Monday, 30 September 2013

How to protect your PC's from hackers

In this day and age, where digital security is a puppet in the hands of hackers,
 protecting data has become a major cause of concern for IT specialists. It is,
 therefore, instinctive on their part to figure out how to protect private and 
confidential information in their systems, without burdening with antivirus software
 and firewalls.
 Here are a few of these ways

Windows Updates:

 Even the best offerings
 from computer giants have not been able to completely fight off the attempts of 
rouge developers to break in. In this situation, it has become almost a necessity
 for users to update their Windows-based system, on a regular basis. An update daily,
 weekly or even monthly is going to speed up the system and help it counter
 attacks on its security thereby decreasing the probability of  it, being infected
 by worms and viruses. Desktop monitoring by hackers is indeed a grand problem.

 Software updates:

 Like the Windows, applications also have to be updated with the
 latest version. You need to check regularly for wear and tear in the software that
 your system runs. Web browsers and web-based programs have to be upgraded 
constantly so hackers do not get their hands on the private and confidential data,
 stored in your system.

 Antivirus Software:

 If your system is being connected to the internet regularly and you
 run without antivirus software on it, it is almost impossible for hackers not
 to get attracted to it. In case you do not have antivirus software,
 get your hands on one as soon as possible. If you already have one,
 upgrade it to its latest version and check if the settings are properly defined.

Anti-spyware software:

 Even though the digital situation looks pretty grim,
 it still isn’t as bad as the days when Bonzi Buddy and Cool Websearch made
 PC users have nightmares. This is because of anti-spyware software that have
 shielded the tech world from malicious attacks on the security.

 Swap your Windows-based system for a Macintosh:

 The whole tech world knows that Mac’s OS X has the largest number of limitations
 as compared to other computer operating systems.
 The truth is that most hackers do not bother breaking into a Mac.
 This is the reason Mac still makes space for itself in the list of secure computer
 operating systems, despite its shortcomings.

 Hacker-Controlled websites:

 Usually sites that offer free downloads, porn, online games etc.
 are operated by hackers. It is almost given that you avoid dangerous places
 especially if you have valuables on your PC. The same goes for the mechanical world.
 Steer clear of sites that look suspicious or require you to download something which
 is not needed. Data Backup: Create a backup for all the important data that you
 have on your system. Apart from hackers and system crashers,
 other mishaps may spell out death for your hard drives.
 A tech storm can easily sweep away every bit of data in your system.
 It’s always better to be safe than sorry.

Sunday, 29 September 2013

Password Cracking With Cain & Able Password Cracker

 Posted by ADIL MUNEEB,

 digg If you have few knowledge about password cracking and know few password crackers,
 I am sure you already know about Cain and Able.
 Cain and Able is one of the most popular password cracking tools.
 You can learn more about this tool in our security tools gallery.
 Officially, Cain and Able is a password recovery tool available for Windows
 operating systems and supports all available version of Windows.
 It allow users to crack various types of passwords.To crack the password,
 it uses various methods that includes Brute-Force,
 cracking encryption using Dictionary, sniffing on network,
 decoding scrambled passwords, revealing password boxes,
 uncovering cached passwords, recovering wireless network keys and analyzing
 routing protocols. There are few other methods and more is being added
 in each new version of the tool. How to Install Cain and Able
 Installation of Cain and Able is really simple. Just visit the official
 website and download it for free of cost.  Download Here These are the
 system requirements for this tool  At least 10MB hard disk space Microsoft
 Windows 2000/XP/2003/Vista OS Winpcap Packet Driver (v2.3 or above).
 Airpcap Packet Driver (for passive wireless sniffer / WEP cracker) After
 installation, run the program. Now click on Configuration menu and open
 configuration dialog box. Here select the desired network interface card
 which you use. Here you will find various tabs which you can use to
 configure the tool for various kind of attacks.
 You will find, Sniffer, AR, Filter and ports, HTTP Fields, Traceroute and other.
 Password Cracking As I already wrote that it is one of the most popular passwords
 crackers yet, Now we will see how it works. In the tool, you will find a cracker tab.
 It is the most important feature of Cain. When Cain finds any kind
 of passwords or password hashes for any supported protocols,
 it automatically sends it to this tab. We have already seen how to set up it
 from configuration tab. If you find any kind of password hashes here,
 just right click on this an you will find many password cracking attacks in 
the context menu. As you can see that I have no password in the list,
 But it will show the same context menu for any kind of password hash entry.
 You only need to select an attack to crack the password hash. Thats it. 

Hijacking Facebook Users With Clickjacking Attack


 


Clickjacking is one of most used attack on Facebook.
 Scammers use this attack to increase like of a Facebook page and spread some malicious
 links on Facebook user’s profile.
 Most of the strange looking auto spreading scams on Facebook are Clickjacking attacks.


Clickjacking name is taken from click Hijacking. In this attack,
 hacker hijacks users’ click to perform some actions on the webpage.
 This attack is also known as User Interface redress attack,
 UI redress attack or UI redressing. 
In this attack, hacker tricks innocent users to click on something
 which is not the same thing user is clicking.
 It means user tries to click on some link button for 
some specific task while the button or link performs something else.

How this attack works?

As the name suggest, hacker hijacks the click of the user.
 But this sounds complicated.
 In this attack, hacker use modified frames in the way that only 
a specific part of the webpage is visible on the page.
For example, imagine a hacker created a web site that has a button on it
 which says "click here for get free gifts". But, on the top of web page,
 hacker has embedded an iframe with a button for subscription
 directly on top of the "free Gifts" button.
 Victim visitor will try to click on free gifts button but
 instead actually clicked on the invisible Subscription button.

This attack is performed with the help of 2 iFrame.
 First of all we will add the target button to the top left of the webpage in an iframe.
 First IFrame is used to hide all other elements of the webpage
 which originally contains the button.
 Hacker hide border and scroll. This will make hard to identify the frame on the web page.

<iframe id="inner" src="http://hackingtricks.in" frameborder="none" scrolling="no" width="1000" height="3000"></iframe>
#inner { position: absolute; left: -600px; top: -600px ;}

Change the position and iframe size according to the button you are adding.
Now add this web page on target web page inside 
an IFrame at the position where we want to add the button.
 Second IFrame is used to add this button on the 
target web page where we want it to be clickjacked.
 Do not use border and scroll in this frame too.
 Now add some texts and images around this framed button so that
 it appears the part of the page.
 Also put some false message to get users click on the button.

LikeJacking:

  Likejacking is not the different attack. It is the Clickjacking attack which is
 used to increase the like of a Facebook page or a Facebook post.
 Facebook got the solution to prevent this attack in the Facebook’s hacking event Hackathon.
 Although, Facebook has implemented many security levels to prevent this attack,
 but hackers always gets some way to perform this on facebook.

Protection against this attack: This is a harmful attack
 and can be prevented by server side and client side both.

Server Side Protection:

 Most successful server side protection against
 this attack is "Defending with Frame Breaking Scripts." 
In this web developer add a script on the web page which
 prevents the web page to be framed.
 This is the code which is used to prevent the page to be framed.
<script type="text/javascript">// <![CDATA[
 if (self == top) {
   var theBody = document.getElementsByTagName('body')[0];
   theBody.style.display = "block";
 } else {
   top.location = self.location;
 }
// ]]></script>
But there are few methods which can break the protection.

Client Side Protections: There are some add-ons and tools available
 which are used to protect browsers against this attack.

NoScript:

 No doubt, NoScript is the most useful Firefox add-on
 which protects users from many types of web attacks.
 This add-on also prevents users from clicking on invisible or
 “redressed” page elements of embedded documents or applets.
 This is the best security tool against this attack.

Ghostery:

 This is also a nice browser extension which is also used 
to protect users against this attack.
 This privacy browser enables users to detect and control tags,
 web bugs, pixels, and beacons on the webpage which can collect data from their web browsers.

As we know that there is no permanent solution exists to prevent
 this attack from the server side,
 we should try to add protections to our web browsing. So I will
 suggest all users to use client side solutions.
 If you use Mozilla Firefox, then you must have NoScript Add-on in your web browser.
 This will protect you against many types of web attacks.

Thursday, 26 September 2013

Most Hidden dangers of Facebook

 Posted by ADIL MUNEEB,

 The last 3-4 years have observed a tremendous positive
 growth ladder in the success rate of Facebook, a social networking website.
 Phenomenal success of Facebook has made it the No.1 social networking website presently.
 In fact, it has beat Google by the maximum number of visitor visits for one entire week.
 But things always go the same way as one may think of.
 Both positive and negative experiences go head to head.
 Facebook is also not flawless. Recently,
 many flaws were revealed Most of the Facebook flaws are in it's
 privacy policies and accounts settings. Sharing information may not
 be all that great through this social networking site. It can happen 
that marketing efforts of Facebook may well lead to serious threat
 to account holders' privacy policies. This article discusses about
 some of the most important hidden dangers of Facebook.

 Danger # 1:

 Sharing information with 3rd parties As per
 Facebook policy (last updated, 2010),
 "When the user connects with some website or application via Facebook,
 that particular site or application will have permission to access
 the general information about the connected user.
" According to Facebook's dictionary,
 "General Information"
 refers to information about the user while getting full access to his/her profile,
 friend list, user IDs, connections, gender, etc. In fact,
 the site or app can able to view any of the information being shared using
 "Everyone" privacy setting. This is also the default privacy setting.
 It takes only two to get connected, so your privacy settings Because
 it takes two to connect, the user's privacy settings can control the 
visibility factor of the connection on profile page.
 those who are uncomfortable with the public visibility of the connection status,
 they should not make the connection or try to remove it.

 Danger # 2:

 Privacy settings revert to minimal safety in default mode after every
 single redesigning phase It was last March when private email addresses
 of many Facebook users were revealed in the public domain of Facebook page.
 This was an irritating fact for many. However,
 the glitch got resolved at a later stage by Facebook administration body.

 Danger # 3:

 Ads available on Facebook ads may well contain malware Of late,
 an event invitation notice from Facebook was sent to nearly 2,300 facebook friends
 of a reputed business tycoon.
 It actually was a scam and those responded to the ad got thier
 account hacked by some unknown hacker.
 These sort of ads are available in plenty through Facebook. Most of these are scams.
 So, think and judge carefully before responding to these ads.

 Danger # 4:

 Facebook friends unknowingly make an user vulnerable Facebook recently
 patched a serious security bug which allowed the profile users to snoop 
silently through a user's private chat engine and even view all the pending friend
 requests. It was such a serious security threat that Facebook even disabled the chat
 engine for quite a few days before patching the bug.

 Danger # 5:

 Fake profiles being created by scammers This keeps on happening.
 However, it is more common with celebrity profiles.
 Many scammers create fake profiles and try to fool the Facebook users.
 Such a sort of scenario can result in spreading negative news and rumors about
 celebrity personalities. Till date,
 Facebook has been unable to bring out any meaningful solution to this case.

Tuesday, 24 September 2013


How to recover your facebook groups from blocked facebook account to new facebook account?

https://www.youtube.com/watch?v=BZDJniG828Y

MAKE A TIMER

open notepad and paste this code:

Countdown:
@echo off
title Timer
set time=30   (you can make the time whatever you want)
:loop
set /a time=%time%-1
if %time%==0 goto timesup
echo %time%
ping localhost -n 2 > nul
goto loop
:timesup
echo Time is Up!
echo Press Any Key To Exit!
pause >nul
exit

save as whatever.bat. click the icon and enjoy.
for more detail
plz contact :-
                 adijutt4502gmail.com

MAKE A SELECT PROGRAM

open notepad and paste this code:

@echo off
title Select Program
:start
cls
echo options

echo 1. Calculator
echo 2. word
echo 3. cmd
echo 4. Notepad
echo 5. Lock PC
echo 6. Log Off
echo 7. Exit

set /p var=What Would you like to open? (The Selection no)

IF '%var%' == '1' GOTO calc
IF '%var%' == '2' GOTO Word
IF '%var%' == '3' GOTO cmd
IF '%var%' == '4' GOTO Note
IF '%var%' == '5' GOTO SU
IF '%var%' == '6' GOTO LO
IF '%var%' == '7' GOTO exit

cls
msg * That selection does not exist please try again!
goto start

:calc
"C:\windows\system32\calc.exe"
Pause
cls
goto start



:Word
cd "C:\Program Files\Microsoft Office\OFFICE11\"
start WINWORD.EXE
goto start
PAUSE
cls


:cmd
start cmd
goto start
PAUSE
cls

:Note
start %SystemRoot%\system32\notepad.exe
goto start
PAUSE
cls

:SU
start %windir%\System32\rundll32.exe user32.dll,LockWorkStation
exit

:LO
set /p LOC=msg Are you sure yo want to logg off? (Y/N)
IF '%LOC%' == 'Y' GOTO LOC
IF '%LOC%' == 'N' GOTO LONC
pause
goto start

:LOC
start %windir%\System32\shutdown /l
exit

:LONC
msg * Log of Aborted!
goto start

save as whatever.bat. click the icon and enjoy.
for more detail
plz contact

           adijutt450@gmail.com

Cheat Codes For G.T.A Voice city

Start the game and type any one of those cheats when playing the game.

  THUGSTOOLS
  PROFESSIONALTOOLS
  NUTTERTOOLS
  PRECIOUSPROTECTION
  ASPIRINE
  YOUWONTTAKEMEALIVE
  LEAVEMEALONE
  APLEASANTDAY
  ALOVELYDAY
  ABITDRIEG
  CATSANDDOGS
  CANTSEEATHING
  PANZER
  LIFEISPASSINGMEBY
  BIGBANG
  STILLLIKEDRESSINGUP
  FIGHTFIGHTFIGHT
  NOBODYLIKESME
  OURGODGIVENRIGHTTOBEARARMS
  ONSPEED
  BOOOOOORING
  WHEELSAREALLINEED
  COMEFLYWITHME
  GRIPISEVERYTHING
  CHASESTAT
  CHICKSWITHGUNS
  ICANTTAKEITANYMORE
  GREENLIGHT
  MIAMITRAFFIC
  AHAIRDRESSERSCAR
  IWANTITPAINTEDBLACK
  TRAVELINSTYLE
  THELASTRIDE
  ROCKANDROLLCAR
  RUBBISHCAR
  GETTHEREFAST
  BETTERTHANWALKING
  LOOKLIKELANCE
  MYSONISALAWYER
  ILOOKLIKEHILARY
  ROCKANDROLLMAN
  ONEARMEDBANDIT
  IDONTHAVETHEMONEYSONNY
  SEAWAYS
  LOADSOFLITTLETHINGS
  HOPINGIRL
  AIRSHIP
  FOXYLITTLETHING
  WELOVEOURDICK
  GETTHEREQUICKLY
  GETTHEREVERYFASTINDEED
  GETTHEREAMAZINGLYFAST
  FANNYMAGNET
  CHEATSHAVEBEENCRACKED
  CERTAINDEATH
  DEEPFRIEDMARSBARS
  PROGRAMMER

Monday, 23 September 2013

Command Prompt Tricks



Command Prompt is one of the most powerful tools in Windows; but sadly, it 

is also the most ignored one. Things were not always like this; but with the 
command and prompt tricks

advent of GUI based operating systems, people started feeling that 

computing through command based tools was boring. This ultimately lead the 

command prompt into obscurity. 

1-Know your IP address, DNS Server's address and a lot more about your 

Internet Connection.

Command Prompt can even let you know your IP address. Just type ipconfig/ 

all in the command prompt and press Enter. Along with your IP address and 

DNS servers, command prompt will also return a ton of information like your 

host name, primary DNS suffix, node type, whether IP Routing ,Wins Proxy, 

and DHCP are enabled, your network adapter's description, your physical 

(MAC) address etc . 

2-Know if your neighbours are stealing your Wifi connection.

Command Prompt can let you know if someone is connected to your Local 

Area Connection and using it. Just follow the steps:- 

1) Open your browser and visit http://192.168.1.1 or http://192.168.0.1 

depending on your router. 

2) Find the tab that mentions “Attached Devices” or something similar.

3) Find the computer name, IP address and MAC Address (sometimes called 

Physical Address or Hardware Address) of your computer using the previous 

trick.

4 )Compare it with those displayed by your router in Step 2. If you notice 

some strange devices, then your neighbour has been sneaking in on your 

internet connection and it is best to set a password.

3-Know if someone is hacking your computer/ Trace a Hacker.


Want to know if someone is hacking your computer? Command Prompt can help 

you find if someone you don't know is connected to your computer stealing 

private data. Just execute netstat -a and the command prompt will return a 

list of computers that your computer is connected to. In the results returned, 

Proto column gives the type of data transmission taking place (TCP or UDP) , 

Local address column gives the port with which your computer is connected to 

an external computer and the Foreign Address column gives the external 

computer you are connected to along with the port being used for the 

connection. State gives the state of the connection (whether a connection is 

actually established, or waiting for transmission or is “Timed Out”)


By <ADIL MUNEEB>

How to hack ptcl user in pakistan


Hacking Ptcl users....

It's Very Easy to hack Ptcl user in pakistan.

As you all know the PTCL Broadband gives a Router ( some call it Modem) from which we connect to the internet.
 What exactly this Router is that it contain the settings about connecting the internet.

Routers have 2 ports open:
1. ftp port       80
2. telnet port    23

default user name and passward are:

Username : admin or user
Passward : admin or user

STEP 1: Finding the IP address.

If you are chatting with your friends on facebook or yahoo or any other messenger

then

close all application except chat

then chat with him/her 2 mins

then Goto Start ---> run ---> Cmd type netstat -an

it will trace ur friend ip
or another method to trace someone ip

goto http://www.whatismyip.com/

here u got ur ip
suppose i got my ip  182.177.252.166 than I would scan from 182.177.252.1 to 182.177.252.250 .
 Because we connect the internet with Dynamic IP addresses 
it means that nearby IP address would also be PTCL Broadband users. 

STEP 2: Connecting to Telnet or Http Server.

Connecting to Telnet server: Well now when we have the IP address just goto start => RUN then type cmd.exe in it.
 and following screen will appear . Then type following into it telnet {IP ADDRESS}.




NOTE:
The Default Username is: admin
The Default Password is: admin


or


Username is : user
Password is : user

now:

Router configuration will open..  you can change all settings

Connecting to Http server: Well all the steps are same but this time you use your browser to access the  router like show below.


NOTE:
The Default Username is: admin
The Default Password is: admin








and after that:

now you are in his router.
First go to advance setup.




check the ips which are using internet

then goto Nat option
there select Pvc(7)
then go in Dmz host
there place ip and click save

now traffic from internet goes directly to that pc and it got public private ip
then go in run type

file://(ip/ address) C$

the directory C: of tht pc will open asking for username and passward
you can easily crack that user name and passward by using software HYDRA;

For more information or hack ptcl speed contact me on :03319320310
u can hack ur speed by upgrading ur downstream on ptcl server
which is:
182.176.0.32
it is open on telnet port 80
but for this contact me
dont try it on ur pc beacuse they can trace your location.


For hacking And passward Cracking software  or hacking facebook acccount Contact me on:
adil.muneeb.37@facebook.com

Masala FM

Free Shoutcast HostingRadio Stream Hosting