Hacking Mafia

Learn Ethical Hacking,Ethical hacking Training,Hacking Forum,CEH Training

Monday, February 22, 2016

Apple vs. FBI iPhone encryption Case

iphone_hack-580x3861.jpeg


The Apple vs. FBI controversy going on right now is quite the techno-political drama. At the core of it is a topic that isn’t so simple — encryption — and it’s all unfolding very rapidly and from many corners of the Internet.
Some people have come up with a snarky shorthand for the case: FBiOS, a portmanteau of FBI and iOS that represents a version of the Apple operating system that would meet the needs of the FBI. Unfortunately, this encapsulation hides the complexity of the situation.
The outcome of the case may have staggering implications. It affects Apple, currently the most valuable company in the world, and it could change the way millions of people view their iPhones: trusted smartphone or potential government surveillance tool?
To help you stay on top of the story, we’ve put together a breakdown of the important players in the case and their actions so far. We’ll update this post as events unfold, so you’ll never miss a beat.

Tuesday, February 16

The issue came alive as Reuters reported that U.S. Magistrate Judge Sheri Pym of the U.S. District Court’s Central District of California had ordered Apple to help the Federal Bureau of Investigation (FBI) unlock the Apple 5c formerly owned by Syed Rizwan Farook, one of the two killers in the San Bernardino mass shooting in December.
The news came a week after FBI director James Comey told the Senate Intelligence Committee that the FBI was still in possession of the phone and that the device remained encrypted, according to USA Today.
One of the key issues the FBI sought help with, as reported by Reuters, was in getting around the iPhone’s authentication safeguard, which disables access after a certain number of incorrect passcodes have been attempted.

Wednesday, February 17

Apple CEO Tim Cook came out swinging in response the court order. He issued a defiant letter on the Apple homepage entitled: “A Message to Our Customers.” The FBI had asked Apple “to build a backdoor to the iPhone,” Cook wrote.
The rhetoric was ominous. Cook’s use of the word “backdoor” harked back to former National Security Agency contractor Edward Snowden, whose leaked documents described the NSA’s apparent backdoors into Apple, Facebook, Google, and Microsoft services. Each of those companies had denied the allegations of illegal government access immediately after initial reports of the NSA’s PRISM program surfaced. “We do not provide any government agency with direct access to our servers and any government agency requesting customer data must get a court order,” Apple said in a statement at that time.
In the case of the San Bernardino shooter, as Cook wrote in his letter, the FBI was actually trying to force Apple to create a new version of iOS. In complying with the order, Apple would allow the FBI to attempt millions of passcodes — ultimately circumventing encryption — and then run the new OS on the now-deceased Farook’s iPhone, Cook wrote.
“The FBI may use different words to describe this tool, but make no mistake: Building a version of iOS that bypasses security in this way would undeniably create a backdoor,” Cook wrote. “And while the government may argue that its use would be limited to this case, there is no way to guarantee such control.”
Cook ended the letter by clearly conveying that Apple would not comply with the judge’s order. “Ultimately, we fear that this demand would undermine the very freedoms and liberty our government is meant to protect,” he wrote.
President Obama was surprisingly silent on the whole issue. But White House spokesperson Josh Earnest did tell reporters that the U.S. Department of Justice (DOJ) was “not asking Apple to redesign its product or to create a new backdoor,” despite the claims in Cook’s letter, as Reuters reported. What Obama did personally do on February 17, reported by UPI, was name former National Security Advisor Tom Donilon and former IBM CEO Sam Palmisano as the chair and vice chair, respectively, of a new Commission on Enhancing Cybersecurity.
Jan Koum, CEO of Facebook-owned WhatsApp, took to Facebook to show his support for Apple and Cook.
It took about 15 hours, but Google CEO Sundar Pichai finally came to Apple’s side with a five-tweet comment. “We build secure products to keep your information safe and we give law enforcement access to data based on valid legal orders,” he wrote. “…But that’s wholly different than requiring companies to enable hacking of customer devices & data. Could be a troubling precedent.”
Later that same day, the industry group Reform Government Surveillance — which comprises AOL, Apple, Dropbox, Evernote, Facebook, Google, LinkedIn, Microsoft, Twitter, and Yahoo — published a statement affirming that “technology companies should not be required to build in backdoors to the technologies that keep their users’ information secure.”
At the same time, a number of politicians began to rally behind the FBI and its call for Apple’s help in decrypting the phone. Sen. Dianne Feinstein (D-California), for instance, told CNN that if Apple doesn’t comply with the FBI’s request, she and Sen. Richard Burr (R-North Carolina) are “prepared to put forward a law which would essentially require that [it do so].” Sen. Tom Cotton (R-Arkansas) issued a similar statement: “Regrettably, the position Tim Cook and Apple have taken shows that they are unwilling to compromise and that legislation is likely the only way to resolve this issue.”
Sen. Ron Wyden (D-Oregon), on the other hand, came to Apple’s defence: “Companies should comply with warrants to the extent they are able to do so, but no company should be forced to deliberately weaken its products,” he wrote in a statement.

Thursday, February 18

Twitter cofounder and CEO Jack Dorsey tweeted out his support for Apple and Cook.
Facebook showed its support for Apple in a statement that it provided to VentureBeat:
We condemn terrorism and have total solidarity with victims of terror. Those who seek to praise, promote, or plan terrorist acts have no place on our services. We also appreciate the difficult and essential work of law enforcement to keep people safe. When we receive lawful requests from these authorities we comply. However, we will continue to fight aggressively against requirements for companies to weaken the security of their systems. These demands would create a chilling precedent and obstruct companies’ efforts to secure their products.
Even Michael Hayden, former director of the NSA and the Central Intelligence Agency (CIA), came out in support of Apple, The Week pointed out. “America is simply more secure with unbreakable end-to-end encryption,” he told Wall Street Journal editor John Bussey on February 17.

John McAfee, founder of antivirus software company McAfee Software and a Libertarian presidential candidate, made a public offer to decrypt the iPhone 5c in question, free of charge.
But Democratic presidential candidates Hillary Clinton and Bernie Sanders both avoided taking sides with either Apple or the FBI in the case. Clinton described the controversy as a “difficult dilemma,” while Sanders said that he was sympathetic to “both” sides, according to the The Intercept.

Friday, February 19

The case became even more interesting as DOJ attorneys filed a motion (PDF) to compel Apple to comply with the FBI’s orders. The attorneys argued that Apple’s unwillingness to work with the FBI “appears to be based on its concern for its business model and public brand marketing strategy,” as Reuters reported.
The attorneys pointed to a 1977 Supreme Court case pitting the U.S. against the New York Telephone Co. “The conviction that private citizens have a duty to provide assistance to law enforcement officials when it is required is by no means foreign to our traditions,” the justices noted in a footnote to the ruling.
“Apple is not above the law in that regard, and it is perfectly capable of advising consumers that compliance with a discrete and limited court order founded on probable cause is an obligation of a responsible member of the community,” the DOJ attorneys wrote in their filing. “It does not mean the end of privacy.”
Apple countered this filing by getting on the phone with reporters midway through the day and explaining that the password of the Apple ID for the iPhone had been changed within a day of the government obtaining it, as reported by TechCrunch and others. That action blocked Apple from using certain approaches to getting around the device encryption, the executives said, speaking on background. For instance, running an iCloud data backup after the password change was not possible. Additionally, the executives reportedly pointed out that the encryption workaround the FBI wanted would affect more recent iPhones, even those with the Secure Enclave (PDF) coprocessor on the chip, not just older iPhones without Touch ID, like the 5c.
That night, a tweet from a Twitter account associated with San Bernardino County indicated that the county was actually “working cooperatively with the FBI” when it reset the password to Farook’s iPhone 5c, as Gizmodo noted.
Meanwhile, in court, Judge Pym disclosed in a filing that Apple had sought relief in order to prepare formal opposition to the order and now has until February 26 to comply.
Apple disclosed in its own filing that it was enlisting the representation of prominent information security attorney Marc Zwillinger. Also representing Apple are Nicola Hanna, Eric Vandevelde, Theodore Boutrous Jr., and Theodore Olson (private counsel to former presidents Ronald Reagan and George W. Bush).
Republican presidential candidate Donald Trump entered the Apple-FBI debate by encouraging people to boycott Apple.
And Comey and Cook were called to testify in front of the House Subcommittee on Oversight and Investigations, as Re/code reported.

Saturday, February 20

The FBI came forward and admitted — in a statement it emailed to Ars Technica writer Cyrus Farivar — that “the FBI worked with San Bernardino County to reset the iCloud password on December 6th, as the county owned the account and was able to reset the password in order to provide immediate access to the iCloud backup data.” The bureau stated its position that “the reset of the iCloud account does not impact Apple’s ability to assist with the court order under the All Writs Act.”
The statement went on to say that, in any case, assistance from Apple could prove more fruitful than a backup through iCloud. “Through previous testing, we know that direct data extraction from an iOS device often provides more data than an iCloud backup contains,” the FBI wrote. “Even if the password had not been changed and Apple could have turned on the auto-backup and loaded it to the cloud, there might be information on the phone that would not be accessible without Apple’s assistance as required by the All Writs Act order, since the iCloud backup does not contain everything on an iPhone.”

Sunday, February 21

The FBI will get the support of some victims of the San Bernardino shootings when a lawyer files a brief on their behalf in March, Reuters is reporting.
Posted by pypiyu at 3:27 AM 1 comment:

Wednesday, February 10, 2016

Google offering extra free 2GB of data storage until Feb. 11 if you do Security Checkup

 www.sevenmentor.com


Tomorrow is apparently "Safer Internet Day," which you most likely didn't mark on your calendar. Google remembered Safer Internet Day, though. To celebrate, it has brought back the free data reward for completing a security audit of your account. A few minutes of your time gets you an extra 2GB of Drive storage for free.
The security checkup is painless and only takes a few minutes. You'll review your account recovery options, connected devices, services with permissions on your account, and 2-step verification settings. The 2GB of storage might not show up in your account immediately, but when it does, it will be there permanently.
2016-02-08 10_57_42-Secure Account - Account Settings
Google did the same thing last year for Safer Internet Day, and it sure would be nice if they kept at it. We don't yet know when this offer will expire, but last year you had a week to complete the checkup. There might be a Google blog post at some point with details.
Posted by pypiyu at 12:27 PM 1 comment:

If You Use These Simple Passwords, Stop It

Now may be the time to rethink your passwords.
Once again, "123456" and "password" were the worst passwords of 2015, according to stats from SplashData, a company that makes password management software. The company found that the two worst passwords are also the most-used passwords, and therefore easily cracked by malicious hackers.
Every January, SplashData releases its list of the worst passwords, based on analysis of over 2 million leaked passwords it has found. Since the company started compiling data in 2011, "123456" and "password" have consistently topped the list.
While standard passwords, including "qwerty," remain on SplashData's list, passwords inspired by Star Wars: The Force Awakens also emerged. No. 25 in the list of the worst passwords was actually "starwars," but the company also found references to "solo" and "princess."
"As we see on the list, using common sports and pop culture terms is also a bad idea," SplashData CEO Morgan Slain said in a statement.
Malicious hackers use a wide range of tools, including bots, to crack passwords. But more often than not, they start with simple codes, like "123456." As SplashData's report suggests, some hackers will hit pay dirt with those terms.
For that reason, companies urge people to use alphanumeric passwords with special characters. Users can also use password managers, which create random passwords for different accounts. In that case, they're only required to remember one password; account credentials are populated by the app.
Here is the full list of the worst passwords of 2015-16:
1.123456
2. password 
3. 12345678 
4. qwerty 
5. 12345 
6. 123456789 
7. football 
8. 1234 
9. 1234567 
10. baseball 
11. welcome 
12. 1234567890 
13. abc123 
14. 111111 
15. 1qaz2wsx 
16. dragon 
17. master 
18. monkey 
19. letmein 
20. login 
21. princess 
22. qwertyuiop 
23. solo
24. passw0rd 
25. starwars

  •  

  •  

  •  

  •  

Posted by pypiyu at 12:15 PM 1 comment:

Best Hacking Tools 2016

Here are the Top Best Ethical Hacking Tools 2016:

#1 Nmap

I think everyone has heard of this one, Nmap (Network Mapper) is a free open source utility for network exploration or security auditing. It was designed to Nmap rapidly scan large networks, although it works fine against single hosts.Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use,and dozens of other characteristics. It may be used to discover computers and services on a computer network, thus creating a “map” of the network.Nmap runs on most types of computers and both console and graphical versions are available. Nmap is free and open source.Can be used by beginners (-sT) or by pros alike (packet_trace). A very versatile tool, once you fully understand the results.

#2 Nessus Remote Security Scanner

Recently went closed source, but is still essentially free. Works with a client-server framework.Nessus is the worlds Nessus Remote Security Scanner most popular vulnerability scanner used in over 75,000 organizations world-wide. Many of the worlds largest organizations are realizing significant cost savings by using Nessus to audit business-critical enterprise devices and applications.

#3 Wireshark

Wireshark is a GTK+-based Wiresharknetwork protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Wireshark features that are missing from closed-source sniffers. Works great on both Linux and Windows (with a GUI), easy to use and can reconstruct TCP/IP Streams.

#4 SuperScan

Effective TCP port scanner, pinger, resolver. SuperScan 4 is an upgrade of the extremely popular Windows port scanning tool, SuperScan. If you require an option for nmap on Windows with a good user interface, I recommend you check this out, it’s rather good. You can also use Angry IP Scanner which is a respectable replacement for it.

#5 Cain and Abel

The swiss knife of hacking tools..Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols.The program does not exploit any software vulnerabilities or bugs that could not be fixed with little effort.

#6 Kismet

Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with Kismetany wireless card which supports raw monitoring (rfmon) mode, and can sniff 802.11b, 802.11a, and 802.11g traffic. A good wireless tool as long as your card supports rfmon.

#7 NetStumbler

Yes a decent wireless tool for Windows! Sadly not as powerful as it’s Linux counterparts, but it’s easy to use and has a NetStumbler nice interface, good for the basics of war-driving. NetStumbler is a tool for Windows that allows you to detect Wireless Local Area Networks (WLANs) using 802.11b, 802.11a and 802.11g. It has many uses:
  1. Verify that your network is set up the way you intended.
  2. Find locations with poor coverage in your WLAN.
  3. Detect other networks that may be causing interference on your network.
  4. Detect unauthorized rogue access points in your workplace.
  5. Help aim directional antennas for long-haul WLAN links.
  6. Use it recreationally for WarDriving.

#8 Metasploit is another cryptographic tool that is hugely popular with hackers, whether they are black hat or white hat. It helps hackers gain knowledge about known security vulnerabilities. Its evasion tools are one of the many applications of Metaspoilt.

metasoloit





#9 ANGRY IP SCANNER

A hacker can track people and snoop for their data using their IP address. Angry IP Scanner also goes by the name of ”ipscan” and helps someone scan IP addresses and ports to look for doorways into a user’s system. It is an open source and cross-platform software and one of the most efficient hacking tools present in the market. Network administrators, as well as system engineers, are known to use Angry IP Scanner quite frequently.
angry-ip-scanner-7

 

Posted by pypiyu at 11:33 AM 7 comments:

Another Facebook Hacking Tool


facebook hackShort Bytes: Your desire to master the art of Facebook hacking can harm you in a big way. Recently, a variant of Remtasu malware has been spotted in the wild that can hack your Facebook, instead of your friend’s account. Surprisingly, this malware always finds a way to remain on the system even after the victim reboots the system or tries to locate the threat in the list of active processes.
Anew Facebook hacking tool has been spotted in the wild that can actually hack Facebook accounts. However, if you try to use this tool to hack someone’s Facebook account, you might end up becoming the victim of this tool.
This hacking tool is a disguised version of a Windows-based trojan whose reach has witnessed an accelerated growth over the last year. Ostensibly, the malware is now busy using social engineering tactics to target the people who are looking for ways to hack other’s Facebook accounts. This finding was recently unveiled by the security firm ESET in a blog post.

How is Remtasu Facebook hacking tool spreading?

This Win32/Remtasu.Y malware reaches your machine when you search queries like “how to hack Facebook account?” etc. As a result, you may end up downloading this Facebook hacking tool that can hack your own account.
Remtasu-2-hack facebook malware
Talking about different ways by which this trojan spreads, ESET writes, “we are no longer seeing propagation through e-mail. They are instead coming from direct download sites. Once a user downloads and executes the file, their data is compromised.”
This Facebook hacking variant of Remtasu is most common in Latin America, Thailand, Turkey and other countries.

How Remtasu hacks your Facebook account?

Remtasu-3-hack malware malware
Once a user visits a direct download website, the malware enters in your system and disguises itself among other files. It was observed that the malware makes use of UPX compression. After the file is uncompressed, various functions are executed that include opening and capturing clipboard information, recording keystrokes and sending it to an FTP server.
Remtasu-6 facebook hack malware
Surprisingly, this malware always finds a way to remain on the system even after the victim reboots the PC or tries to locate the threat in the list of active processes. “In this case, the malware replicates itself, saving the copy in a folder that it also creates within thesystem32 folder. The new InstallDir folder remains hidden inside the system files, making it difficult for users to access,” ESET explains the process.
The security firm has recorded 24 different versions of the malware. Out of those, Win32/Remtasu.Y represents more than a quarter, followed by the variant Win32/Remtasu.O at 23%.
Win32_Remtasu-distribution facebook hack malware
foss Bytes advises the readers to stay away from Facebook hacking tools as they can harm your digital life. Also, it’s unethical.
Posted by Unknown at 11:22 AM 1 comment:

Feeling Bored? You can now play in Facebook Messenger

facebook messenger secret chess game

Here’s where it gets interesting and why you have to appreciate the humor of engineers – to make a move, you use “Standard Algebraic Notation.” For instance, @fbchess Nbd2would move a knight from b-file to d2. @fbchess B2xc5 takes on c5 with 2nd rank bishop. You don’t have to be a math wiz to play, but it might help.
If you get stuck or need assistance, you can type in @fbchess help and you’ll get this menu listing all of the possible moves and commands you can make.
Facebook’s Chess game works equally well on both the desktop version of Facebook and the Facebook Messenger app, so you can start a game on the go and pick up right where you left off when you get to work.
Now, if they would just add @fbcheckers life would be really good. Your move, Twitter.
P.S. Not into chess? Type the command @dailycute into Facebook Messenger and you’ll get an an image that will make you go “aww,” like this.
Picture


Posted by Unknown at 11:18 AM 1 comment:

Windows 10 Sends Data From Microsoft Thousands of Times Every Day

Windows 10 is sending data from your PC to Microsoft thousands of times per day
This is being deemed as Windows 10’s worst kept secret: it sends data from your PC to Microsoft thousands of times every day. This not only compromises your privacy but can also be a big drain on your mobile phone in case you are using Windows 10 on your mobile phone. And this is despite disabling tracking options or installing anti-spying apps. Back in November 2015 Microsoft had openly admitted that the operating system was spying on users and surprisingly, the company also admitted that it cannot stop Windows 10 from spying on you.
Windows 10 is constantly tracking how it works on your device and how you’re using it and then sending this information back to Microsoft by default. Despite giving users some option to stop this data transfer, the core data collection simply cannot be stopped, according to the official statement.
Last year, Microsoft Corporate Vice President Joe Belfiore had told PC World, “The company needs that information to improve the experience of using its operating system. And in the case of knowing that our system that we have created is crashing, or is having serious performance problems, we view that is so helpful to the ecosystem, and so not an issue of personal privacy, that today, we collect that data so that we make that experience better for everyone.”
I know, it’s terrible English, but I have quoted it as it is from the above link and I’m pretty sure it makes no sense to you, but the problem is, this secret has now gone out of hand. According to an instancementioned in this Forbes article, one individual has done “extensive investigation” and has found that Windows 10 contacts Microsoft reported are thousands of times per day.
During the observation period of eight hours, Windows 10 try to send data back to 51 different Microsoft IP addresses over 5500 times! Within 30 hours, Windows 10 was sending data to 130 non-private IP addresses. Non-private means the data can be intercepted by hackers.
Just to make sure that it wasn’t a fluke, a clean Windows 10 install was used and on top of that a third-party tool called DisableWinTracking was installed to stop any hidden Windows 10 data-gathering modules. Despite that, in the 30-hour period, Windows 10 was able to send data to 2078 times to 30 different IP addresses. Isn’t this insane?
Posted by Unknown at 11:13 AM 2 comments:

Google to Ban Adobe Flash-based Advertising

Google to ban Adobe Flash-based display ads, go 100% HTML5


Google's massive AdWords network will no longer accept new display ads made in Adobe Flash as of June 30, the search giant announced this week, as it works to phase out the much maligned Internet plugin.



Both Google's Display Network and DoubleClick Digital Marketing will be 100 percent HTML5-based once the changes take effect. Advertisers will no longer be able to upload Flash-based display ads starting June 30, while display ads in Flash will no longer run after Jan. 2, 2017.

While the changes will affect all display ads on Google's network, video ads built in Flash will not yet be affected.

To aid advertisers in the transition, Google has created a new help document explaining how to update Flash ads to HTML5 ads. HTML5 ads can be created on their own, or with help from Google tools.

The news comes only days after Adobe itself axed its Flash Professional software, renaming it Adobe Animate CC. The revamped software has a greater focus on HTML5 Canvas and WebGL.

Apple stopped pre-installing Flash on Macs years ago, citing the potential security threats involved. Last fall it even went a step further, actively blocking old versions from being installed in Safari. And of course, Flash has never worked on its iOS platform.
Posted by Unknown at 11:10 AM 1 comment:

Monday, February 8, 2016

How to Prevent A DDoS Attack

The best way to stop DDoS attacks 

A Distributed Denial of Service (DDoS) attack is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. They target a wide variety of important resources, from banks to news websites, and present a major challenge to making sure people can publish and access important information.

ddos attack wi fi defense
Distributed denial-of-service (DDoS) attacks are always in top headlines worldwide, as they are plaguing websites in banks, and virtually of almost every organization having a prominent online presence. The main cause behind the proliferation of DDoS attacks is that there is a very low-cost that the attacker has to incur to put such attack in motion. Fortunately, today various prevention methods have been developed to tackle such attacks. Before delving further into understanding about the ways to prevent DDoS attack, let’s first understand what exactly a DDoS attack is!
Understanding DDOS Attack

 DDoS Attack bot
A DDoS (distributed denial-of-service) attack is an attempt made by attackers to make computers’ resources inaccessible to its anticipated user. In order to carry out a DDOS attack the attackers never uses their own system; rather they create a network of zombie computers often called as a “Botnet” – that is a hive of computers, to incapacitate a website or a web server.
Let’s understand the basic idea! Now, the attacker notifies all the computers present on the botnet to keep in touch with a particular site or a web server, time and again. This increases traffic on the network that causes in slowing down the speed of a site for the intended users. Unfortunately, at times the traffic can be really high that could even lead to shutting a site completely.
3 Basic Tips to Prevent a DDoS Attack

There are several ways to prevent the DDOS attack; however, here in this guest post I’ll be covering three basic tips that will help you to protect your website from the DDoS attack.

1. Buy More Bandwidth.

 DDoS Attack bandwidth
One of the easiest methods is to ensure that you have sufficient bandwidth on your web. You’ll be able to tackle lots of low-scale DDOS attacks simply by buying more bandwidth so as to service the requests. How does it help? Well, distributed denial of service is a nothing more than a game of capacity. Let’s suppose you have 10,000 computer systems each distributing 1 Mbps directed towards your way. This means you’re getting 10 GB of data that is hitting your web server every second. Now, that’s causes a lot of traffic!
So to avoid such issue, you need to apply the same rule intended for normal redundancy. According to this technique, if you wish to have more web servers just multiply around diverse datacenters and next make use of load balancing. By spreading your traffic to various servers will help you balance the load and will most likely create large space adequate to handle the incessant increase in traffic.
However, there’s a problem with this method that is buying more bandwidth can be a costly affair. And as you’ll know that the current DDoS attacks are getting large, and can be a lot bigger exceeding your budget limit.

2. Opt for DDoS Mitigation Services.

A lot of network or Internet-service providers render DDoS mitigation capabilities. Look for an internet service provider having the largest DDoS protection and mitigation network, automated tools, and a pool of talented anti-DDoS technicians with the wherewithal to take action in real-time as per the varying DDoS attack characteristics. A viable alternative is to utilize a DDoS prevention appliance, which is specifically intended to discover and prevent distributed denial-of-service attacks.

3. Restricted Connectivity.

 DDoS Attack
In case you have computer systems that are connected to the web directly, a better idea is to properly install/configure your routers and firewall so as to limit the connectivity. For an instance, while receiving some data from a client machine you can only allow traffic to pass from the machine only on a few chosen ports (like HTTP, POP, SMTP etc.) via the firewall.
Summary :

Websites are largely getting attacked by hackers every second. Denial-of-service attack is insanely getting huge and is creating a lot of problems for business organizations having strong online vicinity. In this guest post you’ll not only understand what a DDoS attack actually means, but will also come to know about a few type of methods to prevent DDoS attacks. Aforementioned are three tips that I’ll recommend you to run through to at least understand where to get started towards building a resilient web network with chances of surviving a DDoS attack.
Posted by pypiyu at 11:10 AM 1 comment:
Labels: DDoS attacks

Basic Understand about HACKING

Understand HACKING

Are you a beginner who wants to learn hacking but don’t know where to start? If so you are at the right place. Since most of the books and free resources on the Internet are only meant for those who already have a considerable amount of knowledge on the subject, they fail to teach hacking for beginners. Therefore, I have decided to come up with this post that gives useful tips for beginners on how to kick start their journey to becoming a hacker
many subgroups of the computer underground with different attitudes use different terms to demarcate themselves from each other, or try to exclude some specific group with which they do not agree. Eric S. Raymond (author of The New Hacker's Dictionary) advocates that members of the computer underground should be called crackers. Yet, those people see themselves as hackers and even try to include the views of Raymond in what they see as one wider hacker culture, a view harshly rejected by Raymond himself. Instead of a hacker/cracker dichotomy, they give more emphasis to a spectrum of different categories, such as white hat, grey hat, black hat and script kiddie.

White hat:-


A white hat hacker breaks security for non-malicious reasons, perhaps to test their own security system or while working for a security company which makes security software. The term "white hat" in Internet slang refers to an ethical hacker. This classification also includes individuals who perform penetration tests and vulnerability assessments within a contractual agreement. The EC-Council , also known as the International Council of Electronic Commerce Consultants has developed certifications, course ware, classes, and online training covering the diverse arena of Ethical Hacking.

Black hat:-


A "black hat" hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain" (Moore, 2005). Black hat hackers form the stereotypical, illegal hacking groups often portrayed in popular culture, and are "the epitome of all that the public fears in a computer criminal". Black hat hackers break into secure networks to destroy data or make the network unusable for those who are authorized to use the network.

Part 1: Targeting


The hacker determines what network to break into during this phase. The target may be of particular interest to the hacker, either politically or personally, or it may be picked at random. Next, they will port scan a network to determine if it is vulnerable to attacks, which is just testing all ports on a host machine for a response. Open ports—those that do respond—will allow a hacker to access the system.

Part 2: Research and Information Gathering


It is in this stage that the hacker will visit or contact the target in some way in hopes of finding out vital information that will help them access the system. The main way that hackers get desired results from this stage is from "social engineering", which will be explained below. Aside from social engineering, hackers can also use a technique called "dumpster diving". Dumpster diving is when a hacker will literally search through users' garbage in hopes of finding documents that have been thrown away, which may contain information a hacker can use directly or indirectly, to help them gain access to a network.

Part 3: Finishing The Attack


This is the stage when the hacker will invade the preliminary target that he/she was planning to attack or steal. Many "hackers" will be caught after this point, lured in or grabbed by any data also known as a honeypot (a trap set up by computer security personnel).

Grey hat:-


A grey hat hacker is a combination of a Black Hat and a White Hat Hacker. A Grey Hat Hacker may surf the internet and hack into a computer system for the sole purpose of notifying the administrator that their system has been hacked, for example. Then they may offer to repair their system for a small fee.

Elite hacker:-


A social status among hackers, elite is used to describe the most skilled. Newly discovered exploits will circulate among these hackers. Elite groups such as Masters of Deception conferred a kind of credibility on their members.

Script kiddi:-


A script kiddie (or skiddie) is a non-expert who breaks into computer systems by using pre-packaged automated tools written by others, usually with little understanding of the underlying concept—hence the term script (i.e. a prearranged plan or set of activities) kiddie (i.e. kid, child—an individual lacking knowledge and experience, immature).

Neophyt:-


A neophyte, "n00b", or "newbie" is someone who is new to hacking or phreaking and has almost no knowledge or experience of the workings of technology, and hacking.

Blue hat:-


A blue hat hacker is someone outside computer security consulting firms who is used to bug test a system prior to its launch, looking for exploits so they can be closed. Microsoft also uses the term BlueHat to represent a series of security briefing events.

Hacktivis:-


A hacktivist is a hacker who utilizes technology to announce a social, ideological, religious, or political message. In general, most hacktivism involves website defacement or denial-of-service attacks. Nation state Intelligence agencies and cyberwarfare operatives of nation states.

Attack:-


A typical approach in an attack on Internet-connected system is:

1. Network enumeration: Discovering information about the intended target.

2. Vulnerability analysis: Identifying potential ways of attack.

3. Exploitation: Attempting to compromise the system by employing the vulnerabilities found through the vulnerability analysis.

In order to do so, there are several recurring tools of the trade and techniques used by computer criminals and security experts.

Security exploit:-


A security exploit is a prepared application that takes advantage of a known weakness. Common examples of security exploits are SQL injection, Cross Site Scripting and Cross Site Request Forgery which abuse security holes that may result from substandard programming practice. Other exploits would be able to be used through FTP, HTTP, PHP, SSH, Telnet and some web-pages. These are very common in website/domain hacking.

Techniques

Vulnerability scanner:-


A vulnerability scanner is a tool used to quickly check computers on a network for known weaknesses.Hackers also commonly use port scanners. These check to see which ports on a specified computer are "open" or available to access the computer, and sometimes will detect what program or service is listening on that port, and its version number. (Note that firewalls defend computers from intruders by limiting access to ports/machines both inbound and outbound, but can still be circumvented.)

Password cracking:-

Password cracking is the process of recovering passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.

Packet sniffer:-


A packet sniffer is an application that captures data packets, which can be used to capture passwords and other data in transit over the network.

Spoofing attack (Phishing):-


A spoofing attack involves one program, system, or website successfully masquerading as another by falsifying data and thereby being treated as a trusted system by a user or another program. The purpose of this is usually to fool programs, systems, or users into revealing confidential information, such as user names and passwords, to the attacker.

Rootkit:-


A rootkit is designed to conceal the compromise of a computer's security, and can represent any of a set of programs which work to subvert control of an operating system from its legitimate operators. Usually, a rootkit will obscure its installation and attempt to prevent its removal through a subversion of standard system security. Rootkits may include replacements for system binaries so that it becomes impossible for the legitimate user to detect the presence of the intruder on the system by looking at process tables.

Social engineering:-


When a Hacker, typically a black hat, is in the second stage of the targeting process, he or she will typically use some social engineering tactics to get enough information to access the network. A common practice for hackers who use this technique, is to contact the system administrator and play the role of a user who cannot get access to his or her system.

Trojan horses:-


A Trojan horse is a program which seems to be doing one thing, but is actually doing another. A trojan horse can be used to set up a back door in a computer system such that the intruder can gain access later. (The name refers to the horse from the Trojan War, with conceptually similar function of deceiving defenders into bringing an intruder inside.)

Viruses:-


A virus is a self-replicating program that spreads by inserting copies of itself into other executable code or documents. Therefore, a computer virus behaves in a way similar to a biological virus, which spreads by inserting itself into living cells. While some are harmless or mere hoaxes most computer viruses are considered malicious.

Worm:-

Like a virus, a worm is also a self-replicating program. A worm differs from a virus in that it propagates through computer networks without user intervention. Unlike a virus, it does not need to attach itself to an existing program. Many people conflate the terms "virus" and "worm", using them both to describe any self-propagating program.

Key loggers:-


A key logger is a tool designed to record ('log') every keystroke on an affected machine for later retrieval. Its purpose is usually to allow the user of this tool to gain access to confidential information typed on the affected machine, such as a user's password or other private data. Some key loggers uses virus-, trojan-, and rootkit-like methods to remain active and hidden. However, some key loggers are used in legitimate ways and sometimes to even enhance computer security. As an example, a business might have a key logger on a computer used at a point of sale and data collected by the key logger could be used for catching employee fraud. 
 
  Learn Programming (Optional)
 
If you want to take your hacking skills one step ahead, programming is something that you can’t skip down. Although you can easily find a lot of ready made tools and programs that let you hack with ease, it is always better to have some basic knowledge of programming languages like HTML, PHP and JavsScript so that you will be in a position to develop your own tools and exploit codes. However, if you do not wish to learn programming you can skip this step and still be a good hacker.

How Long does it Take to Master the Skills of Hacking?

Since hacking is not something that can be mastered overnight, you should never be in a hurry to get going. It requires knowledge, skills, creativity, dedication and of course the time. Depending upon the amount of effort and dedication you put, it can take up anywhere between a few months to few years to develop all the the necessary skills. Everyone can become a hacker provided they learn it from the basics and build a solid foundation. So, if you want to be a hacker all you need is passion to learn, a good source of knowledge that will guide you through the basics and some perseverance.
 
Posted by pypiyu at 10:59 AM 2 comments:
Labels: Basic Hacking Tips, key Logger, Skills Of Hacking
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

Blog Archive

  • ▼  2016 (16)
    • ►  July (3)
    • ▼  February (13)
      • Apple vs. FBI iPhone encryption Case
      • Google offering extra free 2GB of data storage unt...
      • If You Use These Simple Passwords, Stop It
      • Best Hacking Tools 2016
      • Another Facebook Hacking Tool
      • Feeling Bored? You can now play in Facebook Messenger
      • Windows 10 Sends Data From Microsoft Thousands of ...
      • Google to Ban Adobe Flash-based Advertising
      • How to Prevent A DDoS Attack
      • Basic Understand about HACKING
      • Why SSL Certifiate is Important for your Website’...
      • Google Launches Best Ever Chrome Feature — Now You...
      • CCNA Training in Pune
  • ►  2011 (1)
    • ►  January (1)
  • ►  2009 (1)
    • ►  January (1)
  • ►  2008 (78)
    • ►  December (5)
    • ►  November (11)
    • ►  October (2)
    • ►  September (17)
    • ►  August (43)

Live Traffic

Users Online Now

Disclimer

The information provided on http://hackmafia.blogspot.in/ is to be used for educational purposes only. The website creator is in no way responsible for any misuse of the information provided. All of the information in this website is meant to help the reader develop a hacker defense attitude in order to prevent the attacks discussed. In no way should you use the information to cause any kind of damage directly or indirectly.
Simple theme. Powered by Blogger.