Skip to main content

Free Stuff

Basic Hacking Techniques

Just a starter pack for those who want to learn hacking. These types of hacking tricks basically used and popular now.


!!!READ FULL!!!
DON'T MISS A SINGLE THING
I personally advice to LAZY PEOPLE!!! Never start to read!!!


Here it goes,



Vulnerability scanner:
                             A vulnerability scanner is a tool used to quickly check computers on a network for known weaknesses. Hackers also commonly use port scanners. These check to see which ports on a specified computer are "open" or available to access the computer, and sometimes will detect what program or service is listening on that port, and its version number. (Note that firewalls defend computers from intruders by limiting access to ports/machines both inbound and outbound, but can still be circumvented.)

Password cracking:
                                    Password cracking is the process of recovering passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.


Packet sniffer:
                             A packet sniffer is an application that captures data packets, which can be used to capture passwords and other data in transit over the network.
Spoofing attack (Phishing):
                            A spoofing attack involves one program, system, or website successfully masquerading as another by falsifying data and thereby being treated as a trusted system by a user or another program. The purpose of this is usually to fool programs, systems, or users into revealing confidential information, such as user names and passwords, to the attacker.

Rootkit:
              A rootkit is designed to conceal the compromise of a computer's security, and can represent any of a set of programs which work to subvert control of an operating system from its legitimate operators. Usually, a rootkit will obscure its installation and attempt to prevent its removal through a subversion of standard system security. Rootkits may include replacements for system binaries so that it becomes impossible for the legitimate user to detect the presence of the intruder on the system by looking at process tables.

Social engineering:
                                        When a Hacker, typically a black hat, is in the second stage of the targeting process, he or she will typically use some social engineering tactics to get enough information to access the network. A common practice for hackers who use this technique, is to contact the system administrator and play the role of a user who cannot get access to his or her system. Hackers who use this technique have to be quite savvy and choose the words they use carefully, in order to trick the system administrator into giving them information. In some cases only an employed help desk user will answer the phone and they are generally easy to trick. Another typical hacker approach is for the hacker to act like a very angry supervisor and when the his/her authority is questioned they will threaten the help desk user with their job. Social Engineering is so effective because users are the most vulnerable part of an organization. All the security devices and programs in the world won't keep an organization safe if an employee gives away a password. Black Hat Hackers take advantage of this fact.

Technical:
                        Using technology to get information is also a great way to get it. A hacker can send a fax or an email to a legitimate user in hopes to get a response containing vital information. Many times the hacker will act like he/she is involved with law enforcement and needs certain data for record keeping purposes or investigations.

Trojan horses:
A Trojan horse is a program which seems to be doing one thing, but is actually doing another. A trojan horse can be used to set up a back door in a computer system such that the intruder can gain access later. (The name refers to the horse from the Trojan War, with conceptually similar function of deceiving defenders into bringing an intruder inside.)

Viruses
A virus is a self-replicating program that spreads by inserting copies of itself into other executable code or documents. Therefore, a computer virus behaves in a way similar to a biological virus, which spreads by inserting itself into living cells.
While some are harmless or mere hoaxes most computer viruses are considered malicious.

Worms
Like a virus, a worm is also a self-replicating program. A worm differs from a virus in that it propagates through computer networks without user intervention. Unlike a virus, it does not need to attach itself to an existing program. Many people conflate the terms "virus" and "worm", using them both to describe any self-propagating program.

Key loggers
A key logger is a tool designed to record ('log') every keystroke on an affected machine for later retrieval. Its purpose is usually to allow the user of this tool to gain access to confidential information typed on the affected machine, such as a user's password or other private data. Some key loggers uses virus-, trojan-, and rootkit-like methods to remain active and hidden. However, some key loggers are used in legitimate ways and sometimes to even enhance computer security. As an example, a business might have a key logger on a computer used at a point of sale and data collected by the key logger could be used for catching employee fraud.
For further doubts, feel free to comment.
Enjoy with us.
Support the blog, Click on ads

Comments

Popular posts from this blog

Endhiran background

After completing Nayak: The Real Hero in 2001, Shankar announced a project with Kamal Haasan and Preity Zinta titled Robo , to be produced by the now-defunct production company Media Dreams . Despite, announcing the project, due to a lack of backing, the project was cancelled and Shankar began work on Boys . In 2005, Shankar made another project, Anniyan , this was mistaken to be the renamed title for Robot . In early 2007, Shankar stated that his next project would be produced by his production house, S Pictures for 3 months. Several websites claimed that he was set to take his maiden Telugu language film with Chiranjeevi , while others claimed that it was set to be with Mahesh Babu . Tabloid gossip columns reported that Ajith Kumar was considered for the film. Finally, in July 2007, Shahrukh Khan was signed on to be the male lead of Robot as well as the producer of the film. However, in October 2007, Shahrukh Khan and Shankar officially called off the project due to creative ...

History of HTML

I repeatedly hear from friends, all asking the basics of HTML. From today i am planning to start Basic HTML class free via Blog. Follow regularly and keep learning. We are here to help in each aspects. Origins:              In 1980, physicist Tim Berners-Lee, who was a contractor at CERN, proposed and prototyped ENQUIRE, a system for CERN researchers to use and share documents. In 1989, Berners-Lee wrote a memo proposing an Internet-based hypertext system. [ 2 ]  Berners-Lee specified HTML and wrote the browser and server software in the last part of 1990. In that year, Berners-Lee and CERN data systems engineer Robert Cailliau collaborated on a joint request for funding, but the project was not formally adopted by CERN. In his personal notes from 1990 he lists "some of the many areas in which hypertext is used" and puts an encyclopedia first. First Specifications:     ...

New in ASUS Family of Phones

hen you hear about the word ASUS, you might think of processors, laptops and versatile tablets etc. To be little clear for the understanding, The New ear for smart phone industry have seen a verity and trend in phones. Each day new companies arise and bring out the best of them to the phone market and compete with the market giants like Apple, SAMSUNG and Microsoft.                                             Being a hard (even more harder) fan of new technology in PC, Laptop and mobiles, We daily go through lot of techies day to day lives. ASUS is one such emergent as it uses INTEL Atom Processor for their Zenfone series. Now A New technology is coming out from them.  A 3x OPTICAL ZOOM LENS CAMERA PHONE! It has a 3x optical zoom, but not one that’s inside an unsightly bulge like the Galaxy K Zoom.                  ...