for record keeping purposes or investigations.

Trojan horses:
A Trojan horse is a program which seems to be doing one thing, but is actually doing another. A trojan horse can be used to set up a back door in a computer system such that the intruder can gain access later. (The name refers to the horse from the Trojan War, with conceptually similar function of deceiving defenders into bringing an intruder inside.)

Viruses
A virus is a self-replicating program that spreads by inserting copies of itself into other executable code or documents. Therefore, a computer virus behaves in a way similar to a biological virus, which spreads by inserting itself into living cells.
While some are harmless or mere hoaxes most computer viruses are considered malicious.

Worms
Like a virus, a worm is also a self-replicating program. A worm differs from a virus in that it propagates through computer networks without user intervention. Unlike a virus, it does not need to attach itself to an existing program. Many people conflate the terms "virus" and "worm", using them both to describe any self-propagating program.

Key loggers
A key logger is a tool designed to record ('log') every keystroke on an affected machine for later retrieval. Its purpose is usually to allow the user of this tool to gain access to confidential information typed on the affected machine, such as a user's password or other private data. Some key loggers uses virus-, trojan-, and rootkit-like methods to remain active and hidden. However, some key loggers are used in legitimate ways and sometimes to even enhance computer security. As an example, a business might have a key logger on a computer used at a point of sale and data collected by the key logger could be used for catching employee fraud.
For further doubts, feel free to comment.
Enjoy with us.
Support the blog, Click on ads

Comments

Popular posts from this blog

Six Best Android Apps for Geeks

1. ConnectBot:  Every geek will always have a hand on these kind of stuffs. Forget your PC or laptop and guess this SSH Client will satisfy all your ultimate geeky thing. ConnectBot is a powerful open-source Secure Shell (SSH) client. It can manage simultaneous SSH sessions, create secure tunnels, and copy/paste between other applications. This client allows you to connect to Secure Shell servers that typically run on UNIX-based servers. Use Connect Bot to maximum number of sessions and feel like GOD Features: -Support device with hardware keyboard. - Popup keyboard with all those normally hard to find characters - Use the volume keys to quickly change font size - External keyboard support - Telnet support - Local Android terminal support - Click URLs to open in a browser - Copy & Paste within sessions - UTF-8 character support - Easily organise your connections by group - Keep multiple SSH sessions running in the background - Password & OpenSSH privat...

All about ZIKA virus

Here's all you need to know about the Zika virus - from the dangers it poses to pregnant women to the steps one can take to minimise risk of exposure. Q: What is the Zika virus? A: It is a virus infection transmitted by the bite of an infected Aedes mosquito, which also carries the dengue and chikungunya viruses. It is generally a mild disease; four in five people who become infected with Zika do not show any symptoms but could be infectious. Q: What are the symptoms? A: They include a fever, an itchy rash, body aches, headache, red eyes and occasionally, nausea and vomiting. These usually develop within three to 12 days after the mosquito bite and often last between four and seven days. Q: Who is at greatest risk? A: Unborn babies are the most at risk should their mothers become infected with the Zika virus. Between 1 per cent and 10 per cent of women infected during pregnancy give birth to babies with defects. The most common defect is microcephaly, where the...

How to manually install apps in your android phone

First of all i want to talk something about Android and apk files. Now a days, Androids become most important in today's mobile phones. This is a smart phone era is seems. Here we go, APK is Application Package File. The file format used to install applications in Google's proud and bright Android Operating system. APK are a variant of jar file format with an .apk extention. jar files you might have seen in  Symbian phones.  Here are the steps to be followed strictly : 1. First you need to open your browser and google for android apps providers (except market, as it wont provide you .apk files) Here are some sites i found useful: mobiles24.com  (you will need to create a ID here for free.) androidzoom.com also u can search in rapid share and mega upload for apk files. 2. Now assuming that u reached your website page, Browse the content you want and click download to download the apk file you needed. ( U need to be sure about the OS version. Check for i...