Showing posts with label Hacking. Show all posts
Showing posts with label Hacking. Show all posts

3 Dec 2011

How to access blocked sites at School/Colleges


1st Method

I was screwing around with the command prompt one day in school, and realized I could access blocked sites, I decided to share because I like you guys.

1. Start>Run and type in cmd, if you don't have run on your start menu, read another school hacking tutorial to tell you how to access it.

2. Once your command prompt box opens, type "ping www.yoururlhere.com" (of course without the quotes.)

3.Press enter and you should see some numbers that looks like an IP address pop up, copy those numbers.

4. Open up your school internet browser, and type in those numbers that you copied in the command prompt. Now you can access your website!

2nd Method
http://www.realhide.org

Find IP Address Of An Email Sender


When you receive an email, you receive more than just the message. The email comes with headers that carry important information that can tell where the email was sent from and possibly who sent it. For that, you would need to find the IP address of the sender. The tutorial below can help you find the IP address of the sender. Note that this will not work if the sender uses anonymous proxy servers.

Finding I.P Address In Gmail

1. Log into your Gmail account with your username and password.
2. Open the mail.
3. To display the headers,
* Click on More options corresponding to that thread. You should get a bunch of links.
* Click on Show original
4. You should get headers like this:
Gmail headers : name
Look for Received: from followed by a few hostnames and an IP address between square brackets. In this case, it is
65.119.112.245.
That is be the IP address of the sender!
5. Track the IP address of the sender

Finding I.P Address In Yahoo Mail

1. Log into your Yahoo! mail with your username and password.
2. Click on Inbox or whichever folder you have stored your mail.
3. Open the mail.
4. If you do not see the headers above the mail message, your headers are not displayed. To display the headers,
* Click on Options on the top-right corner
* In the Mail Options page, click on General Preferences
* Scroll down to Messages where you have the Headers option
* Make sure that Show all headers on incoming messages is selected
* Click on the Save button
* Go back to the mails and open that mail
5. You should see similar headers like this:
Yahoo! headers : name
Look for Received: from followed by the IP address between square brackets [ ]. Here, it is 202.65.138.109.
That is be the IP address of the sender!
6. Track the IP address of the sender

Finding I.P Address In Hotmail

1. Log into your Hotmail account with your username and password.
2. Click on the Mail tab on the top.
3. Open the mail.
4. If you do not see the headers above the mail message, your headers are not displayed. To display the headers,
* Click on Options on the top-right corner
* In the Mail Options page, click on Mail Display Settings
* In Message Headers, make sure Advanced option is checked
* Click on Ok button
* Go back to the mails and open that mail
5. If you find a header with X-Originating-IP: followed by an IP address, that is the sender's IP address
Hotmail headers : name ,In this case the IP address of the sender is [68.34.60.59]. Jump to step 9.
6. If you find a header with Received: from followed by a Gmail proxy like this
Hotmail headers : name
Look for Received: from followed by IP address within square brackets[].
In this case, the IP address of the sender is [69.140.7.58]. Jump to step 9.
7. Or else if you have headers like this
Hotmail headers : name
Look for Received: from followed by IP address within square brackets[].
In this case, the IP address of the sender is [61.83.145.129] (Spam mail). Jump to step 9.
8. * If you have multiple Received: from headers, eliminate the ones that have proxy.anyknownserver.com.
9. Track the IP address of the sender

Change Your IP In Less Then 1 Minute

1. Click on "Start" in the bottom left hand corner of screen
2. Click on "Run"
3. Type in "command" and hit ok
You should now be at an MSDOS prompt screen.
4. Type "ipconfig /release" just like that, and hit "enter"
5. Type "exit" and leave the prompt
6. Right-click on "Network Places" or "My Network Places" on your desktop.
7. Click on "properties"
You should now be on a screen with something titled "Local Area Connection", or something close to that, and, if you have a network hooked up, all of your other networks.
8. Right click on "Local Area Connection" and click "properties"
9. Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab
10. Click on "Use the following IP address" under the "General" tab
11. Create an IP address (It doesn't matter what it is. I just type 1 and 2 until i fill the area up).
12. Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.
13. Hit the "Ok" button here
14. Hit the "Ok" button again
You should now be back to the "Local Area Connection" screen.
15. Right-click back on "Local Area Connection" and go to properties again.
16. Go back to the "TCP/IP" settings
17. This time, select "Obtain an IP address automatically"
tongue.gif 18. Hit "Ok"
19. Hit "Ok" again
20. You now have a new IP address
With a little practice, you can easily get this process down to 15 seconds.

Warning: 
This only changes your dynamic IP address, not your ISP/IP address. If you plan on hacking a website with this trick be extremely careful, because if they try a little, they can trace it back

18 Nov 2011

How to detect invisible Yahoo Messenger users


Locate the widget More Hacking

Just below the header in the right hand side of the home page locate this block.ym step 1

Sign in to your Yahoo account

Move your mouse over 'Messenger'. Did you see the animation? Yup, the default buddy icon removing the mask and revealing himself.


Now sign in using your yahoo username and password.
ym step 2

Check the status, see who is hiding

After you are redirected to the yahoo homepage, move your mouse over 'Messenger' to see how many of your friends are really online (including the ones signed in to his mobile device with status I'm on SMS) and how many are really offline. In my case I found 6 of my friends were online though my messenger showed 4 !! So its pretty simple to understand 2 were trying to hide from me i.e. they are in invisble mode!!

Also note that using this built-in feature you can check your inbox from the MAIL tab (note the tab that says 1 New), tune in to a radio station, check your local weather, find a local address or even check your horoscope! Isn't that great?


More Hacking

ym step 3

Facebook Safety Tips To Check Who Is Hacking Into Your Facebook Account


Population of Facebook is growing and is multiplying fast. And hackers, spammers, intruders now treats the platform as a heaven for dirty web activities. More often than not users complain heavily about their accounts getting hacked, stolen or compromised resulting into serious personal issues. That’s because Facebook users tend to share lot of personal information, do whole lot of social activities feeling it as a safe and secured environment. What the users do not care about is the need to safeguard their account properly from time to time. 

More Hacking

In an earlier post we discussed about generating strong passwords which are easy to remember. Remember that’s the first step of building a safe and secured account. Next step is to change the password from time to time.

Here are two vital Facebook safety tips to see who is intruding into your Facebook account.

Just like Gmail, Facebook also gives the power to the users to locate any unusual activities. I will write it step wise so that it looks uncomplicated even to a dummy user.
  1. Log in to your Facebook account.
  2. On the top right hand side of the page locate Account > Account Settings or simply click on this link: https://register.facebook.com/editaccount.php?ref=mb&drop
  3. In the bottom of the page locate Account Security
  4. Click on the change link
    Important!! (refer to screenshot below)
  5. In the Login Notifications section, make sure Get notified by SMS or email… option is set On
  6. Underneath, you will also find the devices that you have associated with your account. If you haven’t associated any devices yet, make sure you do that.
  7. Lastly, in the Most Recent Activity section see the IP address, browser, OS of the user(s) who has last accessed your Facebook account. If something doesn’t sound familiar with you, take a deep breath and check out this Facebook page in the Help Center.
Advanced Facebook Privacy Feature To See Who Is Logging Into Your Facebook Account
If you find this tip useful, Comment, and keep checking this site for more info.

More Hacking



How to run Multiple G Talk messengers at the same time?

googletalk nomutex
You may wish to be online with your multiple GTalk accounts. That means you need to run multiple instances of GTalk at the same time. But how do you do that? Follow the following simple steps:
  1. Locate you GTalk shortcut. You should be able to find it in your desktop itself. If you deleted it go to Program Files, locate the googletalk.exe inside the Google folder, right click it and Send to Desktop.
  2. Right click the shortcut icon and locate the ‘Target’ input box.
  3. At the end of the input box type /nomutex
    (example: “C:\Program Files\Google\Google Talk\googletalk.exe” /nomutex)
Google Talk properties
Now create as many instances of GTalk as you wish to :D ! 

More Hacking


17 Nov 2011

How to Recover Hacked Email Accounts?



It can be a real nightmare if someone hacks and takes control of your email account as it may contain confidential information like bank logins, credit card details and other sensitive data. If you are one such Internet user whose email account has been compromised, then this post will surely help you out. In this post you will find the possible ways and procedures to get back your hacked email account.

For Gmail:

It can be a big disaster if your Gmail account has been compromised as it may be associated with several services like Blogger, Analytics, Adwords, Adsense, Orkut etc. Losing access to your Gmail account means losing access to all the services associated it with too. Here is a list of possible recovery actions that you can try.

More Hacking

Step -1: Try resetting your password since it is the easiest way to get your account back in action. In this process Google may ask you to answer the secret question or may send the password reset details to the secondary email address associated with your compromised account. You can reset you password from the following link
If you cannot find success from the Step-1 then proceed to Step-2.
Step-2: Many times the hacker will change the secret question and secondary email address right after the account is compromised. This is the reason for the Password Reset process to fail. If this is the case then you need to contact the Gmail support team by filling out the account recovery form. This form will ask you to fill out several questions like
1. Email addresses of up to five frequently emailed contacts
2. Names of any 4 Labels that you may have created in your account
3. List of other services associated with your compromised account
4. Your last successful login date
5. Account created date
6. Last password that you remember and many more…
You need to fill out this form as much accurately as possible. It is obvious to forget the dates of last login, account creation and similar terms. However you need to figure out the closest possible date/answers and fill out this form. This is your last chance! The more accurate the information filled out in the recovery form, the more the chances of getting your account back. You may reach the account recovery page form the following link

For Yahoo and Hotmail:

Unfortunately for Yahoo/Hotmail there is no second option like filling out the form or contacting the support team. All you need to do is either answer the secret questions that you have setup or reset the password using the secondary email option. 
To initiate the password reset process just click on the Forgot password link in your login page and proceed as per the screen instructions.
I hope this post will help you recover the lost account.

More Hacking

How to Install Windows 7 From a USB Drive



Installing Windows from a USB flash drive has several advantages – First of all, the overall speed of the installation process will increase significantly, carrying a USB stick is much more convenient than a DVD, and finally it becomes possible to install the OS even on those systems that do not have a DVD drive, such as a netbook.
In this post, I will show you how to load the Windows installation on to your USB flash drive and make it bootable just like the DVD.

More Hacking

Tools Required:
1. USB flash drive with a minimum capacity of 4 GB.
2. Windows 7 set-up DVD.
Step-1: Plug-in your USB flash drive and backup all the existing data in it.
Step-2: Open the command prompt. If you are using Windows 7/Vista then open it with administrator rights*.
* Goto Start -> All Programs -> Accessories -> Right-click on “Command Prompt” and select “Run as Administrator”.
Step 3: In the command prompt, type in the following command:

DISKPART
This will start the Microsoft DiskPart utility as shown below:
Now issue the following command:

LIST DISK


This will show you a list of  available disks on your system. Disk 0 is usually the hard disk. In my case, Disk 5 is the USB drive (this can be a different one in your case). Now issue the command as shown below:


SELECT DISK 5

NOTE: In the above command, 5 is the USB drive number on my system. If you have a different number on your system, then you need to replace 5 with that number.
Step-4: Now issue the following list of commands one by one as shown below:
CLEAN
CREATE PARTITION PRIMARY
SELECT PARTITION 1
ACTIVE
FORMAT FS=NTFS QUICK
ASSIGN
EXIT


Minimize the command prompt and proceed to the next step.
Step 5: Insert the Windows 7/Vista installation disc and note down the “drive letter” of your DVD drive. In my case, it is “H:”. Now type the following list of commands as shown below:
H: CD BOOT
CD BOOT
BOOTSECT.EXE /NT60 M:(NOTE: M: is your USB drive letter)
EXIT


 
Step-6: Copy the contents of your Windows 7/Vista installation disk into the USB flash drive.
That’s it! Your USB stick is now ready to boot and install the OS for you. Don’t forget to enable the “USB Boot” option and change the “boot priority to USB device from hard disk” in your BIOS settings.
I hope you like this post. Pass your comments to express your opinion. :)

More Hacking

How to Hide Data in Image, Audio & Video Files: Steganography


Ever wondered to know how to hide secret messages in images, audio and video files? Well, in this post I will take you through a concept called steganography using which, it is possible to hide your secret information in image files, songs or any other file of your choice. At the end of this post, you can also download free stegnographic tools and start hiding your data.

What is Steganography?

Steganography is a means of obscuring data where secret messages are hidden inside computer files such as images, sound files, videos and even executable files so that, no one except the sender and the receiver will suspect the existence of stealth information in it. Steganography may also involve the usage of cryptography where the message is first encrypted before it is concealed in another file. Generally, the messages appear to be something else such as an image, sound or video so that the transfer of secret data remains unsuspected.
The main advantage of steganography over other methods such as cryptography is that, it will not arose suspicion even if the files fall in the hands of a third party. Unlike cryptographic messages, stegnographic messages will no way attract the attention of a third party by themselves. Thus stegnanography has an upper hand over cryptography as it involves both encryption and obscurity.

More Hacking

What are the Applications of Steganography?

Steganography is mainly used to obscure confidential information/data during storage or transmission. For example, one can hide a secret message in an audio file and send this to another party via email instead of sending the message in the textual format. The receiver on the other end will decrypt the hidden message using the private decryption key. In a worst case scenario, even if a third party does manage to gain access to the email, all he can find is the audio file and not the hidden data inside it. Other usage of steganography include digital watermarking of images for reasons such as copyright protection.
Eventhough steganography has many useful applications, some may use this technique for illegitimate purposes such as hiding a pornographic content in other large files. Roumors about terrorists using steganography for hiding and communicating their secret information and instructions are also reported. An article claiming that, al-Queda had used steganography to encode messages in images and transported them via e-mails, was reported by New York Times, in October 2001.

How do Steganography Tools Work?

Stegnography tools implement intelligent algorithms to carefully embed the encrypted text messages or data inside other larger files such as an image, audio, video or an executable file. Some tools will embed the encrypted data at the end of another file so that there will be enough room for storing larger data.
There are many steganography tools available online but only a few are able to work flawlessly. I did not find any tool that worked perfectly on both small and large data. However I have  managed to develop my own tool that can work perfectly on all types of files and all size of data. The tool is called “Stego Magic“. You can download it from the following link.
Download Stego Magic
The zip file contains two versions of Stego Magic: One for encrypting the text messages and the other for encrypting binary files. StegoMagic_TXT can be used to hide text messages in other files such as an image or a sound file. StegoMagic_BIN can be used to hide one binary file in another such as an executable file inside an image or an image inside a video file.
With Stego Magic, there is no limitation on the size and type of the file that you are intending to hide. For example, you can hide a video of size 1 GB in an image of size 1 MB or hide an executable file inside a WORD document. The tool is pretty straightforward to use and requires no special understanding of the concept.

More Hacking

At the end of the encryption process, a secret decryption key will be generated and the same is required during the decryption process.

How to Use Stego Magic?

Suppose you want to hide a text message inside a JPG file:
1. Place the JPG and the text file (.txt) in the same folder as that of StegoMagic_TXT.exe
2. Run StegoMagic_TXT.exe and follow the screen instructions to embed the text message inside the JPG image.
3. Note down the secret decryption key.
Now you can send this image to your friend via email. To decrypt the hidden message, your friend should load this JPG file onto the Stego Magic tool and use the secret decryption key.
I hope you enjoy this post :)For queries and feedback, please pass your comments.

16 Nov 2011

Don’t get hacked!


We always end up in saying this work is not so easyespecially when we have little experience in particular work. This is a typical human psychology though I am not writing any article on psychology. Probably this might be the reason which made me to write this article after quite a long gap. Before getting into the core of this discussion, I strongly apologize all the tech geeks for using very little technical details. Of course my intention is to reach even non-technical person using internet for his/her own benefits.
Here we go.  What is HACKING?
I suggest you to look into dictionary to get its meaning. Because it’s literal meaning has been corrupted and exploited by some people engaged in antisocial and destructive work in the name of HACKERS.Most of us fail to recognize the fact that criminals and hackers are two totally different things.Hackers in reality are actually good and extremely intelligent people who by using their knowledge in a constructive manner help organizations, companies, government, etc. to secure documents and secret information on the internet.
Hacking
Here comes into picture the concept of ETHICAL HACKING. Let us follow the same analogy from here on. Ethical Hacking means testing the resources for a good cause and for the betterment of technology. Technically Ethical Hacking means penetration testing which is focused on Securing and Protecting IT Systems.
Prevention from Hacking:
It’s impossible to overcome all possible vulnerabilities of your system.You can’t plan for all possible attacks, especially the ones that are currently unknown which are called Zero Day Exploits.These are the attacks which are not known to the world. However in Ethical Hacking, the more combinations you try, the more you test whole system instead of individual units — the better your chances of discovering vulnerabilities.As the saying goes “In order to catch the thief, you need to think like a thief”, prevention can be possible only when you are aware of the STEPS PERFORMED BY HACKERS.
steps
Reconnaissance: It can be described as the pre-attack phase and is a systematic attempt to locate, gather, identify, and record information about the target.
Scanning: This phase involves taking the information discovered during reconnaissance and using it to examine the network.
Gaining access: This is the phase where the real hacking takes place. Vulnerabilities discovered during the reconnaissance and scanning phase are now exploited to gain access.
Maintaining access: Once a Hacker has gained access, they want to keep that access for future exploitation and attacks.
Clearing tracks: In this step, hackers cover their tracks to avoid detection by security personnel, to continue to use the owned system, to remove evidence of hacking, or to avoid legal action.

More Hacking

Hacking, being the wide concept I wish to discuss only few common ways through which internet users are being attacked and possible security measures to prevent it to certain extent. The whole discussion can be divided under 2 main categories.
1. Email Hacking:
The most effective and easiest way to trace an email is to analyze its email headers. This can be done by just viewing the full header of received email.
1.1 Fake mail: Web Programming languages such as PHP and ASP contain the mail sending functions which can be used to send emails by programming Fake headers i.e.” From: To: Subject:”. There are so many websites available on the Internet which already contains these mail sending scripts. Most of them provide the free service. You can just google it and use it to send fake mails.
1.2 Email password Hacking (Phishing): It is not so easy to compromise with the email servers like Yahoo, Gmail, etc. It can be accomplished via some of the client side attacks, one such is phishing. It is a way of attempting to acquire information such as usernames, passwords, and credit card details by pretending as a trustworthy entity in an electronic communication.
Suspicious acts:
  • Email inviting you to join a social group, asking you to login using your username and password.
  • Email saying that your bank account is locked and sign in to your account to unlock it.
  • Email containing some information of your interest and asking you to login to your account.
  • Any email carrying a link to click and asking you to login.
Security measures:
  • Read all the email carefully and check if the sender is original.
  • Watch the link carefully before clicking.
  • Trace back all your mails which you find suspicious. ( Header verification)
  • Always check the URL in the browser before signing in to your account.
  • Always login to your accounts after opening the trusted websites, not by clicking in any other website or links coming through any other email.
2. Windows Hacking:
Windows is the most commonly used operating system in our country. Thus it is essential to take care of attacks that are being done on your system without your conscious. Let us consider one of the most useful utility of windows called SAM,Security Accounts Manager which is a database in the windows operating system (OS) that contains user names and passwords. SAM is part of the registry and can be found on the hard disk.  When you create a new user account with a password, it gets stored in the SAM file. Windows Security Files are located atC:\Windows\System32\Config\SAM”. The moment operating system starts, the SAM file becomes inaccessible. User account passwords are contained in the SAM in the hexadecimal format called Hashes. Once the Passwords converted in Hashes, you cannot convert back to the clear text.
2.1 Windows password cracking: Windows password stored in SAM file in the form of hashes can be reset using Net User Username * command in the command prompt. After entering the command you can either leave blank to erase SAM file entry or you can enter new password.
The Commands are as follows:
  • To check the User Accounts: Net User
  • To Add a New User Account: Net User Username Password /add
  • To Delete a User Account: Net User Username /delete
  • To Change the Password of User Account: Net User Username *
Apart from this, it is also possible to crack passwords using brute force techniques, which is an act of guessing passwords in random manner. However there are tools available to perform these Brute force attacks on the Windows SAM File. Most famous tool available for Windows User Account Password Brute forcing is Cain and Abel. Another one is SamInside.
2.2 Creating Hidden accounts:
Use the Net User Command to Create a Hidden Account in Windows:
Net User Hiddenuser /add
And then use the Command: Net Localgroup Users Hiddenuser /delete
Log off the current User, Press ALT+CTRL+DEL combination 2 times to get the ‘Classic Windows User Login Screen’. Type the Username as Hiddenuser and Hit Enter, you will get Logged In
2.3 Key loggers: You must be careful while using other’s computer or browsing in internet cafĂ©. There might be chances of recording your sensitive information such as passwords, credit card info etc. which you type using keyboard. This can be using special purpose software called key loggers.
2.4 Hiding files behind folders:
You can hide your important Files behind the Folders in your Hard Disk. Let us say we have a text file ‘Secret.txt’ and a folder ‘C:\Info’. To hide the text file behind the folder, command is as follows
Type Secret.txt > C:\Info:Secret.txt
Now delete the Original File, to view the hidden file, command is as follows Start C:\Info:Secret.txt
  • To search the hidden files, ADS Tool ‘Streams’ can be used.
  • To Search the Hidden Files: Streams –S C:\Info
  • To Delete the Hidden Files: Streams –D C:\Info
Security measures:
  • Configure strong login password: d54$@[a]
  • Change your passwords regularly.
  • Check for installed key loggers.
  • Configure syskey security: start > run > syskey
  • Check for hidden user accounts:  Net User
  • Change boot sequence order in BIOS: Hard Disk First Boot Device
  • Set password for BIOS setup: Any strong password
  • Physically secure your computer: Lock your cabinet (If possible)
Hacking is evolving over days and time to time. Hence it takes gb’s of documents to explain about hacking.  It’s just my attempt to make you aware of few basic concepts and terms which you come across in your daily life without your conscious. Here by I wish to end up my discussion hoping to see smile on your face.  Happy learning!!

More Hacking

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | Facebook Themes
/*Killer-Sudoku*/