Sponsors

Tuesday, 24 June 2014

How To Hack Facebook Account By using BT5

Now am going to teach about a simple hacking trick by Using Back Track 5. This trick can be applied in local networks.It is just for gaining knowledge and  education purpose only.

Step 1: Run  BT 5 (OS) And go to  Application Launcher Menu Then click BackTrack. 


Step 2: Then go to Exploitation Tools -------> Social Engineering Tools ------> Social Engineering Tool kit
--------> Set 


Step 3: Then Konsole Terminal will be open.Then Enter your Choice 2 (Website Attack Vectors ).
           


Step 4: Then Enter your Choice 4 ( Tabnabbing Attack Method)
            Tabnabbing is like Phishing type of attack.This attack creates a clone page of the site which has to be attacked.


Step 5: Then Enter Number 2 ( Site Cloner) 
            In this step Entered URL will be Cloned 


Step 6: Enter the URL which has to be cloned like Facebook or G mail etc....


Step 7: Then Enter the Port Number (Eg: 80)


Step 8: Then open any Browser and Enter the local IP address like 192.1.1.3 
             Now the cloning process of the entered site will be going on 


Step 9: Now Cloned page will be appeared on the Screen 
            If any body enter their Username and Password on the cloned page, that will be traced by the BT. 


Step 10: This process working in local area network only. The hacked Username and Password will be shown like this..This type of attack can be applied in G mail and Yahoo etc...











Monday, 23 June 2014

How Make Trojan Backdoor by using Beast

Step 1:- Download the necessary software  Beast 2.06


Step 2:- Open the software



Step 3:- Now click on “Build server “button.

Step 4:- Now in this window click on the notifications tab.

Step 5:- In the notifications tab click on the e-mail button.

Step 6:- Now In this window fill your proper and valid email id.





Step 7:- Now go to “AV-FW kill” tab.

Step 8: – Now In this put a tick mark on the 3“disable XP firewall “.



Step 9:-Now click on “EXE icon” tab.




Step 10:- Select any icon and click on the ”Save Server” button and the Trojan will be made.



Step 11:-Now send this Trojan File to victim.

Step 12:- As and when the victim will install the Trojan on his system you will get a notification e-mail on your specified e-mail id while making the Trojan. This Email consists of the IP address and port of the victim.

Step 13:-Put This IP address and Port in the place shown in the below snap-shot.



Step 14:- After That Click on the “Go Beast” Button and You will be connected to victims PC.

Tuesday, 10 June 2014

Lesson-1

Introduction To C:
  • The C is a general-purpose, procedural, imperative computer programming language developed in 1972 by Dennis M. Ritchie at the Bell Telephone Laboratories to develop the UNIX operating system.
  •  The Unix operating system and virtually all Unix applications are written in the C language. C has now become a widely used professional language for various reasons.

    1. Easy to learn
    2. Structured language
    3. It produces efficient programs.
    4. It can handle low-level activities.
    5. It can be compiled on a variety of computers.
     
Facts about C
  • C was invented to write an operating system called UNIX.
  • C is a successor of B language which was introduced around 1970The language was formalized in 1988 by the American National Standard Institue (ANSI).
  • By 1973 UNIX OS almost totally written in C.
  • Today C is the most widely used System Programming Language.
  • Most of the state of the art software have been implemented using C
Why to use C ?

  • C was initially used for system development work, in particular the programs that make-up the operating system. C was adoped as a system development language because it produces code that runs nearly as fast as code written in assembly language. Some examples of the use of C might be:

  1. Operating Systems
  2. Language Compilers
  3. Assemblers
  4. Text Editors
  5. Print Spoolers
  6. Network Drivers
  7. Modern Programs
  8. Data Bases
  9. Language Interpreters
  10. Utilities
C Program File
  • All the C programs are writen into text files with extension ".c" for example hello.c. You can use "vi" editor to write your C program into a file.
  • This tutorial assumes that you know how to edit a text file and how to write programming insturctions inside a program file.

C Compilers
  • When you write any program in C language then to run that program you need to compile that program using a C Compiler which converts your program into a language understandable by a computer. This is called machine language (ie. binary format). So before proceeding, make sure you have C Compiler available at your computer. It comes alongwith all flavors of Unix and Linux.

  • If you are working over Unix or Linux then you can type gcc -v or cc -v and check the result. You can ask your system administrator or you can take help from anyone to identify an available C Compiler at your computer.

  • If you don't have C compiler installed at your computer then you can use below given link to download a GNU C Compiler and use it.

Getting Set Up - Finding a C-Compiler

  • The very first thing you need to do, before starting out in C, is to make sure that you have a compiler. What is a compiler, you ask? A compiler turns the program that you write into an executable that your computer can actually understand and run. If you're taking a course, you probably have one provided through your school. 
  • If you're starting out on your own, your best bet is to use Code::Blocks with MinGW. If you're on Linux, you can use gcc, and if you're on Mac OS X, you can use XCode. If you haven't yet done so, go ahead and get a compiler set up--you'll need it for the rest of the tutorial. 

Or 

Basic Of C-Language

Introduction and Basic C Features


  • Intro to C
  • If statements
  • Loops in C
  • Functions and Program Organization
  • Switch case 
Pointers, Arrays and Strings

  • Pointers
  • Structures
  • Arrays
  • C-style Strings
File IO and command line arguments

  • C File I/O
  • Typecasting
  • Command line arguments
Linked lists, binary trees, recursion

  • Linked Lists
  • Recursion
  • Variable argument lists
  • Binary Trees