Search Google for hacking

Monday 29 May 2017

Hacking using just Image 😓

Next time when someone sends you a photo of a cute cat or a hot chick than be careful before you click on the image to view — it might hack your machine.

Yes, the normal looking images could hack your computers — thanks to a technique discovered by security researcher Saumil Shah from India.

Dubbed "Stegosploit," the technique lets hackers hide malicious code inside the pixels of an image, hiding a malware exploit in plain sight to infect target victims.

Just look at the image and you are HACKED!

Shah demonstrated the technique during a talk titled, "Stegosploit: Hacking With Pictures," he gave on Thursday at the Amsterdam hacking conference Hack In The Box.

According to Shah, "a good exploit is one that is delivered in style."

Keeping this in mind, Shah discovered a way to hide malicious code directly into an image, rather than hiding it in email attachments, PDFs or other types of files that are typically used to deliver and spread malicious exploits.

To do so, Shah used Steganography — a technique of hiding messages and contents within a digital graphic image, making the messages impossible to spot with the naked eye.

Here's How to Hack digital pictures to send malicious exploits:


Until now Steganography is used to communicate secretly with each other by disguising a message in a way that anyone intercepting the communication will not realise it's true purpose.

Steganography is also being used by terrorist organisations to communicate securely with each other by sending messages to image and video files, due to which NSA officials are forced to watch Porn and much porn.

However in this case, instead of secret messages, the malicious code or exploit is encoded inside the image’s pixels, which is then decoded using an HTML 5 Canvas element that allows for dynamic, scriptable rendering of images.

The "Secret Sauce" behind Stegosploit — this is what Shah calls it.


"I don’t need to host a blog," Shah told Motherboard, "I don’t need to host a website at all. I don’t even need to register a domain. I can [just] take an image, upload it somewhere and if I just point you toward that image, and you load this image in a browser, it will detonate."
The malicious code, dubbed IMAJS, is a combination of both image code as well as JavaScript hidden into a JPG or PNG image file. Shah hides the malicious code within the image’s pixels, and unless somebody zoom a lot into it, the image looks just fine from the outside.


Video Demonstration:


Shah demonstrated to Lorenzo Franceschi of Motherboard exactly how his hack works. He used Franceschi’s profile picture and then prepared a demonstration video using his picture as the scapegoat.

In the first video presentation, Shah shows a step by step process on how it is possible to hide malicious code inside an image file using steganography technique. You can watch the video given below:



In the second video, Shah shows how his Stegosploit actually works. His exploit works only when the target opens the image file on his or her web browser and clicks on the picture.

You are HACKED!

Once the image is clicked, the system’s CPU shoots up to 100 percent usage, which indicates the exploit successfully worked. The malicious code IMAJS then sends the target machine’s data back to the attacker, thereby creating a text file on the target computer that says — "You are hacked!"



Shah also has programmed his malicious image to do more stealthy tasks, like downloading and installing spyware on victim’s machine, as well as stealing sensitive data out of the victim’s computer.

The bottom line here is:


You should not presume the image files as "innocent" anymore, as they can hide malicious code deep inside its pixels that could infect your computers.

Therefore, always make sure before you click on one.


Shah has been working on the research [PDF] during his spare time for almost five years, but he has not tested his technique on popular image sharing websites like Dropbox or Imgur. He also admitted that his method might not work everywhere.

Friday 26 May 2017

Top 10 hacker Tools


Hacker Tools Top Ten Our recommended pentesting tools for 2017

Welcome to our Hacker Tools list of 2017…
Since 2014 we’ve listed the web’s favorite hacking/ pentesting tools as used by hackers, geeks and security engineers. This list sprung to life when we organized an online poll that was very well received and the below recommended tools are a result of what our community voted as the ‘Top Ten List of Hacking Tools’. We’ve organized this list by including information and links to training courses for each of these tools as well as books, training course and additional information that we think will help you learn!
Our more extensive list of hacking tools is located here that include tools from the following hacking/ pentesting categories: Application Specific Scanners, Debuggers, Encryption Tools, Firewalls, Forensics, Fuzzers, Intrusion Detection Systems, Multi Purpose Tools, Packet Crafting Tools, Packet Sniffers, Password Crackers, Port Scanners, Linux Hacking Distros, Rootkit Detectors, Traffic Monitoring Tools, Vulnerability Exploitation Tools, Vulnerability Scanners, Web Browser Related Tools, Web Proxies, Web Vulnerability Scanners and Wireless Hacking Tools.
Also….remember!All these tools come bundled in pentesting Linux distro’s such as Kali Linux or BackBox, so we’d certainly recommend that you install an appropriate Linux hacking box to make your life easier – not least because repositories are (automatically) updated.

Nmap (Network Mapper) | Free

Used to Scan Ports and Map Networks - and a whole bunch more!

Nmap is an abbreviation of 'Network Mapper', and it's very well known free open source hackers tool. Nmap is mainly used for network discovery and security auditing. Literally, thousands of system admins all around the world will use nmap for network inventory, check for open ports, manage service upgrade schedules, and monitor host or service uptime. Nmap, as a tool uses raw IP packets in creative ways to determine what hosts are available on the network, what services (application name and version) those hosts are providing information about, what operating systems (fingerprinting) and what type and version of packet filters/ firewalls are being used by the target. There are dozens of benefits of using nmap, one of which is that fact that the admin user is able to determine whether the network (and associated nodes) need patching. Nmap's been featured in literally every hacker movie out there, not least the recent Mr. Robot series. It's also worth mentioning that there's a GUI version of Nmap called 'Zenmap'. We'd advise you to learn using Nmap (i.e. the 'command line') then rotate into Zenmap when you are feeling all confident.

Metasploit Penetration Testing Software | Free & Paid

Vulnerability Exploitation Tool

The Metasploit Project is a hugely popular pentesting or hacking framework. If you are new to Metasploit think of it as a 'collection of hacking tools and frameworks' that can be used to execute various tasks. Widely used by cybersecurity professionals and ethical hackers this is a tool that you have to learn. Metasploit is essentially a computer security project (framework) that provides the user with vital information regarding known security vulnerabilities and helps to formulate penetration testing and IDS testing plans, strategies and methodologies for exploitation. There's a ton of incredibly useful Metasploit information out there and we hope that the books that we've chosen go someway to help you on your journey, not least if you are a beginner just starting out and looking for beginners tutorials in how to use Metasploit.

John The Ripper | Free

Password Cracking Tool

John the Ripper (often you'll see abbreviated as 'JTR') wins the award for having the coolest name. John the Ripper, mostly just referred to as simply, 'John' is a popular password cracking pentesting tool that is most commonly used to perform dictionary attacks. John the Ripper takes text string samples (from a text file, referred to as a 'wordlist', containing popular and complex words found in a dictionary or real passwords cracked before), encrypting it in the same way as the password being cracked (including both the encryption algorithm and key), and comparing the output to the encrypted string. This tool can also be used to perform a variety of alterations to dictionary attacks. If you are somewhat confused between John the Ripper and THC Hydra then think of John the Ripper as an 'offline' password cracker whilst THC Hydra is an "online" cracker.

THC Hydra | Free

Password Cracking Tool

We've purposely placed THC Hydra underneath John The Ripper because they often go 'hand-in'hand'. THC Hydra (we've abbreviated to simply 'Hydra' throughout our site) is a hugely popular password cracker and has a very active and experienced development team. Essentially THC Hydra is a fast and stable Network Login Hacking Tool that will use dictionary or brute-force attacks to try various password and login combinations against an log in page. This hacking tool supports a wide set of protocols including Mail (POP3, IMAP, etc.), Databases, LDAP, SMB, VNC, and SSH. Take a look at John the Ripper as well.

OWASP Zed | Free

Web Vulnerability Scanner

The Zed Attack Proxy (ZAP) is now one of the most popular OWASP projects. The fact that you've reached this page means that you are likely already a relatively seasoned cybersecurity professional so it's highly likely that you are very familiar with OWASP, not least the OWASP Top Ten Threats listing which is considered as being the 'guide-book' of web application security. This hacking and pentesting tool is a very efficient as well as being an 'easy to use' program that finds vulnerabilities in web applications. ZAP is a popular tool because it does have a lot of support and the OWASP community is really an excellent resource for those that work within Cyber Security. ZAP provides automated scanners as well as various tools that allow you the cyber pro to discover security vulnerabilities manually. Understanding and being able to master this tool would also be advantageous to your career as a penetration tester. If you are a developer then you have it's obviously highly recommended that you learn how to become very proficient with this 'hacker tool!'

Wireshark | Free

Web Vulnerability Scanners

Wireshark is a very popular pentesting tool and for over a year it was not included on our list, however, by popular demand we added it in late June 2016. Wireshark essentially captures data packets in a network in real time and then displays the data in human-readable format (verbose). The tool (platform) has been highly developed and it includes filters, color-coding and other features that lets the user dig deep into network traffic and inspect individual packets. If you'd like to become a penetration tester or work as a Cyber Security practioner, then learning how to use Wireshark is a must. There are a ton of resources out there to learn Wireshark, and, of particular interest, there's also a Wireshark Certification which you can achieve and place on your LinkedIn profile.

Aircrack-ng | Free

Password Cracking Tool

The Aircrack suite of Wifi (Wireless) hacking tools are legendary because they are very effectively when used in the right hands. For those new to this wireless-specific hacking program, Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking hacking tool that can recover keys when sufficient data packets have been captured (in monitor mode). For those tasked with penetrating and auditing wireless networks Aircrack-ng will become your best friend. It's useful to know that Aircrack-ng implements standard FMS attacks along with some optimizations like KoreK attacks, as well as the PTW attacks to make their attacks more potent. If you are a mediocre hacker then youll be able to crack WEP in a few minutes and you ought to be pretty proficient at being able to crack WPA/ WPA2. For those interested in Wireless Hacking we'd also highly recommend taking a look at the very awesome Reaver, another very popular hacking tool that alas we couldn't add to our list.

Maltego | Free & Paid

Digital Forensics

Maltego is different in that it works within a digital forensics sphere. Maltego is a platform that was designed to deliver an overall cyber threat picture to the enterprise or local environment in which an organization operates. One of the awesome things about Maltego which likely makes it so popular (and included in the Kali Linux Top Ten) is its's unique perspective in offering both network and resource based entities is the aggregation of information sourced throughout the web - whether it's the current configuration of a vulnerable router within a network or the current whereabouts of your staff members on their international visits, Maltego can locate, aggregate and visualize this data! For those interested in learning how to use Maltego we'd also recommend learning about OSINT cybersecurity data procurement.

Cain and Abel Hacking Tool | Free

Password Cracker/ Password Hacking

Cain and Abel (often simply abbreviated to Cain) is a hugely popular hacking tool and one that is very often mentioned online in a variety of 'hacking tutorials'. At its' heart, Cain and Abel is a password recovery tool for Microsoft Windows but it can be used off-label in a variety of uses, for example, white and black hat hackers use Cain to recover (i.e. 'crack') many types of passwords using methods such as network packet sniffing and by using the tool to crack password hashes. Cain, for example, when used to crack password hashes would use methods such as dictionary attacks, brute force, rainbow table attacks and cryptanalysis attacks.

Nikto Website Vulnerability Scanner | Free

Website Vulnerability Scanner Hacking Tool

Nikto is another classic 'Hacking Tool' that a lot of pentesters like to use. Worth mentioning that Nickto is sponsored by Netsparker (which is yet another Hacking Tool that we have also listed in our directory). Nikto is an Open Source (GPL) web server scanner which is able to scan and detect web servers for vulnerabilities. The system searches against a database of over 6800 potentially dangerous files/ programs when scanning software stacks. Nikto, like other scanners out there, also scans for outdated (unpatched) versions of over 1300 servers, and version specific problems on over 275 servers. Interestingly, Nikto can also check server configuration items such as the presence of multiple index files, HTTP server options, and the platform will also try to identify installed web servers and web applications. Nikto will get picked up by any semi-decent IDS tool so its' really useful when conducting a white-hat/ white-box pentest. Certainly a great tool to learn your skills on when attacking an open box for training.

Monday 22 May 2017

7 Best CMD Commands Used In Hacking, The Ultimate Guide



Windows is most powerful GUI based operating system. In this article, we are going to provide you a list of best CMD commands used in Hacking. If you wanna be a hacker learn these commands very carefully. Let’s drive it.

Best CMD Commands Used In Hacking

1. Ping

This command allows you to determine TCP/IP, networks and IP address. It also determines the issues with network and assists in resolving them.
ping x.x.x.x (where x – x is the IP address). You can try pinging 8.8.8.8, which is Google default IP address. Or you can “ping www.google.com (this is the website you want to ping, if you don’t know the IP address).

2. nslookup

Nslookup is a network administration command line that is used for querying the Domain Name System (DNS) to obtain the IP address mapping or domain name.
For instance: ‘nslookup www.google.com (this command allows you to find IP address of www.google.com).
Yeah! You can also find out the IP address of specific Mail Servers through nslookup.
NSLOOKUP (PRESS ENTER)
SET TYPE=MX (PRESS ENTER AGAIN)
This command will give you the mail server of IP of google.com/yahoo.com.

3. tracert

tracert is a command-line utility that records the route through the internet between your computer and a specified destination computer. It calculates and displays the amount of time each hop took.
tracert x.x.x.x (x is the IP address)
or, ‘tracetrt www.google.com‘ (if you want to know the IP address of www.google.com).

4. arp

arp command will show you the arp table. This command also helps you to find out if someone has made up poisoning in your LAN using this command.
ARP -A

5. route

route command will show you the routing table, gateway, interface and metric.
ROUTE PRINT

6. ipconfig

This is of the most important command, it will show you a lot of useful things, for instance – your IP, Gateway, DNS in use etc.
IPCONFIG OR IPCONFIG/ALL
Also, if you are using dynamic IP address and want to change it, then type.
IPCONFIG/RELEASE (THIS WILL RELEASE YOUR IP ADDRESS)
IPCONFIG/RENEW (THIS WILL RENEW YOUR IP ADDRESS)


7. Netstat CMD command

This command allows you to find out, who is establishing a connection with your computer. This command provides the information about all active connection and listings ports.
NETSTAT-A (DISPLAY ALL CONNECTIONS).
NETSTAT-N (SORTS CONNECTION IN NUMERICAL ORDER).
NETSTAT-B (DISPLAY EXECUTABLE. THIS IS BROWSER NAME).

Fechure post

Best HACKERs App