Skip to main content

Free Stuff

Basic Hacking Techniques

Just a starter pack for those who want to learn hacking. These types of hacking tricks basically used and popular now.


!!!READ FULL!!!
DON'T MISS A SINGLE THING
I personally advice to LAZY PEOPLE!!! Never start to read!!!


Here it goes,



Vulnerability scanner:
                             A vulnerability scanner is a tool used to quickly check computers on a network for known weaknesses. Hackers also commonly use port scanners. These check to see which ports on a specified computer are "open" or available to access the computer, and sometimes will detect what program or service is listening on that port, and its version number. (Note that firewalls defend computers from intruders by limiting access to ports/machines both inbound and outbound, but can still be circumvented.)

Password cracking:
                                    Password cracking is the process of recovering passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.


Packet sniffer:
                             A packet sniffer is an application that captures data packets, which can be used to capture passwords and other data in transit over the network.
Spoofing attack (Phishing):
                            A spoofing attack involves one program, system, or website successfully masquerading as another by falsifying data and thereby being treated as a trusted system by a user or another program. The purpose of this is usually to fool programs, systems, or users into revealing confidential information, such as user names and passwords, to the attacker.

Rootkit:
              A rootkit is designed to conceal the compromise of a computer's security, and can represent any of a set of programs which work to subvert control of an operating system from its legitimate operators. Usually, a rootkit will obscure its installation and attempt to prevent its removal through a subversion of standard system security. Rootkits may include replacements for system binaries so that it becomes impossible for the legitimate user to detect the presence of the intruder on the system by looking at process tables.

Social engineering:
                                        When a Hacker, typically a black hat, is in the second stage of the targeting process, he or she will typically use some social engineering tactics to get enough information to access the network. A common practice for hackers who use this technique, is to contact the system administrator and play the role of a user who cannot get access to his or her system. Hackers who use this technique have to be quite savvy and choose the words they use carefully, in order to trick the system administrator into giving them information. In some cases only an employed help desk user will answer the phone and they are generally easy to trick. Another typical hacker approach is for the hacker to act like a very angry supervisor and when the his/her authority is questioned they will threaten the help desk user with their job. Social Engineering is so effective because users are the most vulnerable part of an organization. All the security devices and programs in the world won't keep an organization safe if an employee gives away a password. Black Hat Hackers take advantage of this fact.

Technical:
                        Using technology to get information is also a great way to get it. A hacker can send a fax or an email to a legitimate user in hopes to get a response containing vital information. Many times the hacker will act like he/she is involved with law enforcement and needs certain data for record keeping purposes or investigations.

Trojan horses:
A Trojan horse is a program which seems to be doing one thing, but is actually doing another. A trojan horse can be used to set up a back door in a computer system such that the intruder can gain access later. (The name refers to the horse from the Trojan War, with conceptually similar function of deceiving defenders into bringing an intruder inside.)

Viruses
A virus is a self-replicating program that spreads by inserting copies of itself into other executable code or documents. Therefore, a computer virus behaves in a way similar to a biological virus, which spreads by inserting itself into living cells.
While some are harmless or mere hoaxes most computer viruses are considered malicious.

Worms
Like a virus, a worm is also a self-replicating program. A worm differs from a virus in that it propagates through computer networks without user intervention. Unlike a virus, it does not need to attach itself to an existing program. Many people conflate the terms "virus" and "worm", using them both to describe any self-propagating program.

Key loggers
A key logger is a tool designed to record ('log') every keystroke on an affected machine for later retrieval. Its purpose is usually to allow the user of this tool to gain access to confidential information typed on the affected machine, such as a user's password or other private data. Some key loggers uses virus-, trojan-, and rootkit-like methods to remain active and hidden. However, some key loggers are used in legitimate ways and sometimes to even enhance computer security. As an example, a business might have a key logger on a computer used at a point of sale and data collected by the key logger could be used for catching employee fraud.
For further doubts, feel free to comment.
Enjoy with us.
Support the blog, Click on ads

Comments

Popular posts from this blog

All about ZIKA virus

Here's all you need to know about the Zika virus - from the dangers it poses to pregnant women to the steps one can take to minimise risk of exposure. Q: What is the Zika virus? A: It is a virus infection transmitted by the bite of an infected Aedes mosquito, which also carries the dengue and chikungunya viruses. It is generally a mild disease; four in five people who become infected with Zika do not show any symptoms but could be infectious. Q: What are the symptoms? A: They include a fever, an itchy rash, body aches, headache, red eyes and occasionally, nausea and vomiting. These usually develop within three to 12 days after the mosquito bite and often last between four and seven days. Q: Who is at greatest risk? A: Unborn babies are the most at risk should their mothers become infected with the Zika virus. Between 1 per cent and 10 per cent of women infected during pregnancy give birth to babies with defects. The most common defect is microcephaly, where the...

Six Best Android Apps for Geeks

1. ConnectBot:  Every geek will always have a hand on these kind of stuffs. Forget your PC or laptop and guess this SSH Client will satisfy all your ultimate geeky thing. ConnectBot is a powerful open-source Secure Shell (SSH) client. It can manage simultaneous SSH sessions, create secure tunnels, and copy/paste between other applications. This client allows you to connect to Secure Shell servers that typically run on UNIX-based servers. Use Connect Bot to maximum number of sessions and feel like GOD Features: -Support device with hardware keyboard. - Popup keyboard with all those normally hard to find characters - Use the volume keys to quickly change font size - External keyboard support - Telnet support - Local Android terminal support - Click URLs to open in a browser - Copy & Paste within sessions - UTF-8 character support - Easily organise your connections by group - Keep multiple SSH sessions running in the background - Password & OpenSSH privat...

786 - What really it is ?

Over the years, I have come across many misconceptions of 786, many heated debates on it as well. Personally I found it hard to believe that we can simply summaries an ayat of Quraan with 3 numbers. Anyway, below is an answer to the nagging question “What is the significance of 786?” “786″ – Does it stand for Bismillah-hir Rahman-nir Raheem’? For those who seek the Truth or the sake of the Truth. 786 being used by people who are misguided as the numerical representation of “Bismillah-hir Rahmaan-nir Raheem” should be informed that it has no religious or Islamic significance whatsoever. The numerals 786 or any other numerals does not represents “Bismillah-hir Rahman-nir Raheem” or any other Surah of the Most Noble and Holy Qur’an and is not a Sunnah either. CAN NUMBER 786 REPLACE THE HOLY NAME OF ALMIGHTY ALLAH AZZA WAJJAL MOST EXALTED? Almighty Allah Rabbul Ala’meen tells us very clearly in verse 2 of Surah Yusuf: “Verily, We have sent it down as an Arabic Qura...