Sunday, April 18, 2021

Cracking Windows User Account password.

 πŸ’—RADHE...RADHE...πŸ’—πŸ™


*Passwords are Stored and Transmitted in an encrypted form called a Hash. When a User logs on to a system and enters a password, a hash is generated and compared to a stored hash. If the entered and the stored hashes match, the user is authenticated (This is called the Challenge/Response).

* Passwords may be cracked manually or with automated tools such as a Brute-force method or the Rainbow Table attack.


* In this if we put the password and windows vey the password we entered on teen with the file in which the password is stored of ours.

* This is stored in a file named SAM

* To reach at SAM follow steps,

    go to my computer then open local drive (c) after that open windows then open system 32 and at the last config

 * Now we need to attack this file.

 For this we need to open this file but it is not possible as it is in process by the computer from its start up.

 And we suppose that the file opens then also we cannot see the passwords stored in it because they are encrypted in the form of HASHES.

 And they and not be decrypted. Ad it is the hardest encryption done and decryption is not easy.

 But it is not impossible.

 We Need a Bootable CD named Hiren boot and Can Crack the Password.

 But Another Attack –

 Go to C:\Windows\System32\

 Copy the File cmd.exe to desktop and rename it to sethc.exe

 Now copy the file sethc.exe to C:\Windows\System32\ and will give an error, give that error YES. And replace it.

 Now You Are Done.

 Now At the Login Screen Press SHIFT Key 5 times and a beep Sound will come and Command prompt will open.

 In the command prompt type “explorer.exe” and Hit Enter a desktop will open in the tab mode. Use The Computer

Unlimited…

 NOTE:   DO NOT TRY THIS ON YOUR OWN DEVICE. 

                               

                πŸ™πŸ™ THANKS FOR VISITE THIS SITE KEEP SUPPORTING.πŸ™πŸ™

Saturday, January 9, 2021

Wireless hacking info (Part 1)

πŸ’—Radhe... Radhe...πŸ’— 

Wireless hacking info (Part 1)



• Wireless network refers to any type of computer network which is wireless, and is commonly associated with a network


• whose interconnections between nodes e.g. Laptops, Desktops, Printers etc is implemented without the use of wires.


• The popularity in Wireless Technology is driven by two major factors: convenience and cost. A Wireless Local Area Network (WLAN) allows workers to access digital resources without being locked to their desks. Mobile users can connect to a Local Area Network (LAN) through a Wireless (Radio) connection.


• Demand for wireless access to LANs is fueled by the growth of mobile computing devices, such as laptops and personal digital assistants, and by users’ desire for continuous network connections without physically having to plug into wired systems.


• For the same reason that WLANs are convenient, their open broadcast infrastructure, they are extremely vulnerable to intrusion and exploitation. Adding a wireless network to an organization’s internal LAN may open a backdoor to the existing wired network.


• The IEEE 802.11 standard refers to a family of specifications for wireless local area networks (WLANs) developed by a working group of the Institute of Electrical and Electronics Engineers (IEEE). This standards effort began in 1989, with the focus on deployment in large enterprise networking environments, effectively a wireless equivalent to Ethernet.


 • The IEEE accepted the specification in 1997. Standard 802.11 specifies an over-the-air interface between a mobile device wireless client and a base station or between two mobile device wireless clients.


How To Change Your IP address.

πŸ’—Radhe ... Radhe ... πŸ’—

How To Change Your IP address.



Note it only for your knowledge do not try...

Step 1. Click on "Start" in the bottom left hand corner of screen


Step 2. Click on "Run"


Step 3. Type in "cmd" and hit ok You should now be at an MSDOS prompt screen.


Step 4. Type "ipconfig /release" just like that, and hit "enter''


Step 5. Type "exit" and leave the prompt


Step 6. Right-click on "Network Places" or "My Network Places" on your desktop.


Step 7. Click on "properties


You should now be on a screen with something titled "Local Area Connection", or something close to that, and, if you

have a network hooked up, all of your other networks.


Step 8. Right click on "Local Area Connection" and click "properties"


Step 9. Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab


Step 10. Click on "Use the following IP address" under the "General" tab


Step 11. Create an IP address (It doesn't matter what it is. I just type 1 and 2 until i fill the area up).


Step 12. Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.


Step 13. Hit the "Ok" button here


Step 14. Hit the "Ok" button again You should now be back to the "Local Area Connection" screen.


Step 15. Right-click back on "Local Area Connection" and go to properties again.


Step 16. Go back to the "TCP/IP" settings


Step 17. This time, select "Obtain an IP address automatically" tongue.gif


Step 18. Hit "Ok"


Step 19. Hit "Ok" again


Step 20. You now have a new IP address


With a little practice, you can easily get this process down to 15 seconds.


Warnning...

“This only changes your dynamic IP address, not your ISP/IP address. If you plan on hacking a

website with this trick be extremely careful, because if they try a little, they can trace it back.”


Monday, November 23, 2020

Mobile hacking – SMS & Call forging. (1 Part)

  πŸ’—RADHE...RAHE...πŸ’—

Mobile hacking – SMS & Call forging



It was bound to happen - they have hacked just about everything else. Now it's the cell phones. Cellphone hacking has just recently surfaced and been made public ever since some one did some cellular phone hacking on Paris Hilton's cell phone.


This article will give you some information about what is going on out there and what you can do to better protect your cell phone information.


What Does It Involve

The fact of someone hacking cell phone became public knowledge when Paris Hilton's cell phone, along with her information was recently hacked. Unfortunately for her, all her celebrity friends and their phone numbers were also placed on the Internet - resulting in a barrage of calls to each of them.


Cell phone hackers have apparently found a glitch in the way the chips are manufactured. The good news, though, is that it only applies to the first generation models of cell phones that use the Global System for Mobile communications (GSM).


Another requirement is that the hacker must have physical access to the cell phone for at least three minutes - which is a real good reason not to let it out of your sight. 


Currently, although the problem has been remedied (at least for now) in the second and third generation phones, it seems that about 70% of existing cell phones fall within the first generation category.


Another way that mobile phone hacking can take place is for a hacker to walk around an area with people that have cell phones and a laptop that has cellphone hacker programs on it. 


Through an antenna, and a little patience, his computer can literally pick up your cell phone data - if it is turned on. 


This is more applicable to cell phones that use Bluetooth technology.



What Can A Hacker Do?

Surprisingly, there are quite a number of things that can be accomplished by the hacker. Depending on their intent here are a few of them.


· Steal Your Number

Your phone number can be accessed and obtained by cellphone hacking. This allows them to make calls and have it charged to your account.


· Take Your Information

Mobile hacking allows a hacker to contact your cell phone, without your knowledge, and to download your addresses and other information you might have on your phone. Many hackers are not content to only get your information. Some will even change all your phone numbers! Be sure to keep a backup of your information somewhere. This particular technique is called Bluesnarfing. 

          πŸ™πŸ™THANKS FOR VISITE THIS SITE KEEP SUPOORTING.πŸ™πŸ™



Thursday, November 19, 2020

WHAT IS MEANING OF ERRORS ON INTERNET.

πŸ’—RADHE...RADHE...πŸ’—

 WHAT IS MEANING OF ERROS ON INTERNET.



(1.) ERRORS NUMBER...400>>>>>>>Bad request by user.

This error shows when your speed of internet is slow or we can also say that your internet can not able to take a side of that particular site...


(2.) ERRORS NUMBER...401>>>>>>>Authorization required.

This error shows when your computer does not required Authorization...


(3.) ERRORS NUMBER...403>>>>>>>Forbidden error.

This error shows when you do not have permission to view the requested file or resource...


(4.) ERRORS NUMBER...450>>>>>>>Log in time out error.

This error shows when that particular website had completed its log in time so if someone give you time and you can not reach at time then this error will pop up in your computer...


(5.) ERROR NUMBERR...200>>>>>>>Request successful.

This will pop up when you have request some one's website and one more thing that your code is successfully entered then this will pop up...


(6.) ERROR NUMBER...500>>>>>>>Internal sever error.

It will pop up when something is going wrong in your internal sever...


(7.) ERROR NUMBER...503>>>>>>>Service unavailable.

 It will shows when that site is no more provide you service or may be the time of particular service   is finished...


(8.) ERROR NUMBER...404>>>>>>Not found.

This error wee will see in our routine if we find some thing when ever it pop up then that thing our that particular website is now dead or it is not found on it...


   πŸ™πŸ™THANK YOU FOR VISITE THIS WEBSITE KEEP SUPPORTING...πŸ™πŸ™


Tuesday, November 17, 2020

HISTORICAL PASSWORD ANALYSIS TIPS

πŸ’—Radhe...Radhe...πŸ’—

 PASSWORD ANALYSIS
HISTORICAL PASSWORD ANALYSIS TIPS



-The average password length is 7-9 characters.

-The average English word is 5 characters long.

-The average person knows 50,000 to 150,000 words.

-50% chance a user’s password will contain one or more vowels.

-Women prefer personal names in their passwords, and men prefer hobbies.

-Most likely to be used symbols: ~, !, @, #, $, %, &, *, and ?

-If a number, it’s usually a 1 or 2, sequential, and will likely be at the end.

-If more than one number it will usually be sequential or personally relevant.

-If a capital letter, it’s usually the beginning, followed by a vowel.

-66% of people only use 1 - 3 passwords for all online accounts.

-One in nine people have a password based on the common Top 500 list.

-Western countries use lowercase passwords and Eastern countries prefer digits.


       πŸ™πŸ™THANK YOU FOR VISIT SITE KEEP SUPPORTINGπŸ™πŸ™


Friday, November 13, 2020

Different Types Of Hacking Attack:--

πŸ’—RADHE...RADHE...πŸ’—

 Different Types Of Hacking Attack:--



1.Malware.:--

Malware is a term used to describe malicious software, including spyware, ransomware, viruses, and worms. Malware breaches a network through a vulnerability, typically when a user clicks a dangerous link or email attachment that then installs risky software. 


2.Phishing.:--

Phishing is the practice of sending fraudulent communications that appear to come from a reputable source, usually through email. The goal is to steal sensitive data like credit card and login information or to install malware on the victim’s machine. Phishing is an increasingly common cyberthreat.


3.Man-in-the-middle attack.:--

Man-in-the-middle (MitM) attacks, also known as eavesdropping attacks, occur when attackers insert themselves into a two-party transaction. Once the attackers interrupt the traffic, they can filter and steal data.

4.Denial-of-service attack.:--

A denial-of-service attack floods systems, servers, or networks with traffic to exhaust resources and bandwidth. As a result, the system is unable to fulfill legitimate requests. Attackers can also use multiple compromised devices to launch this attack. This is known as a distributed-denial-of-service (DDoS) attack.


5.SQL injection.:--

A Structured Query Language (SQL) injection occurs when an attacker inserts malicious code into a server that uses SQL and forces the server to reveal information it normally would not. An attacker could carry out a SQL injection simply by submitting malicious code into a vulnerable website search box.

6.Zero-day exploit.:--

A zero-day exploit hits after a network vulnerability is announced but before a patch or solution is implemented. Attackers target the disclosed vulnerability during this window of time. Zero-day vulnerability threat detection requires constant awareness.

7.Raimboe Attack.:--

A rainbow table attack is a hacking method that involves the use of a rainbow hash table. This table contains the values used to encrypt the passwords before adding them to the database.Cybercriminals favor rainbow table attacks over other types such as dictionary and brute-force attacks because the former allow them to crack passwords faster.


8.Brute Force Attack.:--

A brute force attack uses trial-and-error to guess login info, encryption keys, or find a hidden web page. Hackers work through all possible combinations hoping to guess correctly.


                                  πŸ™πŸ™THANK YOU FOR VISTE THIS WEBSITEπŸ™πŸ™
                                                      πŸ™πŸ™ KEEP SUPPORTING.πŸ™πŸ™

TYPES OF HACKERS.

                                                                                                                                    πŸ’—RADHE...RADHE...  πŸ’—                                                                                          

HACKING.

A hacker is someone who likes to tinker with electronics or computer systems. Hackers like to explore and learn how computer systems work, finding ways to make them do what they do better, or do things they weren’t intended to do. 

There are total 3 types of Hacker:--

1.White Hat Hacker.

2.Black Hat Hacker.

3.Gray Hat Hacker.


Definition Of Hackers:--

1.White Hat Hacker:-- White hat hackers choose to use their powers for good rather than evil. Also known as “ethical hackers,” white hat hackers can sometimes be paid employees or contractors working for companies as security specialists that attempt to find security holes via hacking.



2.Black Hat Hacker:-- Black Hat hackers are criminals who break into computer networks with malicious intent. They may also release malware that destroys files, holds computers hostage, or steals passwords, credit card numbers, and other personal information.



3.Gray Hat Hacker:-- A grey hat (gray hat or gray hat) is a computer hacker or computer security expert who may . .. Another definition of Grey hat maintains that Grey hat hackers only arguably violate the law in an effort to research and improve security.


                  πŸ™πŸ™THANKS FOR VISITE WEBSITE KEEP SUPPORTING.πŸ™πŸ™







Cracking Windows User Account password.

 πŸ’— RADHE...RADHE... πŸ’—πŸ™ * Passwords are Stored and Transmitted in an encrypted form called a Hash. When a User logs on to a system and  en...