Monday, November 23, 2020

Mobile hacking – SMS & Call forging. (1 Part)

  πŸ’—RADHE...RAHE...πŸ’—

Mobile hacking – SMS & Call forging



It was bound to happen - they have hacked just about everything else. Now it's the cell phones. Cellphone hacking has just recently surfaced and been made public ever since some one did some cellular phone hacking on Paris Hilton's cell phone.


This article will give you some information about what is going on out there and what you can do to better protect your cell phone information.


What Does It Involve

The fact of someone hacking cell phone became public knowledge when Paris Hilton's cell phone, along with her information was recently hacked. Unfortunately for her, all her celebrity friends and their phone numbers were also placed on the Internet - resulting in a barrage of calls to each of them.


Cell phone hackers have apparently found a glitch in the way the chips are manufactured. The good news, though, is that it only applies to the first generation models of cell phones that use the Global System for Mobile communications (GSM).


Another requirement is that the hacker must have physical access to the cell phone for at least three minutes - which is a real good reason not to let it out of your sight. 


Currently, although the problem has been remedied (at least for now) in the second and third generation phones, it seems that about 70% of existing cell phones fall within the first generation category.


Another way that mobile phone hacking can take place is for a hacker to walk around an area with people that have cell phones and a laptop that has cellphone hacker programs on it. 


Through an antenna, and a little patience, his computer can literally pick up your cell phone data - if it is turned on. 


This is more applicable to cell phones that use Bluetooth technology.



What Can A Hacker Do?

Surprisingly, there are quite a number of things that can be accomplished by the hacker. Depending on their intent here are a few of them.


· Steal Your Number

Your phone number can be accessed and obtained by cellphone hacking. This allows them to make calls and have it charged to your account.


· Take Your Information

Mobile hacking allows a hacker to contact your cell phone, without your knowledge, and to download your addresses and other information you might have on your phone. Many hackers are not content to only get your information. Some will even change all your phone numbers! Be sure to keep a backup of your information somewhere. This particular technique is called Bluesnarfing. 

          πŸ™πŸ™THANKS FOR VISITE THIS SITE KEEP SUPOORTING.πŸ™πŸ™



Thursday, November 19, 2020

WHAT IS MEANING OF ERRORS ON INTERNET.

πŸ’—RADHE...RADHE...πŸ’—

 WHAT IS MEANING OF ERROS ON INTERNET.



(1.) ERRORS NUMBER...400>>>>>>>Bad request by user.

This error shows when your speed of internet is slow or we can also say that your internet can not able to take a side of that particular site...


(2.) ERRORS NUMBER...401>>>>>>>Authorization required.

This error shows when your computer does not required Authorization...


(3.) ERRORS NUMBER...403>>>>>>>Forbidden error.

This error shows when you do not have permission to view the requested file or resource...


(4.) ERRORS NUMBER...450>>>>>>>Log in time out error.

This error shows when that particular website had completed its log in time so if someone give you time and you can not reach at time then this error will pop up in your computer...


(5.) ERROR NUMBERR...200>>>>>>>Request successful.

This will pop up when you have request some one's website and one more thing that your code is successfully entered then this will pop up...


(6.) ERROR NUMBER...500>>>>>>>Internal sever error.

It will pop up when something is going wrong in your internal sever...


(7.) ERROR NUMBER...503>>>>>>>Service unavailable.

 It will shows when that site is no more provide you service or may be the time of particular service   is finished...


(8.) ERROR NUMBER...404>>>>>>Not found.

This error wee will see in our routine if we find some thing when ever it pop up then that thing our that particular website is now dead or it is not found on it...


   πŸ™πŸ™THANK YOU FOR VISITE THIS WEBSITE KEEP SUPPORTING...πŸ™πŸ™


Tuesday, November 17, 2020

HISTORICAL PASSWORD ANALYSIS TIPS

πŸ’—Radhe...Radhe...πŸ’—

 PASSWORD ANALYSIS
HISTORICAL PASSWORD ANALYSIS TIPS



-The average password length is 7-9 characters.

-The average English word is 5 characters long.

-The average person knows 50,000 to 150,000 words.

-50% chance a user’s password will contain one or more vowels.

-Women prefer personal names in their passwords, and men prefer hobbies.

-Most likely to be used symbols: ~, !, @, #, $, %, &, *, and ?

-If a number, it’s usually a 1 or 2, sequential, and will likely be at the end.

-If more than one number it will usually be sequential or personally relevant.

-If a capital letter, it’s usually the beginning, followed by a vowel.

-66% of people only use 1 - 3 passwords for all online accounts.

-One in nine people have a password based on the common Top 500 list.

-Western countries use lowercase passwords and Eastern countries prefer digits.


       πŸ™πŸ™THANK YOU FOR VISIT SITE KEEP SUPPORTINGπŸ™πŸ™


Friday, November 13, 2020

Different Types Of Hacking Attack:--

πŸ’—RADHE...RADHE...πŸ’—

 Different Types Of Hacking Attack:--



1.Malware.:--

Malware is a term used to describe malicious software, including spyware, ransomware, viruses, and worms. Malware breaches a network through a vulnerability, typically when a user clicks a dangerous link or email attachment that then installs risky software. 


2.Phishing.:--

Phishing is the practice of sending fraudulent communications that appear to come from a reputable source, usually through email. The goal is to steal sensitive data like credit card and login information or to install malware on the victim’s machine. Phishing is an increasingly common cyberthreat.


3.Man-in-the-middle attack.:--

Man-in-the-middle (MitM) attacks, also known as eavesdropping attacks, occur when attackers insert themselves into a two-party transaction. Once the attackers interrupt the traffic, they can filter and steal data.

4.Denial-of-service attack.:--

A denial-of-service attack floods systems, servers, or networks with traffic to exhaust resources and bandwidth. As a result, the system is unable to fulfill legitimate requests. Attackers can also use multiple compromised devices to launch this attack. This is known as a distributed-denial-of-service (DDoS) attack.


5.SQL injection.:--

A Structured Query Language (SQL) injection occurs when an attacker inserts malicious code into a server that uses SQL and forces the server to reveal information it normally would not. An attacker could carry out a SQL injection simply by submitting malicious code into a vulnerable website search box.

6.Zero-day exploit.:--

A zero-day exploit hits after a network vulnerability is announced but before a patch or solution is implemented. Attackers target the disclosed vulnerability during this window of time. Zero-day vulnerability threat detection requires constant awareness.

7.Raimboe Attack.:--

A rainbow table attack is a hacking method that involves the use of a rainbow hash table. This table contains the values used to encrypt the passwords before adding them to the database.Cybercriminals favor rainbow table attacks over other types such as dictionary and brute-force attacks because the former allow them to crack passwords faster.


8.Brute Force Attack.:--

A brute force attack uses trial-and-error to guess login info, encryption keys, or find a hidden web page. Hackers work through all possible combinations hoping to guess correctly.


                                  πŸ™πŸ™THANK YOU FOR VISTE THIS WEBSITEπŸ™πŸ™
                                                      πŸ™πŸ™ KEEP SUPPORTING.πŸ™πŸ™

TYPES OF HACKERS.

                                                                                                                                    πŸ’—RADHE...RADHE...  πŸ’—                                                                                          

HACKING.

A hacker is someone who likes to tinker with electronics or computer systems. Hackers like to explore and learn how computer systems work, finding ways to make them do what they do better, or do things they weren’t intended to do. 

There are total 3 types of Hacker:--

1.White Hat Hacker.

2.Black Hat Hacker.

3.Gray Hat Hacker.


Definition Of Hackers:--

1.White Hat Hacker:-- White hat hackers choose to use their powers for good rather than evil. Also known as “ethical hackers,” white hat hackers can sometimes be paid employees or contractors working for companies as security specialists that attempt to find security holes via hacking.



2.Black Hat Hacker:-- Black Hat hackers are criminals who break into computer networks with malicious intent. They may also release malware that destroys files, holds computers hostage, or steals passwords, credit card numbers, and other personal information.



3.Gray Hat Hacker:-- A grey hat (gray hat or gray hat) is a computer hacker or computer security expert who may . .. Another definition of Grey hat maintains that Grey hat hackers only arguably violate the law in an effort to research and improve security.


                  πŸ™πŸ™THANKS FOR VISITE WEBSITE KEEP SUPPORTING.πŸ™πŸ™







Cracking Windows User Account password.

 πŸ’— RADHE...RADHE... πŸ’—πŸ™ * Passwords are Stored and Transmitted in an encrypted form called a Hash. When a User logs on to a system and  en...