Saturday, 18 July 2015

The International Conference on Computing Technologies and Intelligent Data Engineering

About Conference:

 The International Conference on Computing Technologies and Intelligent Data Engineering (ICCTIDE’16) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer, and Information Sciences. The Conference looks for significant contributions to all major fields of the Computer and Information Sciences in theoretical and practical aspects. The aim of the conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.Prospective authors are invited to submit manuscripts reporting original unpublished research and recent developments in the topics related to the conference. It is required that the manuscript follows the standard IEEE camera-ready format (IEEE standard format, double column, 10-point font).

 

News and Events:

 Call for PapersCall for Papers 

                Call for Paper Open

Last Date for Full Paper SubmissionLast Date for Full Paper Submission

Full Paper Submission Ends: September 3, 2015 Acceptance Notification: October 5, 2015 Final Paper Deadline

 New Website LaunchedNew Website Launched 

New website Launched for The International Conference on Computing Technologies and Intelligent Data Engineering (ICCTIDE’16).


               Computing Technologies 




Thursday, 30 October 2014

WiFi Password Hacker

Wifi Hacker for Android fastest and most advanced one. Hack into anybody private router! Hacking a wireless was never so easy! This app allows to simulate hacking and cracking of WEP, WPA and WPA 2 encrypted networks. Tap on a network and get the password in a flash! 

Old school hackers Terminal look and feel!
click here to direct download.

Wednesday, 29 October 2014

WiFi hacking apps working


In this post i'll give you some Apps that you can hack WiFi connection with Android device. Yeah you can find different apps on Play Store called as WiFi hacking, but the most part of that apps are fake. But apps i give you in this posts work perfect.
1.WiFi unlocker2.0
That's a noteworthy Android Wifi Hacking App , the app is easy to use and you have want to be a tech geek to unlock or crack the wifi networks around you. its a tool which can be used in any circumstances to crack wifi network and let you surf the web for free. 
download
2.Router keygen app
Its works with almost all Router/Wifi. His dictionary a 66Mb single file, which efficient than anything else available market. T should be downloaded SD card, though select the folder where menu. Alternatively use connection instead dictionary. 
Download
3.WIFi kill
Well, with this app you can disable internet connection for a device on the same network.
Download

WiFi Hack 4.2 download(WiFi Hack2014)

wifi-hacking
Accessing every single Wifi System was miracle? Not Any more!
Nowdays to have an Internet Connection is essential thing. To be associated with the Internet means to have every single answer to be able to any question using Google as well as other search engines, to be capable of play any online online game, to be able to concentrate every single song(download it in your computer) and additionally to be able to be able to communicate with all your family and friends using the social communities as Facebook and Twiter or maybe Skype. But as a baby or student sometimes we are not able to pay the bills for Net connection and thats why we now have created this Wifi Hack to help you to connect to your neighbors connection and have access to all the media on the web.
This wifi hack can crack the password involving any connection you choise and allow you to use it util the actual password is changed, then you can run the program all over again and gain access all over again. All you have to accomplish is pick the Wifi signal you need to connect to and this software will do everything else itself and provides you with the cracked password. We do constant updates to the program in order that it will keep working till some significant changes of os’s will be made. It really is time for WiFi Neighborhood friends War! Are you all set?wifi-hack-program

How To Use WiFi Hack

  1. Download the Wifi Hacker Tool
  2. Start the Wifi Hacker Tool
  3. Choose one HOTSPOT and enter the name in SSID field
  4. Select what kind of Security Type is
  5. Press on the HACK button. This might take more time
  6. Well Done!

WiFi Hack Features:

  • Brute-force Attack – Can do Brute-force attack with opportunity to implement your own keywords
  • Wifi WEP Hack – Wifi hack for any WEP protected password
  • Wifi WPA Hack – Wifi hack for any WPA protected password
  • Wifi WPA2 Hack Wifi hack for any WPA protected password
  • Easy – No hacking skills needed
  • Fast – The whole Procedure takes few minutes to few hours(Based on complexity)
  • Virus Free – No viruses
click here to download the application:

Tuesday, 28 October 2014

.ATM Machines are hacked by Tyupkin Malware

Money is always a perfect motivation for cyber criminals who tries different tricks to solely target users with card skimmers that steal debit card numbers, but now the criminals are using specialized malware that targets ATM(Automated Teller Machine) systems to withdraw cash even without the need of a card.
The new backdoor program, dubbed as “Tyupkin,” requires physical access to theATM system running 32-bit Windows platforms and booting it off of a CD in order to install the malware. According to the researchers, the threat has continued to evolve in recent months, infecting ATMs in Asia, Europe, and Latin America.
There are no details relating to the criminal gang behind the attacks, but they have already stolen "millions of dollars" from ATMs worldwide using the sophisticated malware, security firms Kaspersky and Interpol, who are working together in an attempt to foil the criminal gang, said in a joint
HOW TYUPKIN ATTACK WORKS?
In order to install the malicious backdoor, money mules need to physically insert a bootable CD which installs the malware.Once the machine is rebooted, the ATM is under the control of the criminal gang. The sophisticated malware then runs in the background on an infinite loop awaiting a command from the attacker’s side.
However, the malware will only accept commands at specific times – in this case on Sunday and Monday nights – making it harder to detect.Further more, a unique combination keybased on random numbers is generated – so that the possibility of a member of the public accidentally entering a code can be avoided. This key code needs to be entered before the main menu is shown.
When this session key is entered correctly, the ATM displays details of how much money is available in each cash cassette, inviting the operator to choose which cassette to steal from, and the number of available banknotes– the ATM dispenses a maximum of 40 at a time from the chosen cassette.
COUNTRIES AFFECTED BY TYUPKIN
During investigation the researchers found more than 50 ATMs from banking institutions throughout Eastern Europe, and most of the Tyupkin submissions came from Russia. The malware appears to have since spread to the United States, India, China, Israel, France and Malaysia.The scam has been even caught on video, as many of the ATMs have cameras. Kaspersky has informed law enforcement about the issue and also alerted banks and the financial sectors of the steps needed to prevent this type of attack. 

"NetHunter" — Turn Your Android Device into hacking weapons

The developers of one of the most advance open source operating system for penetration testing, 'KALI Linux' have announced yesterday the release of a new Kali project, known as NetHunter, that runs on a Google Nexus device.Kali Linux is an open source Debian-based operating system for penetration testing and forensics, which is maintained and funded by Offensive Security, a provider of world-class information security training and penetration testing services. It comes wrapped with a collection of penetration testing and network monitoring tools used for testing of software privacy and security.After making its influence in hacker and security circles, Kali Linux has now been published with Kali Nethunter, a version of the security suite for Android devices. The tool is a mobile distribution designed to compromise systems via USB when installed and runon an Android phone.Kali Linux. NetHunter project provides much of the power to Nexus users, those running the NetHunter penetration testing platform can now launch attacks including Teensy keyboard via HID style attacks and BadUSB man-in-the-middle (MITM) networking attacks via USB human interface device (HID), wireless 802.11 frame injection, and could setup evil access points in a single click.
Nethunter is currently available for Nexus devices only, but builds for other Android devices are likely on the way. Nethunter contained a full Kali Linux toolset, including support for self destruction, software defined radio andthe ability to launch a Kali desktop VNC session on Nexus phone.The tools are designed for use by an attacker who has physical access to a device — an insider threat — or someone who gains access through social engineering, tailing etc.On one hand,Teensy Keyboard attackson PCs can be used to automatically elevate privileges on a Windows PC and install a reverse-HTTP tunnel to a remote workstation. 
On the other hand,BadUSBcan force a Windows PC to recognize the USB-connected phone as a network adapter and re-route all the traffic of the PC through it for monitoring purposes.Additionally, the Kali NetHunter configuration interface helps users to easily manage complex configuration files through a local web interface, which together with 802.11 wireless injection and a pre-configured connect VPN service make it a “formidable network security tool or discrete drop box – with Kali Linux at the tip of your fingers wherever you are.
”Kali NetHunter open source security platform supports Nexus 10 and 7 tablets and Nexus 5 phones built on the existing Kali (formerly Backtrack) Linux platform.
Download It fromhttp://www.offensive-security.com/kali-linux-nethunter-download/ here

Turn USB Drives Into Undetectable CyberWeapons

Once again USB has come up as a major threat to a vast number of users who use USB drives – including USB sticks and keyboards.
Security researchers have released a bunch of hacking tools that can be used to convert USB drive into silentmalwareinstaller.This vulnerability has come about to be known as "BadUSB", whose source code has been published by the researchers on the open source code hosting website Github, demanding manufacturers either to beef up protections for USB flash drive firmware and fix the problem or leave hundreds of millions of users vulnerable to the attack.
The code released by researchers
Adam Caudill and Brandon Wilson has capability to spread itself by hiding in the firmware meant to control the ways in which USB devices connect to computers. The hack utilizes the security flaw in the USB that allows an attacker to insert malicious code into their firmware.But Wait! What this means is that this critical vulnerability is now available online for hackers, cyber criminals and everybody to use so as to infect as many computers as they want.
SOURCE CODE AVAILABLE ONLINE TO EVERYBODY
In a talk at the Derbycon Hacker Conference in Louisville last week, the duo were able to reverse engineer the USB firmware, infect it with their own code, and essentially hijack the associated device. The researchers also underlined the danger of the Bad USB hack by going in-depth of the code.The security hole was first revealed by researchers from Berlin-based Security Research Labs (SRLabs in Germany)at the Black Hat security conference in LasVegas two months ago, and here you can watch the video of their presentation. The German researchers didn’t publish their source code because they thought it to be dangerous and too hard to patch.
The good news is that this vulnerability presents in only one USB manufacturer Phison electronics, a Taiwanese electronics company. But the bad side of it is that Phison USB sticks can infect any given device they are plugged into, and the company has not yet revealed who it manufactures USB sticks for. This is the fact it is still unclear as to how widespread the problem may be at the moment.A Phison USB stick can infect any type of computer, but it isn’t clear if its able to infect any other USB device that is plugged into them afterwards or not.
However, Phison controllers are found in a very large number of USB thumb drives available on the market.
Bad USB VULNERABILITY IS UNPATCHABLE
The flaw in USB basically modifies the firmware of USB devices, which can easily be done from inside the operating system, and hides the malware in USB devices in a way that it become almost impossible to detect it. The flaw goes worst when complete formatting or deleting the contents of a USB device wouldn't vanish the malicious code, since its embedded in the firmware.
IMPACT OF BadUSB ATTACK
Once compromised, the USB devices can reportedly:
*.enter keystrokes
*.alter files
*.affect Internet activity
*.infect other systems, as well, and then spread to additional USB devices
*.spoofs a network card and change the computer’s DNS setting to redirect traffic
*.emulates a keyboard and issue commands on behalf of the logged-in user,
for example to exfiltrate files or install malware
Get source code from here

Popular Posts