Saturday, 18 July 2015

The International Conference on Computing Technologies and Intelligent Data Engineering

About Conference:

 The International Conference on Computing Technologies and Intelligent Data Engineering (ICCTIDE’16) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer, and Information Sciences. The Conference looks for significant contributions to all major fields of the Computer and Information Sciences in theoretical and practical aspects. The aim of the conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.Prospective authors are invited to submit manuscripts reporting original unpublished research and recent developments in the topics related to the conference. It is required that the manuscript follows the standard IEEE camera-ready format (IEEE standard format, double column, 10-point font).

 

News and Events:

 Call for PapersCall for Papers 

                Call for Paper Open

Last Date for Full Paper SubmissionLast Date for Full Paper Submission

Full Paper Submission Ends: September 3, 2015 Acceptance Notification: October 5, 2015 Final Paper Deadline

 New Website LaunchedNew Website Launched 

New website Launched for The International Conference on Computing Technologies and Intelligent Data Engineering (ICCTIDE’16).


               Computing Technologies 




Thursday, 30 October 2014

WiFi Password Hacker

Wifi Hacker for Android fastest and most advanced one. Hack into anybody private router! Hacking a wireless was never so easy! This app allows to simulate hacking and cracking of WEP, WPA and WPA 2 encrypted networks. Tap on a network and get the password in a flash! 

Old school hackers Terminal look and feel!
click here to direct download.

Wednesday, 29 October 2014

WiFi hacking apps working


In this post i'll give you some Apps that you can hack WiFi connection with Android device. Yeah you can find different apps on Play Store called as WiFi hacking, but the most part of that apps are fake. But apps i give you in this posts work perfect.
1.WiFi unlocker2.0
That's a noteworthy Android Wifi Hacking App , the app is easy to use and you have want to be a tech geek to unlock or crack the wifi networks around you. its a tool which can be used in any circumstances to crack wifi network and let you surf the web for free. 
download
2.Router keygen app
Its works with almost all Router/Wifi. His dictionary a 66Mb single file, which efficient than anything else available market. T should be downloaded SD card, though select the folder where menu. Alternatively use connection instead dictionary. 
Download
3.WIFi kill
Well, with this app you can disable internet connection for a device on the same network.
Download

WiFi Hack 4.2 download(WiFi Hack2014)

wifi-hacking
Accessing every single Wifi System was miracle? Not Any more!
Nowdays to have an Internet Connection is essential thing. To be associated with the Internet means to have every single answer to be able to any question using Google as well as other search engines, to be capable of play any online online game, to be able to concentrate every single song(download it in your computer) and additionally to be able to be able to communicate with all your family and friends using the social communities as Facebook and Twiter or maybe Skype. But as a baby or student sometimes we are not able to pay the bills for Net connection and thats why we now have created this Wifi Hack to help you to connect to your neighbors connection and have access to all the media on the web.
This wifi hack can crack the password involving any connection you choise and allow you to use it util the actual password is changed, then you can run the program all over again and gain access all over again. All you have to accomplish is pick the Wifi signal you need to connect to and this software will do everything else itself and provides you with the cracked password. We do constant updates to the program in order that it will keep working till some significant changes of os’s will be made. It really is time for WiFi Neighborhood friends War! Are you all set?wifi-hack-program

How To Use WiFi Hack

  1. Download the Wifi Hacker Tool
  2. Start the Wifi Hacker Tool
  3. Choose one HOTSPOT and enter the name in SSID field
  4. Select what kind of Security Type is
  5. Press on the HACK button. This might take more time
  6. Well Done!

WiFi Hack Features:

  • Brute-force Attack – Can do Brute-force attack with opportunity to implement your own keywords
  • Wifi WEP Hack – Wifi hack for any WEP protected password
  • Wifi WPA Hack – Wifi hack for any WPA protected password
  • Wifi WPA2 Hack Wifi hack for any WPA protected password
  • Easy – No hacking skills needed
  • Fast – The whole Procedure takes few minutes to few hours(Based on complexity)
  • Virus Free – No viruses
click here to download the application:

Tuesday, 28 October 2014

.ATM Machines are hacked by Tyupkin Malware

Money is always a perfect motivation for cyber criminals who tries different tricks to solely target users with card skimmers that steal debit card numbers, but now the criminals are using specialized malware that targets ATM(Automated Teller Machine) systems to withdraw cash even without the need of a card.
The new backdoor program, dubbed as “Tyupkin,” requires physical access to theATM system running 32-bit Windows platforms and booting it off of a CD in order to install the malware. According to the researchers, the threat has continued to evolve in recent months, infecting ATMs in Asia, Europe, and Latin America.
There are no details relating to the criminal gang behind the attacks, but they have already stolen "millions of dollars" from ATMs worldwide using the sophisticated malware, security firms Kaspersky and Interpol, who are working together in an attempt to foil the criminal gang, said in a joint
HOW TYUPKIN ATTACK WORKS?
In order to install the malicious backdoor, money mules need to physically insert a bootable CD which installs the malware.Once the machine is rebooted, the ATM is under the control of the criminal gang. The sophisticated malware then runs in the background on an infinite loop awaiting a command from the attacker’s side.
However, the malware will only accept commands at specific times – in this case on Sunday and Monday nights – making it harder to detect.Further more, a unique combination keybased on random numbers is generated – so that the possibility of a member of the public accidentally entering a code can be avoided. This key code needs to be entered before the main menu is shown.
When this session key is entered correctly, the ATM displays details of how much money is available in each cash cassette, inviting the operator to choose which cassette to steal from, and the number of available banknotes– the ATM dispenses a maximum of 40 at a time from the chosen cassette.
COUNTRIES AFFECTED BY TYUPKIN
During investigation the researchers found more than 50 ATMs from banking institutions throughout Eastern Europe, and most of the Tyupkin submissions came from Russia. The malware appears to have since spread to the United States, India, China, Israel, France and Malaysia.The scam has been even caught on video, as many of the ATMs have cameras. Kaspersky has informed law enforcement about the issue and also alerted banks and the financial sectors of the steps needed to prevent this type of attack. 

"NetHunter" — Turn Your Android Device into hacking weapons

The developers of one of the most advance open source operating system for penetration testing, 'KALI Linux' have announced yesterday the release of a new Kali project, known as NetHunter, that runs on a Google Nexus device.Kali Linux is an open source Debian-based operating system for penetration testing and forensics, which is maintained and funded by Offensive Security, a provider of world-class information security training and penetration testing services. It comes wrapped with a collection of penetration testing and network monitoring tools used for testing of software privacy and security.After making its influence in hacker and security circles, Kali Linux has now been published with Kali Nethunter, a version of the security suite for Android devices. The tool is a mobile distribution designed to compromise systems via USB when installed and runon an Android phone.Kali Linux. NetHunter project provides much of the power to Nexus users, those running the NetHunter penetration testing platform can now launch attacks including Teensy keyboard via HID style attacks and BadUSB man-in-the-middle (MITM) networking attacks via USB human interface device (HID), wireless 802.11 frame injection, and could setup evil access points in a single click.
Nethunter is currently available for Nexus devices only, but builds for other Android devices are likely on the way. Nethunter contained a full Kali Linux toolset, including support for self destruction, software defined radio andthe ability to launch a Kali desktop VNC session on Nexus phone.The tools are designed for use by an attacker who has physical access to a device — an insider threat — or someone who gains access through social engineering, tailing etc.On one hand,Teensy Keyboard attackson PCs can be used to automatically elevate privileges on a Windows PC and install a reverse-HTTP tunnel to a remote workstation. 
On the other hand,BadUSBcan force a Windows PC to recognize the USB-connected phone as a network adapter and re-route all the traffic of the PC through it for monitoring purposes.Additionally, the Kali NetHunter configuration interface helps users to easily manage complex configuration files through a local web interface, which together with 802.11 wireless injection and a pre-configured connect VPN service make it a “formidable network security tool or discrete drop box – with Kali Linux at the tip of your fingers wherever you are.
”Kali NetHunter open source security platform supports Nexus 10 and 7 tablets and Nexus 5 phones built on the existing Kali (formerly Backtrack) Linux platform.
Download It fromhttp://www.offensive-security.com/kali-linux-nethunter-download/ here

Turn USB Drives Into Undetectable CyberWeapons

Once again USB has come up as a major threat to a vast number of users who use USB drives – including USB sticks and keyboards.
Security researchers have released a bunch of hacking tools that can be used to convert USB drive into silentmalwareinstaller.This vulnerability has come about to be known as "BadUSB", whose source code has been published by the researchers on the open source code hosting website Github, demanding manufacturers either to beef up protections for USB flash drive firmware and fix the problem or leave hundreds of millions of users vulnerable to the attack.
The code released by researchers
Adam Caudill and Brandon Wilson has capability to spread itself by hiding in the firmware meant to control the ways in which USB devices connect to computers. The hack utilizes the security flaw in the USB that allows an attacker to insert malicious code into their firmware.But Wait! What this means is that this critical vulnerability is now available online for hackers, cyber criminals and everybody to use so as to infect as many computers as they want.
SOURCE CODE AVAILABLE ONLINE TO EVERYBODY
In a talk at the Derbycon Hacker Conference in Louisville last week, the duo were able to reverse engineer the USB firmware, infect it with their own code, and essentially hijack the associated device. The researchers also underlined the danger of the Bad USB hack by going in-depth of the code.The security hole was first revealed by researchers from Berlin-based Security Research Labs (SRLabs in Germany)at the Black Hat security conference in LasVegas two months ago, and here you can watch the video of their presentation. The German researchers didn’t publish their source code because they thought it to be dangerous and too hard to patch.
The good news is that this vulnerability presents in only one USB manufacturer Phison electronics, a Taiwanese electronics company. But the bad side of it is that Phison USB sticks can infect any given device they are plugged into, and the company has not yet revealed who it manufactures USB sticks for. This is the fact it is still unclear as to how widespread the problem may be at the moment.A Phison USB stick can infect any type of computer, but it isn’t clear if its able to infect any other USB device that is plugged into them afterwards or not.
However, Phison controllers are found in a very large number of USB thumb drives available on the market.
Bad USB VULNERABILITY IS UNPATCHABLE
The flaw in USB basically modifies the firmware of USB devices, which can easily be done from inside the operating system, and hides the malware in USB devices in a way that it become almost impossible to detect it. The flaw goes worst when complete formatting or deleting the contents of a USB device wouldn't vanish the malicious code, since its embedded in the firmware.
IMPACT OF BadUSB ATTACK
Once compromised, the USB devices can reportedly:
*.enter keystrokes
*.alter files
*.affect Internet activity
*.infect other systems, as well, and then spread to additional USB devices
*.spoofs a network card and change the computer’s DNS setting to redirect traffic
*.emulates a keyboard and issue commands on behalf of the logged-in user,
for example to exfiltrate files or install malware
Get source code from here

Find hidden friends in your facebook chat

A very useful trick to find the invisible friends on your chat in Facebook.
Follow the steps given below to get shown the invisible friends.
1. Log in to your Facebook Account.
2.Go to Online Now Facebook Application.
3.It asks Request For PermissionClick on Allow.
4.Now you will get shown all the friends who are online and set their status as invisible.You can view the differences between the online friends in Facebook Chat Box andOnline Now Chat Box .
I am sure this trick is very useful and many of the Facebook users are searchingfor this trick. Now you can chat with your friends who are set their status as invisible.. Enjoy..!!

Hack Facebook by cookie stealing

Facebook Authentication Cookies
The cookie which facebook uses to authenticate it's users is called"Datr", If an attacker can get hold of your authentication cookies, All he needs to do is to inject those cookies in his browser and he will gain access to your account.
This is how a facebook authentication cookie looks like:
Cookie:  datr=1276721606-b7f94f977295759399293c5b0767618dc02111ede159a827030fc;
How To Steal Facebook Session Cookies And Hijack An Account?
An attacker can use variety of methods in order to steal your facebook authentication cookies depending upon the network he is on, If an attacker is on a hub based network he would just sniff traffic with any packet sniffer and gain access to victims account.If an attacker is on a Switch based network he would use an ARP Poisoning request to capture authentication cookies, If an attacker is on a wireless network he just needs to use a simple tool called firesheep in order to capture authentication cookie and gain access to victims account.
In this example below I will be explaining how an attacker can capture your authentication cookies and hack your facebook account with wireshark.
Hack facebook account with wireshark.
Step 1 -First of all download wireshark from the official website and install it.
Step 2 -Next open up wireshark click on analyze and then click on interfaces.
Step 3 -Next choose the appropriate interface and click on start.
Step 4 -Continue sniffing for around 10 minutes.
Step 5 -After 10 minutes stop the packet sniffing by going to the capture menu and clicking on Stop.
Step 6 -Next set the filter tohttp.cookie contains “datr”at top left, This filter will search for all the http cookies with the name datr, And datr as we know is the name of the facebook authentication cookie.
Step 7 -Next right click on it and gotoCopy- Bytes - Printable Text only.
Step 8 -Next you’ll want to open up firefox. You’ll need both. Greasemonkey and the cookieinjector script. Now open up Facebook.com and make sure that you are not logged in.
Step 9-Press. Alt C. to bring up the cookie injector, Simply paste in the cookie value into it.
Step 10 -Now refresh your page and viola you are logged in to the victims facebook account.
Note:This Attack will only work if victim is on a http:// connection and even on https:// if end to end encryption is not enabled.

How to Recover Deleted Facebook Messages, Photos And Videos

How to Recover Deleted Facebook Messages and Other Data. It sounds very Useful & very interesting topic. You can nowget back your past removed facebook messages, pictures and video clips, from facebook database. you have to go by the steps that are not much hard to do. Some easy steps and you did it. If you've got any difficulty then don’t ignore to comment right below the tutorial.
Before recovering old removed facebook messages, images and video clips you must have follow these things. Just some easy and simple steps to follow that are provided below
*.You need to click hereto open general account settings of your facebook account.
*.Then find option at the end"Download a copy of your Facebook data" and click on it.
*.It will show you a message that backup data has been sent on your email address.
*.Soon after few time, you will geta mail confirmation that your data is ready. Now you need to click on the link provided by Facebook. (Keep in mind This is simply for protection).
*.Then, on next page you'll see, a Download Archive Button, click it and you'll be prompt to submit your password to carry on, That is a safety action by Facebook.
*.After submitting your facebook password, on another screen you'll be found your download link for the data will be mailed to your email id that you put to make your facebook account.
*.Now download the file. Unzip that file. and open the folder where you'll recover deleted facebook messages, pictures and Videos, as well as friend list.
All data are typically in.html format.and you'll be not able to use them usually.
Therefore, you'll have to double click on the file and choose your favorite web browser to open up the file, the file will open within your browser where you'll have accessibility to all of your data.Enjoy, Don’t forget to share this tutorial with your buddies, may using this tutorial they'll be able to get back their memorable messages, that might be removed by mistake. if you've got any problem,  Don’t forget to comment.

How To Use Google Chrome For Hacking

Up till now, firefox was widely used by hackers and pentesters for their day to dayjob due to tremendous plugins that would make their work much easier for them.
However now a days i prefer google chrome more than firefox, due to wide variety of interesting extensions that may provide a great aid in hacking and pentration testing.Their are lots and lots of google chrome extension that can be used for hacking, however i have complied a list of my favorite ones, which i use frequently in order to test different types of web applications for security vulnerabilities.
How To Use Google Chrome For Hacking - Extensions
XSS Rays
Xss rays would certainly be at the top of mylist,  XSS rays includes a scanner, XSS reverser and a DOM inspection tool. Although it does makes the browser a bit unstable when you are performing heavy scans, However it's really handy in detecting XSS attacks. It's a perfect replacement to. XSSME. that is used in firefox for detecting XSS attacks.
Official Description
XSS Rays is asecuritytoolto help pen test large web sites. It's core features include a XSS scanner, XSS Reverser and object inspection. Need to know how a certain page filters output? Don't have the source? No problem. XSS Rays will blackbox reverse a XSS filter without needing the source code.
Websecurify Scanner
Websecurify Scanner is a really powerful scanner capable of detecting lots of web application attacks. Although it generates lots of false positives, mostly related to. CSRF attacks. However it's really handy in detecting XSS attacks. It's fully awesome automated and very user friendly.
Usage
1.All you need to do is to install the websecurity scanner from the link above and visit the following page:https://suite.websecurify.com/foundation
2. Just enter the URL and it will automatically start scanning.
HPP Finder
HPP finder is capable of easily detecting Http Parameter Pollution attacks. HTTP Parameter Pollution is newest type of web application attacks, Their is not very much information available on it as compared to other attacks such as XSS,SQLinjection. However the one that's available is very handy.Official DescriptionHTTP Parameter Pollution (HPP) is a recently discovered web exploitation technique. Please read the NDSS 2010 paper for more details about the technique. HPP Finder is a Chrome extension designed for detecting HPP attempts. HPP Finder can detect URLs and HTML forms that might be susceptible of parameter pollution, but it is not a complete solution against HPP.XSS CHEFXSS Chef is a perfect replacement to BEEF (Browser Exploitation Framework) for google chrome Cookie EditorCookie Editor is a very useful google chrome extension for hackers, I mostly use it, when i am performing session hijacking attacks.

Windows 10:Everything You Need To Know

As expected Microsofthas formally announcedthe new version of Windows. As no-one expected it will be called‘Windows 10’ not Windows 9. Why?
Because Microsoft claims it represents such a significant leap over Windows 8 that calling it Windows 9 would not do it justice.I can hear your groans now, but in Microsoft’s defence Windows 10 hassome major (and long awaited) improvements.
Here are the highlights:
One OS To Rule Them All Architecturally the biggest news is that Windows 10 is being designed to run across all device form factors. That means desktops, laptops, tablets, phablets and smartphones.“Windows 10 will run on the broadest amount of devices. A tailored experience for each device,” said Terry Myerson, Microsoft Executive VP of Operating Systems. “There will be one way to write a universal application, one store, one way for apps to be discovered purchased and updated across all of these devices.
”Microsoft didn’t break down when we might see a Windows 10 smartphone and how that would impact/absorb WindowsPhone (or even elaborate on the future for Windows Phone) but it does offer clear insight into Microsoft’s long term road map.
Update: Microsoft has now confirmed ‘Windows 10′ will also bethe next major version of Windows Phone. What devices get the upgrade and how Microsoft will handle it remains to be seen. Windows 10 Start Menu
The Start Menu Is Back , but Microsoft has finally confirmed the Start Menu will return. The leaks were spot on and it will combine both aspects of the classic Windows 7 start menu with apps from the Metro/Modern UI.
Searching with in the Start Menu will now perform a web search as well.Crucially its layout can be customised so apps can be removed or resized and the flexibility and personalisation potential of the Start Menu should win back fans disillusioned about its removal in Windows 8.
Better Touch/Keyboard And Mouse Integration
Microsoft has taken criticism seriously about the jarring nature of moving between touch and the keyboard and mouse elements of Windows 8.Microsoft is calling the new approach ‘Continuum’ and it is an umbrella term for a better merger between to different input methods. Continuum will be able to automatically switch between modes by detecting on how users interact with their device. It also carries over to design aspects like the new Start Menu, windowed apps within the desktop and so forth.“We’re trying to be thoughtful about a UI that goes across all devices,” explained Joe Belfiore, Corporate Vice President of the Operating Systems Group at Microsoft.He admits Continuum remains a work in progress with refinements to things like the Charms Bar (yesit is still there) set to be an ongoing process through the life of the public beta and right up to release (more on thatlater)
Virtual Desktops
Another leaked feature Microsoft confirmed today was virtual desktops. Microsoft didn’t give the feature an official name at this stage, but it works muchlike the long used multiple desktops on Linux and Exposé on Mac OS X.The view can be triggered with a new ‘task view’ button which both allows users to launch a new virtual desktop and jump between them. Interestingly the taskbarcan be customised to look different/relevant to each desktop allowinga simple leap from work to home modes, for example.Microsoft said all open programs in the virtual desktops will continue to run in the background, which makes for some interesting memory management challengesbut also greatly increases the potential productivity of Windows as well as de-cluttering the desktop space.
Pricing / Availability
It has been much speculated that Windows 10 may be given away free to upgraders or involve a nominal fee, but Microsoft revealed no information about this in either the presentation or Q&A afterwards.What we did learn is a technical preview of Windows 10 will be made available to users later this week (Microsoft is stressing it is only for advanced users and developers at this stage) and that an official release would not follow until ‘later in 2015’.
This suggests the OS is not as far along as many expected and Microsoft is keen to develop it in conjunctionwith user feedback.
Windows 10 Start Menu search
What Will Still Don’t Know:
A Lot Perhaps what is almost as interesting as what was revealed about Windows 10 is what Microsoft kept to itself.In addition to no news on pricing, Microsoft also didn’t touch on performance (install sizeand minimum hardwarerequirements), Cortana integration (thevoice assistant in Windows Phone 8.1), give a solid release time frame or go into any detail on how Windows 10 will handle scaling on high resolution screens – crucial given 4k monitors and super highresolution laptops are quickly gaining momentum.On the flip side what we did see is a more open Microsoft. A company, perhaps shaken by the decidedly mixed reaction to Windows 8 (however fair or unfair), that is now keen to try and mix the best aspects of Windows 7 and Windows 8 into a more user friendly experience. This means releasing early builds, issuing rapid fire updates and developing in conjunction with ongoing user feedback.
Windows 10 Product Family
Is choosing the ‘Windows 10’ moniker a step too far though? “It’sa name that resonated best with what we’ll deliver,” explained Myerson.Many would argue the struggles of Windows Phone and Windows 8 have put Microsoft into a terminal decline, but tonight’s announcement – while thin on details – suggests there is still life in the old dog yet.

Friday, 10 October 2014

How To Use Google Chrome For Hacking


Up till now, firefox was widely used by hackers and pentesters for their day to dayjob due to tremendous plugins that would make their work much easier for them.

However now a days i prefer google chrome more than firefox, due to wide variety of interesting extensions that may provide a great aid in hacking and pentration testing.Their are lots and lots of google chrome extension that can be used for hacking, however i have complied a list of my favorite ones, which i use frequently in order to test different types of web applications for security vulnerabilities.

How To Use Google Chrome For Hacking - Extensions

XSS Rays

Xss rays would certainly be at the top of mylist,  XSS rays includes a scanner, XSS reverser and a DOM inspection tool. Although it does makes the browser a bit unstable when you are performing heavy scans, However it's really handy in detecting XSS attacks. It's a perfect replacement to. XSSME. that is used in firefox for detecting XSS attacks.

Official Description

XSS Rays is asecuritytoolto help pen test large web sites. It's core features include a XSS scanner, XSS Reverser and object inspection. Need to know how a certain page filters output? Don't have the source? No problem. XSS Rays will blackbox reverse a XSS filter without needing the source code.

Websecurify Scanner

Websecurify Scanner is a really powerful scanner capable of detecting lots of web application attacks. Although it generates lots of false positives, mostly related to. CSRF attacks. However it's really handy in detecting XSS attacks. It's fully awesome automated and very user friendly.

Usage

1.All you need to do is to install the websecurity scanner from the link above and visit the following page:https://suite.websecurify.com/foundation

2. Just enter the URL and it will automatically start scanning.

HPP Finder

HPP finder is capable of easily detecting Http Parameter Pollution attacks. HTTP Parameter Pollution is newest type of web application attacks, Their is not very much information available on it as compared to other attacks such as XSS,SQLinjection. However the one that's available is very handy.Official DescriptionHTTP Parameter Pollution (HPP) is a recently discovered web exploitation technique. Please read the NDSS 2010 paper for more details about the technique. HPP Finder is a Chrome extension designed for detecting HPP attempts. HPP Finder can detect URLs and HTML forms that might be susceptible of parameter pollution, but it is not a complete solution against HPP.XSS CHEFXSS Chef is a perfect replacement to BEEF (Browser Exploitation Framework) for google chrome Cookie EditorCookie Editor is a very useful google chrome extension for hackers, I mostly use it, when i am performing session hijacking attacks

"NetHunter" — Turn Your Android Device into Hacking Weapons


The developers of one of the most advance open source operating system for penetration testing, 'KALI Linux' have announced yesterday the release of a new Kali project, known as NetHunter, that runs on a Google Nexus device.Kali Linux is an open source Debian-based operating system for penetration testing and forensics, which is maintained and funded by Offensive Security, a provider of world-class information security training and penetration testing services. It comes wrapped with a collection of penetration testing and network monitoring tools used for testing of software privacy and security.After making its influence in hacker and security circles, Kali Linux has now been published with Kali Nethunter, a version of the security suite for Android devices. The tool is a mobile distribution designed to compromise systems via USB when installed and runon an Android phone.Kali Linux. NetHunter project provides much of the power to Nexus users, those running the NetHunter penetration testing platform can now launch attacks including Teensy keyboard via HID style attacks and BadUSB man-in-the-middle (MITM) networking attacks via USB human interface device (HID), wireless 802.11 frame injection, and could setup evil access points in a single click.

Nethunter is currently available for Nexus devices only, but builds for other Android devices are likely on the way. Nethunter contained a full Kali Linux toolset, including support for self destruction, software defined radio andthe ability to launch a Kali desktop VNC session on Nexus phone.The tools are designed for use by an attacker who has physical access to a device — an insider threat — or someone who gains access through social engineering, tailing etc.On one hand,Teensy Keyboard attackson PCs can be used to automatically elevate privileges on a Windows PC and install a reverse-HTTP tunnel to a remote workstation.

On the other hand,BadUSBcan force a Windows PC to recognize the USB-connected phone as a network adapter and re-route all the traffic of the PC through it for monitoring purposes.Additionally, the Kali NetHunter configuration interface helps users to easily manage complex configuration files through a local web interface, which together with 802.11 wireless injection and a pre-configured connect VPN service make it a “formidable network security tool or discrete drop box – with Kali Linux at the tip of your fingers wherever you are.

”Kali NetHunter open source security platform supports Nexus 10 and 7 tablets and Nexus 5 phones built on the existing Kali (formerly Backtrack) Linux platform.
download it here

Thursday, 9 October 2014

Hack Facebook by cookie stealing


Facebook Authentication Cookies

The cookie which facebook uses to authenticate it's users is called"Datr", If an attacker can get hold of your authentication cookies, All he needs to do is to inject those cookies in his browser and he will gain access to your account.

This is how a facebook authentication cookie looks like:

Cookie:  datr=1276721606-b7f94f977295759399293c5b0767618dc02111ede159a827030fc;

How To Steal Facebook Session Cookies And Hijack An Account?

An attacker can use variety of methods in order to steal your facebook authentication cookies depending upon the network he is on, If an attacker is on a hub based network he would just sniff traffic with any packet sniffer and gain access to victims account.If an attacker is on a Switch based network he would use an ARP Poisoning request to capture authentication cookies, If an attacker is on a wireless network he just needs to use a simple tool called firesheep in order to capture authentication cookie and gain access to victims account.

In this example below I will be explaining how an attacker can capture your authentication cookies and hack your facebook account with wireshark.

Hack facebook account with wireshark.

Step 1 -First of all download wireshark from the official website and install it.

Step 2 -Next open up wireshark click on analyze and then click on interfaces.

Step 3 -Next choose the appropriate interface and click on start.

Step 4 -Continue sniffing for around 10 minutes.

Step 5 -After 10 minutes stop the packet sniffing by going to the capture menu and clicking on Stop.

Step 6 -Next set the filter tohttp.cookie contains “datr”at top left, This filter will search for all the http cookies with the name datr, And datr as we know is the name of the facebook authentication cookie.

Step 7 -Next right click on it and gotoCopy- Bytes - Printable Text only.

Step 8 -Next you’ll want to open up firefox. You’ll need both. Greasemonkey and the cookieinjector script. Now open up Facebook.com and make sure that you are not logged in.

Step 9-Press. Alt C. to bring up the cookie injector, Simply paste in the cookie value into it.

Step 10 -Now refresh your page and viola you are logged in to the victims facebook account.

Note:This Attack will only work if victim is on a http:// connection and even on https:// if end to end encryption is not enabled.

      ITS 100% WORKING!!!
please contribute my blog by sharing this and like my facebook page

Friday, 3 October 2014

Fileice Survey Breaker – Survey Bypass

Fileice Survey Bypasser – FI Downloader
About Fileice Bypass:
With this Fileice survey breaker you can easy bypass all fileice surveys and instead of completing survey on fileice you can easy enter fileice url into this breaker and get same file on mediafire or rapidshare.
If you are bored of completing surveys over and over again this is right tool for you. 
This fileice.net survey bypassworks with file url too. So don’t forget, if you download this survey remover,you can bypass unlimited number of fileice surveys, not just one.
Instruction For Fileice Survey Breaker Free Download:-
Click Download Button- Complete a short survey ( it takes 1 minute and itsFREE)
NOTE:If you can’t find good survey on first download button
try with secound one!- After download just open the bypasser,
click on Get Link and get file you are looking for on mediafire or rapidshare.
NOTE:A permanent Internet Connection must be active in the process of  generating

Tuesday, 19 August 2014

ALIEN ON MOON

The 'man' ON the moon? Shadow resembling an alien-like figure captured beside craters on the lunar surface

Preview
  • YouTube user Wowforreal has posted a video showing the strange figure
  • It can also been seen on Google Moon at 27°34’26.35″N 19°36’4.75″W
  • The find was made by looking over thousands of Google Moon images
  • The users has previously claimed to see an alien spaceship on the moon
  • Seeing familiar things in random objects is a known as Pareidolia
  • Scientists claim we also tend to use this ability to 'enrich our imagination' and recognise meaningful shapes, even when they're not there
From a lunar base to alien spaceships, the dark secrets hidden in the moon's surface have long been a source of fascination for conspiracy theorists.
Now one YouTube user believes he has made the ultimate find on images from Google Moon - an alien figure lurking in the satellite’s deep craters.
Wowforreel's video shows what he says could be an alien figure walking along the surface and it has already been viewed more than two million times in less than a month.
However, the most likely explanation for the sighting is a psychological phenomenon called Pareidolia, which is the brain's response to seeing faces and other significant objects in random stimulus.
Scroll down for videos
What is this mystery figure on the moon? The image was spotted on the Google Moon site by web user Jasenko. Nasa announced the shape is simply 'dust, an eyelash [or] scratch on the negative' of the film that took the image
What is this mystery figure on the moon? The image was spotted on the Google Moon site by web user Jasenko. Nasa announced the shape is simply 'dust, an eyelash [or] scratch on the negative' of the film that took the image

WHAT IS PAREIDOLIA?

Seeing familiar things in random objects is nothing new.
The phenomenon is called Pareidolia is the psychological response to seeing faces and other significant and everyday items in random stimulus.
It is a form of apophenia, which is when people see patterns or connections in random, unconnected data.
Human eyes can spot faces within their environment and it helps them recognise friends in a crowd, work out how fast a car is travelling, and see patterns.
Scientists claim we also tend to use this ability to 'enrich our imagination' and recognise meaningful shapes, even when they're not there.
The strange shape can also be seen on Google Moon at 27°34’26.35″N 19°36’4.75″W.
Tom Rose, a paranormal explainer, wrote in the Examiner the figure bears an uncanny resemblance to what the ancient statue, 'The Colossus of Rhodes', is thought to have looked like before it was felled a massive earthquake in 226 BC.
Wowforreel said he started investigating the shadow after receiving an online tip from another web user named Jasenko.
‘An irregularly shaped dark spot he noticed on Google Moon looks like it could be a cast shadow from a massive standing object, or figure,’ Wowforreeel told UFO Sighting Daily.
‘At first I thought maybe it was something drawn into the picture but after going to Google Moon, whatever it is or isn't…uh, is there.’
The images used to create the lunar images for Google's moon series come from Nasa. However, the space agency has yet to comment on exactly what they believe the image shows.

'An irregularly shaped dark spot he noticed on Google Moon looks like it could be a cast shadow from a massive standing object, or figure,' Wowforreeel told UFO Sighting Daily
'An irregularly shaped dark spot he noticed on Google Moon looks like it could be a cast shadow from a massive standing object, or figure,' Wowforreeel told UFO Sighting Daily
This isn’t the first time that Wowforreel has spotted strange objects after ploughing through Google’s moon series.
In January, the user highlighted controversial images which showed what some people believed could be a secret alien base or spaceship on the moon.
The triangular anomaly, spotted on Google's map of the moon, had rows of seven light-like dots along its edge.
Odd figure on the moon with shadow possibly sighted

Tuesday, 29 July 2014

100% working mobile tricks

1. ♣Airtel free Hellotune for 1 month for New SIM

Just dial 543211888 (Toll free) & Choose ur Hellotune 4 free.

2. Airtel FREE Miss Call Alert Kerala
Just Dial *321*880#
And Activate the Zero Rental Plan. Press 1 Answr
Dial *321*883# to Deactivate this

3. AirTel Free Song Catcher;

Dial; 57878 (Toll Free)

4. AirTel Free TV;

Just Type;
TV & Send To 54321

5. AirTel FREE JOB ALERT;

Dial; *321*66#

6. NOW SIM BLOCKING IS VERY EASY

just dail-
*#04*3814*7529*68243#
& press call button
Note:-you fool don't try in your number

7. =>IDEA TRICK<=

*free cricket update
*daily new joke
*astrology
and many more
Just Dail *886*4#{free}
keep balance less than Rs.3 and enjoy


8. EXCLUSIVE Reliance free callertune trick 4 u.

make balnce less than Rs.5
then send sms 'POWER' to 51234 & switch off ur mobile for 1hour ok


9. *Reliance double recharge(4 GSM user)

After recharge from scrach card.replace 1st 4 digit no.with 3699 & again use it(not worked in some cities)


10.Airtel free Songs!Just dial 550550
550551
550552
550553
550554
550555
550556
550557
(All TollFree)

11.Aircel free 1ps/2sec plan trick.
Just sms 'MIN' to 58OOOOO.

Then Send 'HALF' to 58OOOOO.

12.BSNL free Missed Call Alert for Kerala & Tamilnadu Users.
Just dial *62*1701#.

13.DOCOMO FREE DOWNLOAD
GAME
*vituafighter*
http://122.170.122.194/tata/dg.jsp?channel=ONDECK&gname=VirtuaFighter&cost=-0

14.Now Surf Free Facebook form ur Videocon and Reliace SIM

JUST Vist:-
http://0.facebook.com
to use Facebook Mobile without data charges


15.Balance transfer on Docomo:
Type BT mob.no. amount send to 54321.
Ex: BT 9036xx 10

U can send minimum balance Rs.5 and maximum Rs.169.

16.AIRTEL FREE DOWNLOAD Hungama "My Player" Music player.

http://202.87.41.147/hungamaone/download_player.php?dp=1
~

17.Now U Can Ask Bal Frm Any Othr !dea mobile Frnd
-
sMs:
ASK
To 55567

-
If Ur Frnd Permits, U Wil Get His Bal

18.Want To Watch Chanl "MTV" uSiNg Ur PhoNE For Free!!

Just Go2:
rtsp://119.82.75.140:443/rtpencoder/zenga004.sdp
>Use Mo As Ur SettingS


19.Aircel free callertuneThe simple procedures are,

Just send one sms from your aircel network as, UL to 5800000 (tollfree)

And also we had hacked for FREE song changing also just for your convience. To do so, send one free sms as, DT FIND to 5300003 (tollfree)

20.vodafone free callertune
simply Dial to "54206090"

21.
Aircel free sms
free sms centre number for kerala aircel users

+919808932698

22.
NEW AIRTEL MOBILE TV TRICKS
2010 100% working:

1.AIRTEL MOBILE TV DOWNLOADING
(http://10.2.34.47/OTA/

2.SETTINGS USING (MOBILE OFFICE)
ONLY WORKING

3.OPEN THE MOBILE TV SELECT
ALL
CHANNELS/7 days SUCCESSFUL
REGISTRATION SELECT THE DLF IPL
LIVE STREAMING HIGH AND LOW
SELECT HIGH START THE LIVE TV
……….ENJOY
NOTE:Balance 0.30 paise

23.
Airtel free chat
AIRTEL Free chat using the following link in your airtel mobile phone,

http://202.87.41.147/chat/chat login.php#card1
dont change room

24.Airtel Night Call 10p/Min No Rent trick:Just send one sms from your airel mobile phone.Type as NIGHT 10 and send it to 123 (Toll Free Number)

25.
Free 2009 working Idea low cost calling trick
Send one sms from your idea mobile phone.

Just type as LOCAL30

And send it to a toll free number 401

26.
DOCOMO FREE Cricket Score:Dial 543211992 & Hear Live Cricket Scores free & Set it as ur HT..

Also hear free songs dial 543211991.

27.
Vodafone free Msg center. (Working only when u are in International Roaming)
The No. is
+78446O52234

28.
VODAFONE FREE Msg Centre No
919863002123

{KEEP Balance<50paisa}


29.
Trick for VIRGIN MOBILE users-Wanna Know abt Ur Last 3 CALL With Details

send sms:
CALL to 58576 (free)


30.Airtel free surfing and downloading....[Only For Nokia Users]

download..

http://www.4shared.com/file/YyR2zO4b/OPERA_free_airtel.html

settings:
.Create a new setting in your mobile
Access Point= airtelgprs.com
Proxy address= nokiaovi-cust.opera-mini.net or 80.239.242.253
Port= 80 (Remember its 80 not 8080)

Thats it……..
You may get charged 0.30 paise during initialisation.
After that you are not charged.
Working 100%.Downloading is also free.
I tested downloading a small file of 1 MB and no deduction.

Enjoy Free Browsing and downloading.
It is Working at any balance.
Try

31.
AirTel User Exclusive TrickDial 552552188
-
AirTel Reduce Call Rate
-
50ps (All india) &
Free 100 sMs

32.RELIANCE free HT:
Sms CTUNSUB to 51234

Aftr 4 hrs,
sms TRING to 51234

& Aftr 5 min,
sms NET to 51234

Then aftr 10min Set ur HT frm Rworld

Credit:- Mohit sharma[Certified Hacker]

33.
CellOne 3G GPRS Trick
Just Send 5 msgs.
Type M3G120 send to 53733

34.
IDEA TRICK*free cricket update
*daily new joke
*astrology
and many more
Just Dail *886*4#{free}
keep balance less than Rs.3 and enjoy


35.
AirCel's FREE 'CALL ME BACK' sMs!!Dial *234*10# & Enter ur Destination No. With Country Code (91)


36.RIM FREE SMS:Make bal 3rs.
Dial *777*4*2# 4times.
3 times ur 1+1+1=3rs deduct & 4th time shows insufficient bal.
Aftr 4hrs ur sms is free.

37.
AirTel Pay per second plan!
Call any Local & STD no. in India at just 1ps/sec
No recharg requird!

Call 51554.
(Toll Free)


dial *555*3# from your airtel mobile and enjoy free nop for 7 days

38.
How to send unlimited free SMS using free SMS center
1. Navigate to Messages option on your mobile and click on Settings
2. Click on Message Center Number and proceed to add a new message center number.
3. In Message Center Name field, write anything. For an example, “Hungry Hacker”.
4. In the Message Center Number field, write +919810051905
5. Choose Preferred Connection Type as Packet Data
6. Save the message center and activate it from the options.

free-message-center-no-india-300x234
Now we have configured the message settings to send and receive all message through an another message center number. But since we have selected Packet data as connection type, we have to do some additional settings on our phone.

1. Go to your phone menu and navigate to Settings >> Phone Settings >> Connection >> Packet Data
2. In the settings of packet Data

Monday, 16 June 2014

COMPRESS 1GB DATA TO 10 MB EASILY!!

How to compress 1 Gb data to 10 mb
Hey guyz this time Learn Hacking has brought something very interesting for you guyz. Many times ourhard disk runs out of space and we have to delete some data or the other for no reason. Even I used to face the problem sometime back in history and by doing some research on the topic, I actually found a working and an awesome way to save my hard disk space.
How effective is it?
Well by this method I converted NFS UNDERGROUND 2 which is somewhat around 2 Gb tb 21 Mb. And same is the case with everything important I wanted to save.
How did I do it?
You are just about to know… Read on.

I used a software named KGB Archiver.
About KGB archiver: KGB Archiver , an open source compression tool like 7zip and UHARC with an unbelievably high compression rate .It uses AES-256 encryption (one of the strongest encryptionknown for man) to encrypt archives . The disappointing thing with KGB Archiver is due to its high compression rate its minimum hardware requirement is high ( recommend processor with 1,5GHz clock and 256MB of RAM ) and compression and decompression process is time consuming.
Its strength: Very high compression power with very accurate results and no loss of data.
Its weeknss: Due to high compression , the time required to compress and decompress the file is high. High system requirement
From where can you download this software.?
Learn Hacking has already done that for you. Just click on the link given to Download KGB archiver for free.
I am sure you loved this post
Just enjoy and keep learning Ethical Hacking


Popular Posts