How to Hack

Posted by Unknown On Tuesday, 26 November 2013 0 comments

Method 1 of 2: Before You Hack

  1. 1
    Learn a programming language. You shouldn't limit yourself to any particular language, but there are a few guidelines.
    • C is the language the Unix was built with. It (along with assembly language) teaches something that's very important in hacking: how memory works.
    • Python or Ruby are high-level, powerful scripting languages that can be used to automate various tasks.
    • Perl is a reasonable choice in this field as well, while PHP is worth learning because the majority of web applications use PHP.
    • Bash scripting is a must. That is how to easily manipulate Unix/Linux systems—writing scripts, which will do most of the job for you.
    • Assembly language is a must-know. It is the basic language that your processor understands, and there are multiple variations of it. At the end of the day, all programs are eventually interpreted as assembly. You can't truly exploit a program if you don't know assembly.
  2. 2
    Know your target. The process of gathering information about your target is known as enumeration. The more you know in advance, the fewer surprises you'll have.

EditMethod 2 of 2: Hacking

  1. 1
    Use a *nix terminal for commands. Cygwin will help emulate a *nix for Windows users. Nmap in particular uses WinPCap to run on Windows and does not require Cygwin. However, Nmap works poorly on Windows systems due to a lack of raw sockets. You should also consider using Linux or BSD, which are both more flexible, more reliable, and more secure. Most Linux distributions come with many useful tools pre-installed.
  2. 2
    Secure your machine first. Make sure you've fully understood all common techniques to protect yourself. Start with the basics — have you found a server hosting a site about illegal or possibly bad activity? Attempt to hack it in any way you can. Don't change the site, just make it yours.
  3. 3
    Test the target. Can you reach the remote system? While you can use the ping utility (which is included in most operating systems) to see if the target is active, you can not always trust the results — it relies on the ICMP protocol, which can be easily shut off by paranoid system administrators.
  4. 4
    Determine the operating system (OS). Run a scan of the ports, and try pOf, or nmap to run a port scan. This will show you the ports that are open on the machine, the OS, and can even tell you what type of firewall or router they are using so you can plan a course of action. You can activate OS detection in nmap by using the -O switch.
  5. 5
    Find a path or open port in the system. Common ports such as FTP (21) and HTTP (80) are often well protected, and possibly only vulnerable to exploits yet to be discovered.
    • Try other TCP and UDP ports that may have been forgotten, such as Telnet and various UDP ports left open for LAN gaming.
    • An open port 22 is usually evidence of an SSH (secure shell) service running on the target, which can sometimes be bruteforced.
  6. 6
    Crack the password or authentication process. There are several methods for cracking a password, including brute force. Using brute force on a password is an effort to try every possible password contained within a pre-defined dictionary of brute force software
    • Users are often discouraged from using weak passwords, so brute force may take a lot of time. However, there have been major improvenments in brute-force techniques.
    • Most hashing algorithms are weak, and you can significally improve the cracking speed by exploiting these weaknesses (like you can cut the MD5 algorithm in 1/4, which will give huge speed boost).
    • Newer techniques use the graphics card as another processor — and it's thousands of times faster.
    • You may try using Rainbow Tables for the fastest password cracking. Notice that password cracking is a good technique only if you already have the hash of password.
    • Trying every possible password while logging to remote machine is not a good idea, as it's easily detected by intrusion detection systems, pollutes system logs, and may take years to complete.
    • It's often much easier to find another way into a system than cracking the password.
  7. 7
    Get super-user privileges. Try to get root privileges if targeting a *nix machine, or administrator privileges if taking on Windows systems.
    • Most information that will be of vital interest is protected and you need a certain level of authentication to get it. To see all the files on a computer you need super-user privileges - a user account that is given the same privileges as the "root" user in Linux and BSD operating systems.
    • For routers this is the "admin" account by default (unless it has been changed); for Windows, this is the Administrator account.
    • Gaining access to a connection doesn't mean you can access everything. Only a super user, the administrator account, or the root account can do this.
  8. 8
    Use various tricks. Often, to gain super-user status you have to use tactics such as creating a buffer overflow, which causes the memory to dump and that allows you to inject a code or perform a task at a higher level than you're normally authorized.
    • In unix-like systems this will happen if the bugged software has setuid bit set, so the program will be executed as a different user (super-user for example).
    • Only by writing or finding an insecure program that you can execute on their machine will allow you to do this.
  9. 9
    Create a backdoor. Once you have gained full control over a machine, it's a good idea to make sure you can come back again. This can be done by backdooring an important system service, such as the SSH server. However, your backdoor may be removed during the next system upgrade. A really experienced hacker would backdoor the compiler itself, so every compiled software would be a potential way to come back.
  10. 10
    Cover your tracks. Don't let the administrator know that the system is compromised. Don't change the website (if any), and don't create more files than you really need. Do not create any additional users. Act as quickly as possible. If you patched a server like SSHD, make sure it has your secret password hard-coded. If someone tries to log-in with this password, the server should let them in, but shouldn't contain any crucial information.

Hacking - How to hack usernames and passwords - For Beginners ...


Please do not abuse this information. I debated if I should have posted this video or not
READ MORE

Top 10 Most Dangerous Computer Viruses Ever

Posted by Unknown On 0 comments

10. Nimda –

Nimda
Nimda first surfaced in 2001 and hastily rosed to the top. The name of the virus is derived from the word “Admin” spelled backwards. It just took 22 minutes for this dangerous virus to propagate via four different ways – e-mail, server vulnerabilities, shared folders and file transfer. The worm was released on September 18, 2001, a week after the 9/11 attacks which forced many people to believe that Nimda is a Cyber Terror attack as it quickly captured almost all the sources via which the virus can infect maximum number of computers. Albeit, the primary purpose of this virus was to slow down the internet traffic considerably causing a denial-in-service attack.

9. Conficker –

Conflicker
In 2009, a new computer worm Conficker also known as Downup, Domnadup and Kido crawled its way into as many as fifteen million Microsoft Windows operating systems around the world without human intervention using a patched Windows flaw. Conficker virus is very difficult to detect without running an upgraded version of original anti-virus and malware scanner. It might spread via removable drives like hard disks, smart phones and other thumb drives adding a corrupt file to it so that when the device is attached to another computer, the AutoPlay dialog box display an additional option. Conficker has assembled an army of zombies which has the potential to steal financial data and other important information from your system.

8. Storm Worm –

Storm-worm
The dreaded Storm Worm struck the cyber world as a malicious Trojan horse program in late 2006 when users began receiving e-mails with a subject line “230 dead as storm batters Europe.” It was without a doubt one of the most sophisticated and greatest cyber fraud networks ever constructed. It tricked the victims into clicking the fake links in an e-mail that was infected by the virus which could easily turn any Windows PC into a botnet, letting someone offsite operate it remotely for sending spam mails across the internet. In January 2007, it was estimated that out of all global malware infections, 8% is due to the Storm worm as the number of this dangerous malware infected PCs was close to 10 million.

7. CIH –

CIH
A destructive parasitic virus CIH also known as “Chernobyl” was first emerged in the year 1998 in Taiwan and quickly became one of the most dangerous and destructive viruses to ever hit with a payload that corrupts data. The CIH virus infects Windows 95 and 98 executable file and after doing that it remains a resident in the machine’s memory, where it infects other executables. Once activated, the virus annihilates the data on the hard disk and overwrites the computer’s Flash BIOS chip, rendering it completely inoperable and unless the chip is reprogrammed the user will not be able to boot the machine at all. Although with increased awareness and advancement in technology the virus does not pose a serious threat today but we can never forget the $250 million worth of destruction it caused.

6. Melissa –

Melissa
Melissa was the first mass-mailing macro virus for the new age of e-mailing which became the breaking news across the world on March 26, 1999. The estimated damage accounted to 300 to 600 million dollars after which FBI launched the largest internet manhunt ever to catch the author of Melissa – David L. Smith which of-course they did and after the arrest, he was sentenced 20 months in federal prison and was ordered to pay a fine of $5000 for unleashing the fastest virus of its time. The virus was distributed as an e-mail attachment and when the attachment “list.doc” is clicked upon, the virus seeks for the Microsoft Outlook address book to e-mail itself to the first 50 names on the list with a message “Here is that document you asked for…don’t show anyone else. ;-) ”

5. SQL Slammer –

SQL-Slammer
SQL Slammer, a standalone malicious program also known as “Sapphire” appeared at the starting of the year 2003 and was the first fileless worm which rapidly infected more than 75000 vulnerable hosts within10 minutes on 25th January. Through a classic denial of service attack, it dramatically slowed down global internet traffic and brought down South Korea’s online capacity on knees for 12 hours. Sapphire mainly targeted on the servers by generating random IP addresses and discharging the worm to those IP addresses. The abrupt release of infected network packets had a huge impact on the significant services provided by Bank of America’s ATMs, Seattle’s 911 emergency response systems and Continental airlines. All in all, the worm caused between $950 million and $1.2 billion in lost productivity which is not much compared to what would have happened if it erupted on a week day and not on a Saturday.

4. Code Red –

Code-Red
In the summer 2001, a computer worm most commonly referred to as “Code Red” was unleashed on the network servers on July 13. It was a very sneaky virus which took advantage of a flaw in Microsoft Internet Information Server. This virus was for the first time detected by two of the eEye Digital Security employees and at the time when they found out about the virus, they were drinking Code Red Mountain Dew; hence the name “Code Red.”  The interesting thing about this deadly virus is, it did not require you to open an e-mail attachment or run a file; it simply needed an active internet connection with which it defaces the webpage you open and display a text string “Hacked by Chinese!”  In less than a week “Code Red” brought down more than 400,000 servers including the White House web server. It’s estimated that the total damage was of approximately $2.6 billion dollars with as many as one million computers hit by the virus.

3. Sobig F –

Sobig F
August 2003 turned out to be the miserable month for corporate and domestic computer operators around the world as the sixth and most destructive deviant of Sobig series hit the internet. Sobig F infected host computers by fooling the users that the corrupt e-mail they received is from a legitimate source. If the user opens the attachment it exposes a security hole in the system allowing the intruder to send messages via the trapped user’s e-mail address. Within 24 hours, Sobig F set a record of replicating more than one million copies of itself which later was broken by yet another mass mailer worm – My Doom. However, Sobig F caused an extensive damage of $3 billion – $4 billion leaving infections in over 2 million PCs worldwide.

2. ILOVEYOU –

ILOVEYOU
Back in 2000, one of the trickiest computer malware ever was detected on May 4 in Philippines. Around 10% of the internet users committed a huge mistake by going on the name of this hazardous worm. The virus played on a radical human emotion of the need to be loved because of which it became a global pandemic in only one night. The bug was transmitted via e-mail having a subject line “ILOVEYOU” – a notion appealing to many of us with an attached file to it which reads as – Love-Letter-For-You.TXT.vbs. As soon as the file was opened, the virus took the liberty of e-mailing itself to the first 50 contacts present in the Windows address book and also infected the multimedia files saved in the system causing damages that amounted to $5.5 billion.

1. My Doom –

MyDoom
My Doom explored its way to the malware world on 26th January 2004 and sent a shockwave around the world as it scattered exponentially via e-mail with random senders’ addresses and subject lines. My Doom also known as “Novarg” is reported to be the most dangerous virus ever released, breaking the previous record set by the Sobig F worm. My Doom swiftly infected some two million computers and instigated a huge denial of service attack which smashed the cyber world for sometime. It transmitted itself in a particularly deceitful manner through e-mail as what receiver would first reckon to be a bounced error message as it reads “Mail Transaction Failed.” But, as soon as the message is clicked upon, the attachment is executed and the worm is transferred to e-mail addresses found in user’s address book. The damage caused by this fastest-spreading mass mailer worm was a whopping $38 billion.

READ MORE

Web design tips

Posted by Unknown On Monday, 2 September 2013 0 comments

Top 10 Internet tips and tricks

Posted by Unknown On 0 comments

You don't need the http:// portion of a web page
When typing an Internet address you do not need to type http:// or even www. in the address. For example, if you wanted to visit Computer Hope you could just type computerhope.com and press enter. To make things even quicker, if you're visiting a .com address you can type computerhope and then press Ctrl + Enterto type out the full http://www.computerhope.com address.
Quickly move between the fields of a web page
If you're filling out an online form, e-mail, or other text field you can quickly move between each of the fields by pressing the Tab key or Shift + Tab to move back a field. For example, if you're filling out your name and the next field is your e-mail address you can press the Tab key to switch to the e-mail field.
Tip: This tip also applies to the buttons, if you press tab and the web developer has designed correctly the button should be selected and will allow you to press the space bar or enter to push the button.
Tip: If you have a drop-down box that lists every country or every state you can click that box and then press the letter of the state or country you're looking for. For example, is a drop-down box of States in the United States you could press u on the keyboard to quickly scroll to Utah.
Use Internet search engines to their full potential
Make sure to get the most out of every search result. If you're not finding what you want try surrounding the text in quotes. For example, if you were searching for 'computer help' this actually searches for pages that contain both computer and help and not necessarily pages that have computer and help next to each other. If you search for "computer help" with the quotes around the search query this will only return pages that actually have computer and help next to each other.
Tip: Many new computer users also don't realize that in every search box you can press enter instead of having to move the mouse button over to the Search button.
Protect yourself and avoid bad web sites
Know your Internet browser shortcuts
There are dozens of different shortcut keys that can be used with Internet browsers. Below are a few of our top suggested Internet browser shortcuts.
- Pressing Alt + D in any major Internet browser will move the cursor into the address bar. This is a great way to quickly enter an Internet address without having to click the mouse cursor in the address bar.
- Hold down the Ctrl key and press the + or - to increase and decrease the size of text.
- Press the backspace key or hold down the Alt key + left arrowto go back a page.
- Press F5 to refresh or reload a web page.
- Press F11 to make the Internet browser screen full screen. Press F11 again to return back to the normal view.
- Press Ctrl + B to open your Internet bookmarks.
- Press Ctrl + F to open the find box in the browser to search for text within the web page you're looking at.
Take advantage of tabbed browsing
Take full advantage of tabbed browsing in all Internet browsers today. While reading any web page if you come across a link you may be interested in open that link in a new tab so it can be viewed later. A new tab can be opened by holding down the Ctrl key and clicking the link or if you have a mouse with a wheel click the link with the middle mouse button.
Try alternative browsers
Most computer users use the default browser that comes included with the computer, with Microsoft Windows this is Internet Explorer. There are several great alternative browsers that are all free to download and use and may have features your current browser does not include. Below are a few of our favorites, try one or try them all.
Install plugins and add-ons
Each of the above alternative browsers also have a large community of volunteers who develop add-ons and plugins that can be added into the browser. Each of these browsers have hundreds of thousands of these add-ons that can do such things as giving you live weather in your browser window, changing its color, and adding additional functionality.
Make sure your browser and its plugins are up-to-date
Each Internet browser can have several additional plugins that give it additional functionality. For example, Adobe Flash is a great way to bring movies and other animated content to the Internet. Keeping these plugins up-to-date is vital for your computer stability and also security. Using the below tool you can quickly verify if your plugins are up-to-date and get links to where to download the latest updates.
Use online services
There are hundreds of free online services that can help make using your computer easier, more productive, and more enjoyable. See our top 10 online services for a listing of our favorites.

READ MORE

How to add stylish customised subheadings to blogger

Posted by Unknown On Saturday, 31 August 2013 0 comments

image
Headings and subheadings are one of the most important parts in a post.Usually the readers don’t have the patience to read the complete post in one go.When the headings and subheadings of the post are attractive the readers may like to read it and the posts will be impressive.Also it gives a nice layout to the post,it will be very helpful to retain the visitors to the blog.
So for this,you should ensure that your headings and subheadings looks beautiful and stylish.For this I’ll show you how to make your headings,subheadings and minor headings stylish by CSS hover effect with colorful borders.
Please follow the below simple steps:
Customize your post title.
  • Go to blogger dashboard>Design>Edit HTML
  • Now press ctrl+f and find .post h3 and replace all of its contents with the code below.
/* The creator of this code is www.vmtricks.blogspot.com.com please don't change any thing without owner permisson */ .post h3 { text-align:left; font-size: 18px; font-family: Oswald; font-weight:normal; color:#000; padding: 3px 10px 3px 10px; text-shadow: 0 1px 0 #CCC; border: 3px solid #980303 ; -moz-border-radius: 90px; -webkit-border-radius: 90px; border-radius: 90px;-moz-box-shadow: 0 1px 2px #5bb5f0, 1px 1px 0 rgba(255, 255, 255, 0.4) inset; -webkit-box-shadow: 0 1px 2px #5bb5f0, 1px 1px 0 rgba(255, 255, 255, 0.4) inset; box-shadow: 0 1px 2px #5bb5f0, 1px 1px 0 rgba(255, 255, 255, 0.4) inset; margin: 15px 3px; text-transform: uppercase; line-height: 1.3; background:white; transition:background 2s; -moz-transition:background 2s; /* Firefox 4 */ -webkit-transition:background 2s; /* Safari and Chrome */ -o-transition:background 2s; /* Opera */ } .post h3 a, #content h1 a:visited { color: #000; font-size:17px; font-family: Georgia, Times New Roman; font-weight: normal; margin: 0 0 2px; padding: 4px 0 0; } .post h3:hover { color:#FFF; font-size:18px; text-decoration: none; background:red; border: 3px solid #000; }
Customize your subheadings
  • Go to blogger dashboard>design>Edit HTML
  • Press Ctrl +F.Find .post h2 and replace it with the following code below.
.post h2 { background: url("http://aux3.iconpedia.net/uploads/6930445441486693898.png") norepeat 2px center transparent; font-size: 20px; font-family: Oswald; font-weight:normal; padding: 3px 10px 3px 10px; color: #0274be; background:white; border: 3px solid #5bb5f0; text-shadow: 0 1px 0 #CCC; -moz-border-radius: 60px; -webkit-border-radius: 60px; border-radius: 60px; -moz-box-shadow: 0 1px 3px #5bb5f0, 1px 1px 0 rgba(255, 255, 255, 0.4) inset; -webkit-box-shadow: 0 1px 3px #5bb5f0, 1px 1px 0 rgba(255, 255, 255, 0.4) inset; box-shadow: 0 1px 3px #5bb5f0, 1px 1px 0 rgba(255, 255, 255, 0.4) inset; margin: 15px 3px; text-transform: uppercase; line-height: 1.3; transition:background 2s; -moz-transition:background 2s; /* Firefox 4 */-webkit-transition:background 2s; /* Safari and Chrome */ -o-transition:background 2s; /* Opera */ } .post h2:hover { background: url("http://aux3.iconpedia.net/uploads/6930445441486693898.png") norepeat 6px center transparent; background:#06F; color:#FFF; border-color:#FFF; }
Customise your minor headings
Minor headings in blogger use h4 tags.For its customization:
.post h4 { background-size:20px 20px; font-size: 12px; font-family: Oswald; font-weight:normal; padding: 3px 10px 3px 10px; color: #0274be; border: 2px solid #CCC; text-shadow: 0 1px 0 #CCC; -moz-border-radius: 30px; -webkit-border-radius: 30px; border-radius: 30px; -moz-box-shadow: 0 1px 3px #5bb5f0, 1px 1px 0 rgba(255, 255, 255, 0.4) inset; -webkit-box-shadow: 0 1px 3px #5bb5f0, 1px 1px 0 rgba(255, 255, 255, 0.4) inset; box-shadow: 0 1px 3px #5bb5f0, 1px 1px 0 rgba(255, 255, 255, 0.4) inset; margin: 15px 3px; text-transform: uppercase; line-height: 1.3; transition:border 2s; -moz-transition:border 2s; /* Firefox 4 */ -webkit-transition:border 2s; /* Safari and Chrome */ -o-transition:border 2s; /* Opera */ } .post h4:hover { border:#5bb5f0; }
  • That’s all guys.Enjoy!!!!!!!!!!!!
    For further help just comment down below.We will be releasing more stylish headings
    and more demanded tutorials and tricks soon.So stay updated and subscribe to our blog
    I hope you liked this tutorial.
    For any related queries please comment below.
READ MORE
Adobe CC All products _Activator_vmtricks
Adobe CC All Products Keygen/Crack/Activator For Windows Free Download here.
Hey guys after some interval we are here to provide you the latest keygen or crack for the recently released adobe CC products.CC stands for Creative Cloud which is the next generation of creative tools.Hundred s of brand new features are included in the CC version of all products by Adobe.So grab it as soon as possible and enjoy the Power of Creative Cloud Products without any limitations and restrictions.Give us a feedback of the newest keygen/crack including your suggestions and views.


Using this Keygen/Crack you can Activate :
  • Adobe Photoshop CC
  • Adobe Premiere Pro CC
  • Adobe After Effects CC
  • Adobe Illustrator CC
  • Adobe Dreamweaver CC
  • Adobe Flash Professional CC
  • Adobe InCopy CC
  • Adobe InDesign CC 
  • Adobe Audition CC
  • Adobe Prelude CC
  • Adobe SpeedGrade CC

Note : Password for Rar file: vmtricks.blogspot.com (If Required)

Download Link (Mediafire)


You Might Also Like : Adobe Premiere Pro CC 7.0.0

Tags: 
READ MORE