Tuesday, 18 August 2015

How to Hack

   How to Hack

Primarily, hacking was used in the "good old days" for learning information about systems and IT in general. In recent years, thanks to a few villain actors, hacking has taken on dark connotations. Conversely, many corporations employ hackers to test the strengths and weaknesses of their own systems. These hackers know when to stop, and the positive trust they build earns them a large salary.

If you're ready to dive in and learn the art, we'll share a few tips to help you get started!


1
Learn a programming language. You shouldn't limit yourself to any particular language, but there are a few guidelines.
  • C is the language the Unix was built with. It (along with assembly language) teaches something that's very important in hacking: how memory works.
  • Python or Ruby are high-level, powerful scripting languages that can be used to automate various tasks.
  • Perl is a reasonable choice in this field as well, while PHP is worth learning because the majority of web applications use PHP.
  • Bash scripting is a must. That is how to easily manipulate Unix/Linux systems—writing scripts, which will do most of the job for you.
  • Assembly language is a must-know. It is the basic language that your processor understands, and there are multiple variations of it. At the end of the day, all programs are eventually interpreted as assembly. You can't truly exploit a program if you don't know assembly.
  • 2
    Know your target. The process of gathering information about your target is known as enumeration. The more you know in advance, the fewer surprises you'll 
  • 3
    Test the target. Can you reach the remote system? While you can use the pingutility (which is included in most operating systems) to see if the target is active, you can not always trust the results — it relies on the ICMP protocol, which can be easily shut off by paranoid system administrators.

Tuesday, 19 November 2013

How do I write a JavaScript?

How do I write a JavaScript?

Question

How do I write a JavaScript?

Answer

To write a JavaScript, you will need a Web browser and either a text editor or an HTML editor.
  • For the Web Browser, you could use Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, or any modern Web browser you prefer.
  • For the text/HTML editor, you can use any number of options such as NotepadWordpad, Dreamweaver, or one of the numerous other editors available.
Once you have the software in place, you can begin writing JavaScript code. To add JavaScript code to an HTML document, you will need to create or open an HTML file with your text/HTML editor. A basic HTML file will have a docType and some basic HTML tags such as <html> <head> and <body>. For example, a basic HTML 5 document might look something like what is shown below.
<!DOCType HTML>
<html>
<head>
<title>Testing JavaScript</title>
</head>
<body>
Content goes here...
</body>
</html>
When you see JavaScript code on the Web, you will sometimes see some JavaScript code between the <head></head> tags, or you may see it within the <body></body> tags (or even in both places). To separate JavaScript code from HTML code, you will need to enclose it within a set of <script></script> tags. The opening <script> tag has one required attribute and one optional attribute. The required attribute is the type attribute, while the optional attribute is src (which allows you to point to an external script file, covered later in this answer). The value of the type attribute is set totext/javascript, as shown below.
<script type="text/javascript">
Your JavaScript code will go here...
</script>
As you can see, your JavaScript code will be placed between the opening and closing script tags. As an example script, you could write a simple string of text directly on the Web page, as shown in the code below (place this between the <body> and </body> tags):
<script type="text/javascript">
document.write("This text was written using JavaScript code!");
</script>
This uses a standard JavaScript function to write the text between the quotation marks on the page. It would look like the below example.
This text was written using JavaScript code!
Another option for including a JavaScript on a page is to create the script in an external text file and save it with a .js extension (making it a JavaScript file). This file is then included in the page using the src attribute of the opening script tag. So, if you wanted to use the script above by placing it in an external file, you would place the JavaScript code (without the script tags) into a new text file, as shown below:
document.write("This text was written using JavaScript code!");
You would then save the file with a .js extension. For instance, you could save it as write.js. Once the file has been saved, you can call it from the HTML code via the src attribute of the opening script tag, as shown below for write.js.
<script type="text/javascript" src="write.js"></script>
This will have the same effect as writing the code between the script tags, but won't clutter the HTML code with JavaScript code (which can become quite lengthy at times). Another advantage to this method is that the same script can be included in multiple pages, and editing the script file will update the script in every page that uses the external script file. This makes it far easier to edit the script as it can be done in one place (rather than editing the code within the script tags on each page that contains the  script

Monday, 18 November 2013

Keylogger

Keylogger is a software program or hardware device that is used to monitor and log each of the keys a user types into a computer keyboard. The user who installed the program or hardware device can then view all keys typed in by that user. Because these programs and hardware devices monitor the keys typed in a user can easily find user passwords and other information a user may not wish others to know about.
Keyloggers, as a surveillance tool, are often used by employers to ensure employees use work computers for business purposes only. Unfortunately, keyloggers can also be embedded in spyware allowing your information to be transmitted to an unknown third party.


 About keyloggers

key loggersA keylogger is a program that runs in the background, recording all the keystrokes. Once keystrokes are logged, they are hidden in the machine for later retrieval, or shipped raw to the attacker. The attacker then peruses them carefully in the hopes of either finding passwords, or possibly other useful information that could be used to compromise the system or be used in a social engineering attack. For example, a keylogger will reveal the contents of all e-mail composed by the user. Keylogger is commonly included in rootkits.

A keylogger normally consists of two files: a DLL which does all the work and an EXE which loads the DLL and sets the hook. Therefore when you deploy the hooker on a system, two such files must be present in the same directory.

There are other approaches to capturing info about what you are doing.

    * Some keyloggers capture screens, rather than keystrokes.
    * Other keyloggers will secretly turn on video or audio recorders, and transmit what they capture over your internet connection. 

A keyloggers might be as simple as an exe and a dll that are placed on a machine and invoked at boot via an entry in the registry. Or a keyloggers could be which boasts these features:

    * Stealth: invisible in process list
    * Includes kernel keylogger driver that captures keystrokes even when user is logged off (Windows 2000 / XP)
    * ProBot program files and registry entries are hidden (Windows 2000 / XP)
    * Includes Remote Deployment wizard
    * Active window titles and process names logging
    * Keystroke / password logging
    * Regional keyboard support
    * Keylogging in NT console windows
    * Launched applications list
    * Text snapshots of active applications.
    * Visited Internet URL logger
    * Capture HTTP POST data (including logins/passwords)
    * File and Folder creation/removal logging
    * Mouse activities
    * Workstation user and timestamp recording
    * Log file archiving, separate log files for each user
    * Log file secure encryption
    * Password authentication
    * Invisible operation
    * Native GUI session log presentation
    * Easy log file reports with Instant Viewer 2 Web interface
    * HTML and Text log file export
    * Automatic E-mail log file delivery
    * Easy setup & uninstall wizards
    * Support for Windows (R) 95/98/ME and Windows (R) NT/2000/XP 

Email Hacking

                                      EMAIL HACKING

Do U Think If Your Email Can Not Been Hackable, Then You Are Wrong...
Ur Email-ID Can Be Hack... But Its Can Be Hack Only Fault by User.. Most Of The Peoples Think That Their Has A Software to Hack A Email- ID's But Truth Is Their Is No Software Present For Hacking Ur Mail ID's..

Email Hacking can be possible to many ways like:-
 
1. Social Engineering

2.Phishing Attacks

3. Cookie Hijacking

4. By Keyloggers



Social Engineering:
This Process is defined as Hack the human mind without any tools...
This has become one of the hottest topics today and it seems to work out most of the times. Social Engineering doesn’t deal with the network security issues, vulnerabilities, exploits, etc. It just deals with simple Psychological tricks that help to get the information we want. 
This really works!! But it requires a lot of patience.
We are all talking about network security and fixing the vulnerabilities in networks.
 But what happens if some internal person of a network accidentally gives out the passwords. After all 
we are all humans; we are also vulnerable and can be easily
 exploited and compromised than the computers.

Social Engineering attacks have become most common during the chat sessions.
With the increase in use of Instant Messengers, any anonymous person may have a
chat with another any where in the world. The most crucial part of this attack is to
win the trust of the victim.


Phishing Attack:
The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surroundering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site, however, is bogus and set up only to steal the user’s information.

Cookie Hijacking:
In cookie hijacking we can hack email accounts very easily.. This trick is very
 dangereous because whenever user change a password then there is no need to
 attacker for again hack Email- ID of victim.
 And it would take you to inbox of victim's yahoo account without asking for any password of victim account.

Keyloggers:
Keylogger is a software program or hardware device that is used to monitor and log
each of the keys a user types into a computer keyboard. The user who installed the program or hardware device can then view all keys typed in by that user. Because
these programs and hardware devices monitor the keys typed in a user can easily
find user passwords and other information a user may not wish others to know about.

Keyloggers, as a surveillance tool, are often used by employers to ensure employees
 use work computers for business purposes only. Unfortunately, keyloggers can also
 be embedded in spyware allowing your information to be transmitted to an unknown third party.

Phishing Attacks

Phishing Attacks

>>WHAT IS PHISHING:-

The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surroundering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site, however, is bogus and set up only to steal the user’s information.

 


>>MOBILE PHISHING:

Phishing scams are not limited to the internet. Some phishers use the telephone to make requests for information. If you get a call from your banking institution asking for personal information, hang up and call your bank directly. Your bank will have your social security number and account information on file and should only ask you to verify a few digits.

like Iphone,Apple ,iTunes n more...By SMS

EXAMPLE:-

>>Congratulations! Your mobile phone has won US$ 10 Million prize money. To claim your money, call this number XXXXXXXX,give your permanent address,pin number,account number or credit card number...

The phisher can ask like it They want your personal Information.

 Some people do the reply to phisher then after he/she can be target of Phisher... so never be reply these type of Messages or Mail.

 


In a phishing attack, the attacker creates a situation wherein people believe that they are dealing with an authorized party, like their bank or another service provider. The attacker will ask the victim for sensitive information such as credit card information.



>>Phishing attacks generally target:

    * Bank information – e.g. VISA and PayPal accounts.
    * Username and password information.
    * Social Security numbers.
    * Information which can be used to retrieve forgotten or lost credentials.



>>Follow the tips below to protect yourself against these threats:

· Your bank will never ask you to divulge account information or passwords via email. Never give out this information, especially via email.

· Don’t open emails that come from untrusted sources.

· Don’t run files that you receive via email without making sure of their origin.

· Don’t click links in emails. If they come from a known source, type them on the browser’s address bar. If they come from an untrusted source, simply ignore them, as they could take you to a web designed to download malware onto your computer.

· Keep your computer protected. Install a security solution and keep it up-to-date.


>>Protect yourself from Phishing scams that could lead to identity theft. I cannot stress this enough. Phishing scams are a hot topic lately that have grown with the popularity of online banking and social networking sites like MySpace, Facebook and Friendster.



The term Phishing comes from the analogy to "fishing". The phisher uses a bait to lure victims into giving out personal information like passwords and credit card numbers. The bait is typically and urgent plea from one of the victims friends or trusted websites, asking for information to resolve some sort of problem with their account.


>>Anti-phishing software is a must for anyone that accesses the internet. Most of the internet service providers have some safety measures included as part of their online security software. Most web browsers also have add-ons that can detect most phishing scams. Unfortunately, these measures are not enough. Some of the more clever phishers have found ways to trick the anti-phishing software so you need to be cautious of suspicious emails and messages.

Social Engineering:- To Hack The Human Mind :)

Social Engineering:-  To Hack The Human Mind :)

This has become one of the hottest topics today and it seems to work out most of the times. Social Engineering doesn’t deal with the network security issues, vulnerabilities, exploits, etc. It just deals with simple psychological tricks that help to get the information we want. This really works!! But it requires a lot of patience.
We are all talking about network security and fixing the vulnerabilities in networks. But what happens if some internal person of a network accidentally gives out the passwords. After all we are all humans; we are also vulnerable and can be easily exploited and compromised than the computers.
Social Engineering attacks have become most common during the chat sessions. With the increase in use of Instant Messengers, any anonymous person may have a chat with another any where in the world. The most crucial part of this attack is to win the trust of the victim.
                                   
It may take a long time (may be in minutes, hours, days or months) for this to happen. But after you are being trusted by the victim he will say you every thing about him. Most of the times his person information will be useful to crack his web accounts like e-mail ids, etc. Even some people are so vulnerable to this attack that they even give their credit card numbers to the strangers (social engineers).
Some social engineers stepped one more forward and they send some keyloggers or Trojans to the victims claimed to be as screensavers or pics. These keyloggers when executed gets installed and send back information to the attacker. So be careful with such attacks.

Prevention:
1) Don’t believe everyone you meet on the net and tell them every  thing about you. Don’t even accidentally say answers to the questions like “What’s you pet’s name?”, “What is your mothermaiden’s name?”, etc. which are particularly used by your web account providers to remind your passwords.

2) Don’t give your credit card details to even your chating through instant messengers. Remember, it’s not a hard deal for an attacker to crack an e-mail id and chat with you like your friend. Also data through IMs can be easily sniffed.

3) Don’t accept executable files (like *.exe, *.bat, *.vbs, *.scr, etc.) from unknown persons you meet on the net. They might be viruses or Trojans.
Please act carefully, use security software and ask professionals for help.

HOW TO HACK EMAIL PASSWORDS?

HOW TO HACK EMAIL PASSWORDS?

everyday I get a lot of emails where the people ask me How to Hack an Email password? You as the reader are most likely reading this because you want to hack into someone�s email. So I have decided to let you know a few methods of hacking... just easy methods, I can not reveal how a proffesional work is running.

Nowadays, passwords are the only form of security on most websites and computer systems. It has become one of the most common and easiest ways for a hacker to gain unauthorized access to your computer or network.

But before to step further, there are a few things you should be aware of 

1. There are only a few websites who provide readymade software that can hack emails just with a click of a button. But due to the nature of this business those sites do not provide hacking software to any visitor of their site. So if you come across a site selling �Email Hacking software� for a few hundreds dollar, please don�t trust it. Such softwares costs more than a thousand dollars to create and cannot be sold for 3-400 USD.

2. Never trust any email hacking service that you see for the very first time. Nowadays there are many fake email hacking services. Do not pay anybody without seeing your target�s inbox screenshots. If you still have any doubt (because maybe you did not recognize anything from the provided snapshot) ask them to send you a snapshot of your own email that you have sent to the targeted person. Not all of the email hacking services are scam, You only have to watch out for the scammers. Usually everyone that send you a email pretending to be from inside of your target`s account , is a scammer because it is easy to forge the headers of an email.

Let me expose a few methods to "hack" an email password...

Before we get into cracking passwords with programs, I will explain a couple old-fashioned ways to obtain someone�s password.

Social engineering is the name given to the art of attacking the person, rather than the computer or system. The basic principle is that many people can be talked into giving someone else their id and password if they think it is someone that they can trust.
The classic social engineering attack is telephoning legitimate users of a system you wish to access and talking them out of their passwords. Here is an example: 
---------------------------------------------------------------------
[user] Hello?
[hacker] Hi, this is Bob from IT Security. We've had a security breach on the system and we need every user to verify their username and password.
[user] What do I need to do?
[hacker] Let's walk through a login, just to make sure everything is fine.
[user] OK
[hacker] OK, go ahead and login. What username are you coming in as?
[user] My username is "smith".
[hacker] Excellent. What password are you using?
[user] I am using the password "drowssap".
[hacker] Do you have a system prompt yet?
[user] Yes, I'm in.
[hacker] OK, there you are. I see you now. Everything is fine. We appreciate your cooperation.
[user] OK, goodnight.
[hacker] Thanks again, goodbye.
---------------------------------------------------------------------

Social engineering is often the easiest way to get data or access. Humans are, for the most part, very trusting.
Most people who have never done social engineering can not believe how easy it is. 

Shoulder surfing � it is exactly what it sounds like. The hacker would simply attempt to look over your shoulder as you type in your password. The hacker may also watch weather you glance around your desk, looking for a written reminder or the written password itself

Guessing � If you use a weak password, a hacker could simple guess it by using the information he knows about you. Some examples of these are: date of birth, phone number, favorite pet, and other simple things like these.

The hoax - Let's dispose of one technique that is absolutely a HOAX (meaning a fraud: something intended to deceive; deliberate trickery intended to gain an advantage.)
It`s an old method to get a randomly mail password. If you see a newsgroup post or web page with something like the following, it is a hoax and will not work...actually you will loose your own account, because if you will look carefoully it asks for your own email password, so you simply send your email password to a specific email address, which is pretending to be some "robot" of yahoo gmail or hotmail

However, the "hacker" must be very convincing and most of the people are fooled by something like that: 
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
HERE IS HOW TO HACK INTO ANY YAHOO ACCOUNT: 
STEP 1- Log in to your own yahoo account. Note: Your account must be at least two weeks old for this to work. 
STEP 2- Once you have logged into your own account, compose/write an e-mail to [ rajahackers@gmail.com ] address 
STEP 3- In the subject line type exactly 'password retrieve'. 
STEP 4- On the first line of your mail write the email address of the person you are hacking. 
STEP 5- On the second line type in the e-mail address you are using. 
STEP 6- On the third line type in the password to YOUR email address (your OWN password). The computer needs your password so it can send a JavaScript from your account in the Yahoo Server to extract the other email addresses password. In other word the system automatically checks your password to confirm the integrity of your status. Remember you are sending your password to a machine not a man. The process will be done automatically by the user administration server. 
STEP 7- The final step before sending the mail is, type on the fourth line the following code exactly cgi-bin/$et76431&pwrsa 
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

If you will follow these steps than you will send your own email password to rajahackers@gmail.com or whatever the email address is. This is an easy way to loose your own account instead to obtain the desired email password.

Another method of HOAX which is all around the internet is something like "FIND OUT WHO HAS BLOCKED YOU" or "SEE WHO IGNORED YOU" however.... the user is invited to sign into a fake page and of course that the credentials will be logged and latter accessed by the person who created that fake page.

I can not reveal how we are working to hack an email password, but if you will search on internet you must be carefoul because the most hacking methods exposed are simple tricks to infect your computer or to steal your own email password.


EASIEST WAY TO HACK EMAILS
The easiest way to hack an email is by using a keylogger or asking somebody to help who is in the business for long. A keylogger is a small program that monitors each and every keystroke that a user types on a specific computer�s keyboard. To use it you don�t need to have any special knowledge. Anyone with a basic knowledge of computer can use it. With my experience I recommend you to visit Google or yahoo answers. There are hundreds of keylogger available in the market but it doesn�t mean you will need all of them. You might want to get something cheap and simple. You don�t really have to buy those expensive and shiny boxes with unlimited un-necessary options inside.

If you just access your email account from a computer installed with keylogger, you definitely loose your password because as I have said before, the keylogger records each and every keystroke that you type.

OTHER WAYS TO HACK EMAILSniffing - is a very elegant way to hack an email password but is available only if the hacker and the other person are sharing the same network (maybe you are in the same office or into the same Cyber Caffe). By using a snifer tool, it may be possible for the "hacker" to capture the traffic of the other person PC and in this way the password and the loggin information will be captured in a silent way. 

Dictionary attacks - is when a text file full of commonly used passwords, or a list of every work from the dictionary is used against a password database. However, the strong passwors usually aren`t vulnerable to this kind of attack.

Brute-fore attacks - by using this method, a brute fore tool will try every possible combination of letters, number and special characters until the right password is found. Usually all the email providers have a protection against this kind of attack, because after 4-5 failed login attempt, you are asked to enter the captcha word. 

The other most commonly used trick for hacking email is by using Fake Login Pages, known as phishing, which is something like the hoax method , the user is asked to enter his login id and password into a fake site. I`ll not describe this very old process because it`s an expired method and there are very low chances to fool a person to write his/her credentials into a fake page, don`t even say that almost all firewalls and antivirus programs will detect any phishing page.

For you people who wants to "hack" and email password I recommend the usage of keyloggers for hacking email since it�s the easiest one.

Don`t be paranoic that your email account may be compromissed, I`ll give you a solution:

Solution:
Protecting yourselves from a keylogger scam and 99% of the hacking methods is very easy.Just install a good anti-spyware program and update it regularly. This keeps your PC secure from a keylogger. Also there is a program called Anti-keylogger which is specially designed to detect and remove keyloggers. You can use this program to detect some stealth keyloggers which remain undetected by many anti-spyware programs but a good antivirus will worth it`s money. It`s very easy.... 

All the hacking/ cracking software programs are only a combination of the described software tools, there is no any single software program that will give you the desire password with a simple click on a button, if you still belive that may exist than you will be scammed and you will pay a few hundred dollars for something useless. If you have the time and patience, than you can start to "hack" yoru desired email account otherwise just hire the proffesionals and they will combine all these methods to obtain the requested password for you. Just - CLICK HERE - to place your request to RajaHackerS.

ACCESSING YOUR EMAIL ACCOUNT FROM CYBER CAFESDo you access your email from cyber cafes? Then definitely you are under the risk of loosing your password.In fact many people loose their email account in cyber cafes. For the owner of the cyber cafe it�s just a cakewalk to steal your password. For this he just need�s to install a keylogger on his computers. So when you login to your email account from this PC, you give away your password to the cafe owner. Also there are many Remote Administration Tools (RATs) which can be used to monitor your browsing activities in real time. This doesn�t mean that you should never use cyber cafes for browsing the internet. I know, not all the cyber cafe owners will be so wicked but it is recommended not to use cafes for accessing confidential information. If it comes to the matter of security never trust anyone, not even your friend. I always use my own PC to login to my accounts to ensure safety.