Download NMAP:NETWORK SCANNING TOOL Network hacking

Nmap ("Network Mapper") is a free and open source utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts.

Download here (Linux Users):

Download here (Windows Users):

Download facebook,youtube and hotmail freezer

This is Windows,live, Youtube, and facebook freezer. You can  freeze facebook, hotmail, youtube account using this software.
This wonderful hacking program can freeze Youtube, Windows Live and Facebook accounts by use of repeated wrong login attempts. 

Password: hackingguide

Hack facebook, facbook freezer, hack facebook id, hack youtube account, hack hotmail account, youtube freezer, facebook freezer, hotmail freezer

Hack Bebo account - Bebo freezer software

You can Hack Bebo servers by this software.
This program can freeze Bebo accounts by hitting Bebo servers with constant wrong login attempts. Bebo is a large social networking community having millions of users all over the world.


How to prevent facebook account from hacking attack

  1. Here are some steps to prevent your facebook account from hackers attack!
  2. Protect Your Facebook Account from Hackers Step 2 Version 2.jpg
    Never share your passwords with anyone including your friends and family. Browsing through a secure connection is always advisable.
  3. Protect Your Facebook Account from Hackers Step 3 Version 2.jpg
    Don’t get your news feed flooded with suspicious links. Ensure that you don’t click on any links of games, apps, and others that you are not sure of. Avoid permitting third party apps accessing your information. If you are not using any apps, it’s better to disable or remove those apps.
  4. Protect Your Facebook Account from Hackers Step 4 Version 3.jpg
    Add a secondary email ID to your account. In case your profile is hacked, Facebook will send account recovery information to the secondary email ID also. Before these steps, understand the privacy policy of Facebook.
  5. Protect Your Facebook Account from Hackers Step 5 Version 3.jpg
    Ensure that you accept only persons you know as your friends as when you accept strangers, you allow them to access your personal information. It’s always better to avoid posting any financial or personal details.
  6. Protect Your Facebook Account from Hackers Step 6.jpg
    Change your passwords regularly and use unique passwords. Don’t forget to activate your login notifications.
  7. Protect Your Facebook Account from Hackers Step 7.jpg
    For many of us, Facebook is our best buddy, a chronicle of our life, our diary of sorts and an outlet for our creativity. We can’t risk our Facebook account at any cost and we certainly try all the possible ways to keep it as personal and secure as we can.

Android and Arduino RF Outlet Selector - Hacking

Cyber Monday may be behind us, but there are always some hackable, inexpensive electronics to be had. [Stephen's] wireless Android/Arduino outlet hack may be the perfect holiday project on the cheap, especially considering you can once again snag the right remote controlled outlets from Home Depot. This project is similar to other remote control outlet builds we’ve seen here, but for around $6 per outlet: a tough price to beat.
[Stephen] Frankenstein’d an inexpensive RF device from Amazon into his build, hooking the Arduino up to the 4 pins on the transmitter. The first step was to reverse engineer the communication for the outlet, which was accomplished through some down and dirty Arduino logic analyzing. The final circuit included a standard Arduino Ethernet shield, which [Stephen] hooked up to his router and configured to run as a web server. Most of the code was borrowed from the RC-Switch outlet project, but the protocols from that build are based on US standards and did not quite fit [Stephen's] needs, so he turned to a similar Instructables project to work out the finer details.
Stick around after the break for a quick video demonstration, then check out another wireless outlet hack for inspiration.

Read more at: http://hackaday.com/2013/12/06/android-and-arduino-rf-outlet-selector/

Your mouse - A terrible webcam for hacking

Your optical mouse contains Camera!

It should come as no surprise your optical mouse contains a very tiny, very low resolution camera. [Franci] decided to take apart one of his old mice and turn that tiny optical sensor into a webcam.
Inside [Franci]‘s Logitech RX 250 is an ADNS-5020 optical sensor. This three wire SPI device stuffed into an 8-pin package is a 15×15 pixel grayscale image sensor. [Franci] started this project by bringing out the Arduino and Ethernet shield. After soldering a pull-up resistor to the image sensor’s reset pin, connecting the rest of the circuit was as simple as soldering a few wires to the Arduino.
The Arduino sketch sends the image data for each pixel to a computer over a serial connection. A bit of javascript and a touch of HTML takes this pixel data and turns it into a webpage with a live view of whatever is directly under [Franci]‘s mouse.

Read More at: http://hackaday.com/2014/01/14/your-mouse-is-a-terrible-webcam/

Android+Arduino HACKING through Face Following RC Car

To some of us, hacking an RC Car to simply follow a black line or avoid obstacles is too easy, and we’re sure [Shazin] would agree with that, since he created an RC Car that follows your face!
The first step to this project was to take control of the RC Car, but instead of hijacking the transmitter, [Shazin] decided to control the car directly. This isn’t any high-end RC Car though, so forget about PWM control. Instead, a single IC (RX-2) was found to handle both the RF Receiver and H-Bridges. After a bit of probing, the 4 control lines (forward/back and left/right) were identified and connected to an Arduino.
[Shazin] paired the Arduino with a USB Host Shield and connected it up with his Android phone through the ADB (Android Debug Bridge). He then made some modifications to the OpenCV Android Face Detection app to send commands to the Arduino based on ‘where’ the Face is detected; if the face is in the right half of the screen, turn right, if not, turn left and go forward.
This is a really interesting project with a lot of potential; we’re just hoping [Shazin] doesn’t have any evil plans for this device like strapping it to a Tank Drone that locks on to targets!

Source: http://hackaday.com/2014/01/15/androidarduino-face-following-rc-car/

How to do phishing? How to Protect Yourself from phising

What is Phishing?

There's a new type of Internet piracy called "phishing." It's pronounced "fishing," and that's exactly what these thieves are doing: "fishing" for your personal financial information. What they want are account numbers, passwords, Social Security numbers, and other confidential information that they can use to loot your checking account or run up bills on your credit cards.
In the worst case, you could find yourself a victim of identity theft. With the sensitive information obtained from a successful phishing scam, these thieves can take out loans or obtain credit cards and even driver's licenses in your name. They can do damage to your financial history and personal reputation that can take years to unravel. But if you understand how phishing works and how to protect yourself, you can help stop this crime.

How Phishing Works

In a typical case, you'll receive an email that appears to come from a reputable company that you recognize and do business with, such as your financial institution. In some cases, the email may appear to come from a government agency, including one of the federal financial institution regulatory agencies.
The email will probably warn you of a serious problem that requires your immediate attention. It may use phrases, such as "Immediate attention required," or "Please contact us immediately about your account." The email will then encourage you to click on a button to go to the institution's web site. In a phishing scam, you could be redirected to a phony web site that may look exactly like the real thing. Sometimes, in fact, it may be the company's actual web site. In those cases, a pop-up window will quickly appear for the purpose of harvesting your financial information.
In either case, you may be asked to update your account information or to provide information for verification purposes: your Social Security number, your account number, your password, or the information you use to verify your identity when speaking to a real financial institution, such as your mother's maiden name or your place of birth. WARNING: If you provide the requested information, you may find yourself the victim of identity theft.

How to Protect Yourself

Never provide your personal information in response to an unsolicited request, whether it is over the phone or over the Internet or even a fax or letter. Emails and Internet pages created by phishers may look exactly like the real thing. They may even have a fake padlock icon that ordinarily is used to denote a secure site. (It's important to keep anti-virus and anti-spam filtering software up-to-date on your computer.) If you did not initiate the communication, you should not provide any information.
If you believe the contact may be legitimate, contact the financial institution yourself. You can find phone numbers and web sites on the monthly statements you receive from your financial institution, or you can look the company up in a phone book or on the Internet. The key is that you should be the one to initiate the contact, using contact information that you have verified yourself.
Never provide your password over the phone or in response to an unsolicited Internet request. A financial institution would never ask you to verify your account information online. Thieves armed with this information and your account number can help themselves to your savings. (It is a good idea to periodically change your passwords and PIN numbers to improve security.)
Review account statements regularly to ensure all charges are correct. If your account statement is late in arriving, call your financial institution to find out why. If your financial institution offers electronic account access, periodically review activity online to catch suspicious activity.

Some best and common Facebook hacking techniques

In this article i will tell you some hacking techniques which is used most commonly and is considered to be best.

We have discussed alot about popular password cracking methods such as Bruteforce, Dictionary attack and Rainbow tables. However a question I get asked frequently is if it's possible to crack a Facebook account. So I wish to clear concepts related to Hacking/Cracking Facebook accounts. First of all "Hacking a Facebook account" and "Cracking a facebook account" are both different terminologies.
Hacking a facebook account refers to foolproof methods such as Phishing, keylogging, Social engineering etc.However the terminology cracking refers to the methods such as Bruteforce, Dictionary attacks etc.
1:Brute Force Attacks 
2:Dictionary Attacks
3:Cracking Facebook Accounts
4:Hack A Facebook Account By Exploiting Facebook's Trusted Friend Feature 
6:Hijacking Facebook Fan Pages 
7:Hack Facebook Account Status - Facebook Status Vulnerability
8:Facebook phishing
10:Session Hijacking
11:Sidejacking With Firesheep
12:DNS Spoofing
13:USB Hacking 
14:Man In the Middle Attacks
16:Movable Mobile Hacking

Hacking attack on KickStarter Username and password is stolen

KickStarter hacking attack

Online Crowdfunding website KickStarter is to be the latest high-profile website reporting security breach.  KickStarter became aware of the breach, after receiving a notification from Law enforcement.
Hackers breached their website( kickstarter.com) and gained access to the user's information including usernames, encrypted passwords, email IDs and phone numbers.  The company says there is No Credit card data compromised in this breach.  

Even though the password is encrypted one,  we aware the fact that attackers with enough computing power can easily crack those passwords.

The company informs that two accounts have been accessed by hackers so far.  All users are recommended to change their password immediately for the KickStarter website.

If you are using the same password in any other websites(most of us do), you are also advised to reset the password there also.

"We’re incredibly sorry that this happened. We set a very high bar for how we serve our community, and this incident is frustrating and upsetting." the company apologizes in their blog post.

See more at: http://www.ehackingnews.com/2014/02/kickstarter-website-hacked.html#sthash.St3MIcdW.dpuf

Ten tips of Ethical hacking

Here are 10 tips for Ethical hacking which will surly help you alot

  1. Get it in writing.
    You've heard it a thousand times, but believe it or not I've seen security professionals perform -- and security managers allow -- ethical hacking on critical business systems without putting anything in writing ahead of time. You've absolutely got to cover your assets and not only get a basic sign-off by all parties involved, but also consider and document who's responsible (or not) when something goes awry during the testing. Bad things can happen during ethical hacking -- servers can crash and data can get lost. Think about this from a business perspective. You'll make your lawyer and insurance underwriter proud!
  2. You've got to have goals.
    Just like with any successful business venture, you've got to determine exactly what you want to get out of ethical hacking. What outcomes are you looking for? Is this to prove you need to migrate to a Novell or Unix platform? Are you trying to get more money to spend on security? Are you trying to comply with federal regulations or meet security standards? Also, ask yourself what information you're trying to protect and which systems need to be tested.
  3. Don't try to test everything at once.
    This doesn't necessarily apply to small networks, but who really has a small network any more? Prioritize the systems that need to be tested, and test the most critical ones first. This is most likely Web, e-mail or database servers, and even perimeter devices such as routers and firewalls. Look for single points of failure and systems your business can do without. Many security professionals focus only on publicly accessible hosts. Remember that hacking can occur from inside the network, so don't forget about the insider threat and the systems that could be affected by it.
  4. Don't forget to test the "unimportant" systems.
    OK, so this conflicts with lesson number three. Well, not exactly. You don't have to test all of your systems, but it does help to think through how attacks can occur and affect other, less important systems. Workstations that don't have confidential data on them, the telecommuter's home PC or that Web server that only provides basic e-mail access are often the systems that are used as stepping stones to attack other, more critical systems. Never rule out the rogue "little guy."
  5. It sounds clichÉ, but thinking like the enemy really does help.
    On the heels of lesson number four comes the tried and true "know your enemy." It's old-fashioned, but true. If systems are tested using only the latest automated tools without thinking through all the other various ways manual hacks that can be carried out, the complete picture won't be seen. There's no way to test for every possible hack from every possible angle. The key is making sure the research has been done and hacker motives and methods are understood and made part of your ethical hacking program.
  6. Use the right tools.
    This is something I'm reminded of every time I perform ethical hacking tests. I don't know what I'd do without the tools (both freeware and commercial) I've gathered over the years. It's just like any successful homebuilder will tell you; you've got to have the right tool for the task at hand. Otherwise, it will likely be an exercise in futility with bad results. As a security manager, make sure your team or the third-party ethical hackers you've hired have the right tools. Many are not simple to use and many are not inexpensive, but they sure are worth it.
  7. It's all in the timing.
    Ever hear of someone pounding on a system with a million packets per minute to see if the TCP/IP stack is stable? This kind of testing might be OK, but as my mother always told me, there's a time and a place for everything. Make sure that the ethical hacking tests are not carried out during peak network or host usage. You don't want the network to run slow or have a system crash. There are a lot of security tools that can do just that if the system is unstable or overloaded with other requests at the time the testing is being carried out. Come up with a timeline. And put it in writing!
  8. Don't think that no penetration means you're secure.
    A very common misconception is that if no penetration was possible that the systems must be secure. Nope! It could be that the right tools weren't used or the right systems weren't tested. It could also be that a vulnerability has not yet been discovered for the system you're testing. Ethical hacking is a snapshot in time of a few specific systems. There could be a rogue router (or user) presenting a security problem on the other side of the world that was overlooked or not part of the original scope. You just never saw it.
  9. Keep up the good work.
    Lesson number eight is what makes number nine critical. I know you hear about testing your systems over and over again. It's true; things change. New threats and vulnerabilities crop up. Make sure your systems are being tested periodically for new issues and to catch vulnerabilities that were missed in the past. Repetition is key.
  10. Focus on the important and urgent vulnerabilities
    I've seen a lot of security managers feel obligated to fix every vulnerability discovered during the ethical hacking process. It realistically can't be done. It's not reasonable or fair to put pressure on yourself or your team to secure everything. Take the route that time management experts recommend when prioritizing daily tasks: go for vulnerabilities that are both important (high impact if exploited) and urgent (high likelihood of being exploited). The other vulnerabilities can then be addressed as time, resources and money allows.
If you can incorporate into your ethical hacking efforts even just a few of these 10 lessons I've learned over the years, I know they'll make your job as a security manager a little easier; after all, every little bit counts.

Read more at: http://searchsecurity.techtarget.com/tip/Ethical-hacking-Ten-crucial-lessons

bottom banner

Back to Top