Thursday, 28 March 2013

Seven Tools For Every Hacker


1. Nmap
Nmap (Network Mapper) is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use,and dozens of other characteristics. It may be used to discover computers and services on a computer network, thus creating a "map" of the network.Nmap runs on most types of computers and both console and graphical versions are available. Nmap is free and open source.

2. Nessus Remote Security Scanner
Works with a client-server framework. Nessus is the worlds most popular vulnerability scanner used in over 75,000 organizations world-wide. Many of the worlds largest organizations are realizing significant cost savings by using Nessus to audit business-critical enterprise devices and applications.

3. Wireshark
Wireshark is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Wireshark features that are missing from closed-source sniffers. Works great on both Linux and Windows (with a GUI), easy to use and can reconstruct TCP/IP Streams! .

4. Cain and Abel
The swiss knife of hacking tools. Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols.The program does not exploit any software vulnerabilities or bugs that could not be fixed with little effort.

5. Kismet
Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring (rfmon) mode, and can sniff 802.11b, 802.11a, and 802.11g traffic. A good wireless tool as long as your card supports rfmon

6. NetStumbler
It is decent wireless tool for Windows! Sadly not as powerful as it’s Linux counterparts, but it’s easy to use and has a nice interface, good for the basics of war-driving. NetStumbler is a tool for Windows that allows you to detect Wireless Local Area Networks (WLANs) using 802.11b, 802.11a and 802.11g. It has many uses: Verify that your network is set up the way you intended.
Find locations with poor coverage in your WLAN. Detect other networks that may be causing interference on your network. Detect unauthorized rogue access points in your workplace. Help aim directional antennas for long-haul WLAN links. Use it recreationally for WarDriving.

7. SuperScan
Powerful TCP port scanner, pinger, resolver. SuperScan 4.1 is an update of the highly popular Windows port scanning tool, SuperScan. If you need an alternative for nmap on Windows with a decent interface, I suggest you check this out, it’s pretty nice.

Thursday, 21 March 2013

Types of Attacks in Hacking

Operating System Attack : Operating system attack is attack done on specific type of OS. Such attack is done using flaws in programs and services shipped with OS.

Application level Attack : Application level attack is done over faulty coding practices done over software during its development.

Shrink Wrap Code Attack : Shrink Wrap Code attack are attacks done over UN-refined scripts used for making task simpler.


Misconfiguration Attack : misconfiguration attack, it is kinda attack which is done over mis-configured system or a system with default settings.

Thursday, 14 March 2013

Terminologies Used Under Hacking

Threat: A threat is an environment or situation that could lead to a potential
breach of security. Ethical hackers look for and prioritize threats when
performing a security analysis.

An Exploit: An exploit is a piece of software that takes advantage of a bug,
glitch, or vulnerability, leading to unauthorized access, privilege escalation, or
denial of service on a computer system.

Vulnerability: A vulnerability is an existence of a software flaw, logic design,
or implementation error that can lead to an unexpected and undesirable
event executing bad or damaging instructions to the system. In easy word
vulnerability is weakness in system.

Payload: Payload is agent that helps in taking advantage of vulnerability in
remote hacking.

Attack: An attack occurs when a system is compromised based on a vulnerability.

Types of Hacking

Local Hacking: This type of hacking is done when a hacker has full access to
the system to implant a virus, keylogger and RATs.

Remote Hacking: Remote hacking is done on a remote system using
Internet.

Social Engineering: Social Engineering is kind of interacting skill that a hacker
uses to manipulate people giving out sensitive information. Its kind of trick

done using good verbal, social skills and understanding.

How to download YouTube videos by using VLC player


Firstly copy the URL of the YouTube video
Open the VLC player
Go to media.
Click on open network stream.
Paste the URL in the provided box and click play.
While video starts playing, go to tools and click on codec information.
Copy the location of the video.
Paste it in the search bar your browser, preferably chrome.
Right click on the page and click save as for download the video.
The browser will download the video for you.

Thursday, 7 March 2013

How to Become a Hacker

If you want to make your career in hacking then you must have these skills.
You must have the complete software knowledge and a little of hardware is enough. You must understand how the hardware stuff works, the hard disk, the RAM and the most important the mother board.
You need to have a very good programming skills. Because you can break it only when you can make it. You need to know all the scripting languages, most of them.
These are few programming and scripting languages which a hacker must have a sound knowledge on!

1. C++ programming

2. JavaScript

3. Python programming

4. MySQL

5. PHP

6. Perl and Pascal

7. Assembly language

8. Basics of HTML, CSS, ASP  and Java

Now suppose, you know all of the stuff which I have mentioned above, you thing you are a hacker now?. No, not at all you just are a programmer not a hacker yet. What I mean is you just learn to make it not to break yet.

So what’s your next step? It's to go ahead and experiment on these stuff, remember to be creative every time you start experimenting!

The Difference between A Programmer, A Hacker and A Developer


A Programmer is someone who can solve problems by manipulating computer code. They can have a wide range of skill levels from just being “ok” with basic scripting to being an absolute sorcerer with any language.

A Hacker is someone who makes things. In this context, it’s someone who makes things by programming computers. This is the original, and purest definition of the term, i.e., that you have an idea and you “hack” something together to make it work. It also applies to people who modify things to significantly change their functionality, but less so.

A Developer is a formally trained programmer. They don’t just solve problems or create things, but do so in accordance with a set of design and implementation principles. These include things like performance, maintainability, scale, robustness, and (ideally) security.
Twitter Bird Gadget