Open top menu
#htmlcaption1 SEA DICAT POSIDONIUM EX GRAECE URBANITAS SED INTEGER CONVALLIS LOREM IN ODIO POSUERE RHONCUS DONEC Stay Connected
Monday, 27 January 2014
How To Change Your IP address

IP address refers to internet protocol address; each and every system will have a unique IP address by which the location of the system can be found. We can change the IP address of our system by the following process,


Step 1. Click on "Start" in the bottom left hand corner of screen
Step 2. Click on "Run"
Step 3. Type in "cmd" and hit ok you should now be at an MSDOS prompt screen.
Step 4. Type "ipconfig /release" just like that, and hit "enter"
Step 5. Type "exit" and leave the prompt
Step 6. Right-click on "Network Places" or "My Network Places" on your desktop.
Step 7. Click on "properties

You should now be on a screen with something titled "Local Area Connection", or something close to that, and, if you have a network hooked up, all of your other networks.
Step 8. Right click on "Local Area Connection" and click "properties"
Step 9. Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab
Step 10. Click on "Use the following IP address" under the "General" tab
Step 11. Create an IP address (It doesn't matter what it is. I just type 1 and 2 until i fill the area up).
Step 12. Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.
Step 13. Hit the "Ok" button here
Step 14. Hit the "Ok" button again you should now be back to the "Local Area Connection" screen.
Step 15. Right-click back on "Local Area Connection" and go to properties again.
Step 16. Go back to the "TCP/IP" settings
Step 17. This time, select "Obtain an IP address automatically" tongue.gif
Step 18. Hit "Ok"
Step 19. Hit "Ok" again
Step 20. You now have a new IP address

With a little practice, you can easily get this process down to 15 seconds.


“This only changes your dynamic IP address, not your ISP/IP address. If you plan on hacking a website with this trick be extremely careful, because if they try a little, they can trace it back.”
This is only for educational purpose. Feel free to comment…
Read more
Saturday, 25 January 2014
no image

This is one of the simple and commonly used techniques used in olden days for chatting within a specific area for free. No internet connection is needed for this.

Step 1:- All you need is your friends IP address and your Command Prompt.
Step 2:- Open your notepad and write tis code as it is.
@echo off:
A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A3.
Step 3:- Now save this as "Messenger. Bat”.
Step 4:- Drag this file (.bat file) over to Command Prompt and press enter!
Step 5:- You would then see something like this:
MESSENGER
User:
Step 6:- After "User” type the IP address of the computer you want to contact.
Step 7:- Before you press "Enter” it should look like this,
MESSENGER
User: IP_Address User: IP_Address
Message: Hi, How are you? Message: Hi, How are you?

Step 8:- Now all you need to do is press "Enter”, and start chatting.
“This Trick Works In the LAN connection only. And may not support some latest operating Systems like Windows 7 and Windows Vista.”

Read more
no image

           Steganography is the art and science of hiding messages. Steganography is often combined with cryptography so that even if the message is discovered it cannot be read.
The word steganography is derived from the Greek words "steganos" and "graphein", which mean "covered" and "Writing." Steganography, therefore, is covered writing.

Steganography software

OutGuess is a universal steganography tool that allows the insertion of hidden information into the redundant bits of data sources. The nature of the data source is irrelevant to the core of OutGuess. The program relies on data specific
Handlers that will extract redundant bits and write them back after modification. In this version the PNM and JPEG image formats are supported. In the next paragraphs, images will be used as concrete example of data objects, though OutGuess can use any kind of data, as long as a handler is provided.

F5 is a publicly available steganography software package which hides messages in BMP, GIF, and JPG graphics.

Camera/Shy is the only steganography tool that automatically scans for and delivers decrypted content straight from the web. It is a stand-alone, Internet Explorer-based browser that leaves no trace on the user's system and has enhanced security.

JPHIDE and JPSEEK are programs which allow you to hide a file in a jpeg visual image. There are lots of versions of similar programs available on the internet but JPHIDE and JPSEEK are rather special. The design objective was not simply to hide a file but rather to do this in such a way that it is impossible to prove that the host file contains a hidden file. Given a typical visual image, a low insertion rate (under 5%) and the absence of the original file, it is not possible to conclude with any worthwhile certainty that the host file contains inserted data. As the insertion percentage increases the statistical nature of the jpeg coefficients differs from "normal" to the extent that it raises suspicion. Above 15% the effects begin to become visible to the naked eye.

MP3Stego will hide information in MP3 files during the compression process. The data is first compressed, encrypted and then hidden in the MP3 bit stream. Although MP3Stego has been written with steganography applications in mind it might be used as a copyright marking system for MP3 files (weak but still much better than the MPEG copyright flag defined by the standard). Any opponent can uncompressed the bit stream and recompress it; this will delete the hidden information (actually this is the only attack we know yet) but at the expense of severe quality loss.

Steghide is a steganography program that is able to hide data in JPG, BMP, WAV, and AU files. The color frequencies are not changed thus making the embedding resistant against first-order statistical tests.

Hydan steganographically conceals a message into an executable. It exploits redundancy in the i386 instruction set by defining sets of functionally equivalent instructions. It then encodes information in machine code by using the appropriate instructions from each set. The executable file size remains unchanged. The message is Blowfish encrypted with a user-supplied passphrase before being embedded.

We can also do this easily via command prompt as we discussed earlier, these are the list of freeware software by which we can perform additional task. This is only for educational purpose. Feel free to comment
Read more
Friday, 24 January 2014
Email hacking

How Email Works?

+ Email sending and receiving is controlled by the Email servers. All Email service providers configure Email Server before anyone can Sign into his or her account and start communicating digitally.
+ Once the servers are ready to go, users from across the world register in to these Email servers and setup an Email account. When they have a fully working Email account, they sign into their accounts and start connecting to other users using the Email services.


Email Spoofing

+ Email spoofing is the forgery of an Email header so that the message appears to have originated from someone or somewhere other than the actual source. Distributors of spam often use spoofing in an attempt to get recipients to open, and possibly even respond to, their solicitations. Spoofing can be used legitimately.
+ There are so many ways to send the Fake Emails even without knowing the password of the Email ID. The Internet
is so vulnerable that you can use anybody's Email ID to send a threatening Email to any official personnel.

Methods to send fake Emails

Open Relay Server
Web Scripts

Fake Emails: Open Relay Server

+An Open Mail Relay is an SMTP (Simple Mail Transfer Protocol) server configured in such a way that it allows anyone on the Internet to send Email through it, not just mail destined ‘To’ or ‘Originating’ from known users.
+An Attacker can connect the Open Relay Server via Telnet and instruct the server to send the Email.
+Open Relay Email Server requires no password to send the Email.

Fake Emails: via web script

+Web Programming languages such as PHP and ASP contain the mail sending functions which can be used to send Emails by programming Fake headers i.e.” From: To: Subject:”
+There are so many websites available on the Internet which already contains these mail sending scripts. Most of them provide the free service.
+Some of Free Anonymous Email Websites are:

+Mail.Anonymizer.name (Send attachments as well)
+FakEmailer.net
+FakEmailer.info
+Deadfake.com

Proving a fake Email
+Every Email carry Header which has information about the Travelling Path of the Email
+Check the Header and Get the location from the Email was sent
+Check if the Email was sent from any other Email Server or Website
+Headers carry the name of the Website on which the mail sending script was used.

Securing your Email account
+Always configure a Secondary Email Address for the recovery purpose.
+Properly configure the Security Question and Answer in the Email Account.
+Do not Open Emails from strangers.
+Do not Use any other’s computer to check your Email.
+Take Care of the Phishing Links.
+Do not reveal your Passwords to your Friends or Mates.

Hope this tutorial is useful to you. This is only for educational purpose. Feel free to comment…

Read more
Sunday, 19 January 2014
Proxy Servers

         Proxy servers can be classified of two types, they are
• Web Proxy
• Anonymous Proxy Server

Web Proxy Server
• A Proxy site is a web page which allows a user to browse other web sites.
• If an Attacker finds that he is blocked from accessing a Website, he will use any of web proxy sites to get bypass the block.



By this process you can hide your ip address from being hacked. The various websites by which you can hide your ip address are,
   1. www.hidemyass.com
   2. www.anonymizer.eu
   3. www.anonymizer.ru   and many more…

Anonymous Proxy Server
• An Anonymous proxy is a proxy server designed to protect the privacy and anonymity of web browsers from web site operators.
• In Anonymous Proxy, you get an IP Address and a Port Number. You have to configure that IP and Port with your Web Browser and you will be surfing anonymously.
Every user can hide his or her IP address through their web server by the following technique as follows; this is very simple and can be done in all web browsers,


Thus by this trick you can safe guard your IP from being hacked.

“Do not use this hack trick in any criminal activities and please do not destroy any ones account
This is for educational purpose only”.

Hope this tutorial is useful to you. Feel free to comment
Read more
Saturday, 18 January 2014
Wrapper + Removal of Trojans

A Wrapper is a program used to combine two or more executable into a single packaged program.
The wrapper attaches a harmless executable, like a game, to a Trojan’s payload, the executable code that does the real damage, so that it appears to be a harmless file.
Hackers use Wrappers to bind the Server part of the Software behind any image or any other file. Wrappers are also known as Binders.
Generally, games or other animated installations are used as wrappers because they entertain the user while the Trojan in, being installed. 
This way, the user doesn’t notice the slower processing that occurs while the Trojan is being installed on the system—the user only sees the legitimate application being installed.


Detection and Removal of Trojans

The unusual behavior of system is usually an indication of a Trojan attack. Actions/symptoms such as,
• Programs starting and running without the User’s initiation.
• CD-ROM drawers Opening or Closing.
• Wallpaper, background, or screen saver settings changing by themselves.
• Screen display flipping upside down.
• Browser program opening strange or unexpected websites
                        
         All above are indications of a Trojan attack. Any action that is suspicious or not initiated by the user can be an indication of a Trojan attack.
One thing which you can do is to check the applications which are making network connections with other computers.

        One of those applications will be a process started by the Server Trojan.
The key to prevent Trojans and backdoors from being installed on a system is not to install applications downloaded from the Internet or open Email attachments from parties you don’t know.

 Software used to find the presence of a Trojan is,
1. Process explorer
2. Anti-virus with anti-Trojan capabilities
3. TCP view.

           By these you can reduce the risk of being attacked by a Trojan. Hope this tutorial is useful to you. Feel free to comment…

Read more
Friday, 17 January 2014
Trojan

             In this tutorial we will learn about Trojan and its types and the different type of functions executed by them in a system.
A Trojan is a malicious program misguided as some very important application. Trojans comes on the backs of other programs and are installed on a system without the User’s knowledge.
Trojans are malicious pieces of code used to install hacking software on a target system and aid the Hacker in gaining and retaining access to that system.
Trojans is a program that appears to perform a desirable and necessary function, it may be software like monitoring program, system virus scanners, registry cleaners, computer system optimizers, or they may be applications like songs, pictures, screen savers, videos, etc...


Many Trojans are used to manipulate files on the victim computer, manage processes, remotely run commands, intercept keystrokes, watch screen images, and restart or shut down infected hosts.
Different Types of Trojans :-
1. Remote Administration Trojans: There are Remote Access Trojans which are used to control the Victim’s computer remotely (without any access to the computer).
2. Data Stealing Trojans: Then there are Data Sending Trojans which compromised the data in the Victim’s computer, then find the data on the computer and send it to the attacker automatically.
3. Security Disabler Trojan: There are Security software disablers Trojans which are used to stop antivirus software running in the Victim’s computer.
              
Some of the famous Trojans are as follows,
1. Beast
2. Pro Rat
3. Net Bus
4. Girl Friend
5. Sub seven… etc.
You can Google it to read more about this, you can also download these Trojans and use it on a victim’s computer, but unfortunately it’s not a freeware and most websites have banned these types of Trojans.
Trojan consists of two parts:
1. A Client component
2. A Server component.
One which resides on the Victim’s computer is called the server part of the Trojan.
One which is on the attacker’s computer is called the client Part of the Trojan. For the Trojan to function as a backdoor, the server Component has to be installed on the Victim’s machine.



              Thus these are the different types of Trojan and its function on a remote system. Hope this tutorial is useful to you…Feel free to comment…
Read more