Posts

how to anonymously surf using proxychain ?

what is proxychain? in our day to day life the privacy is very important part. the person's information is very sensitive thing in today's world if our personal  information is on wrong hands, this information could result in various problems.data collected could be used to hack bank account, social account etc. due to this reason , people choose to be anonymous while using internet, using a proxy or a VPN . a proxy could be explained as a gateway between user computer and the destination webpage. normally while browsing through the website, your original ip is identified by the website,which could compromise your privacy. by the use of proxy chaining we bounce through a number of proxy servers and reach the destination . you can check by this way, if you check the ip without using the proxy chain then then it will display the ISP IP. but when you use proxy chain it will display the last used proxy server's IP in the chain. user ------->proxy----------->webpage ...

petya ransomware skip the files and encrypts the hard drives

Image
      what is petya ransomware? after wannacry ransomware the new ransomware spread all over the world it is called as petya. now , when the use becomes infected by a cypto-ransomware , the infected targets and encrypts the files on the victims hard drives. this leaves the operating system working properly, but with the user unable  to encrypted documents. but the petya ransomware take it to the next level by encrypting portions of the hard drive itself that you are unable to access anything on the drive including windows. and if you want to decrypt your drives you have to pay ransom around ~9 . and if you successfully, pay it you drives become free to use. why is it called 'petya'? the malware appears to share a significant amount of code with older piece of ransomware that really was called petya. petya is family of encrypting ransomware that was first discovered in 2016.the malware targets microsoft windows-based systems,infecting the master boot r...

what is tabnapping?

Image
what is tab napping? the word "tab napping" comes from the combination of " tab " and " kidnapping". used by the hackers ,scammers and phishers. tab napping is an interesting ,tricky,clever, and  smart hacking technique for phishing and scamming. by this hacker can take advantage and control a victim's unattended browser tabs by hijacking and redirecting him to malicious URLs where they can perform attack and scripts and data URLs. its a kind of phishing but in phishing multiple tab does not open at the same time.  for example: if your already logged in to your  facebook account and suddenly you  see an interesting post with a web link.after clicking on the link , a news tab open. the link which is clicked by you it is redirected to it's original address. but the previous tab will change to a fake facebook login page. when you go back to the previous tab to log in facebook. your login information will be sent to the attacker and y...

ransomware

Image
what is ransomware? ransomware is a one type of malware,which blocks entire operating system or part of files and  docs until victim pays a ransom.source of ransomware infection are the same as for usual computer viruses-through email attachments and infected files downloaded with multimedia from malicious websites the threat is very real.if you use email,browse websites,spend time on social networks,connect to local networks (at work,at home, or in public spaces) or use removable usb drives, whether on a desktop,laptop,smartphone or tablet , you are always a click or two away from a ransomware infiltration.the  most recent ransomware is wannacry. how do you get ransomware? ransomware is most commonly distributed by email, social network message and infected  sites. 1)via phishing emails 2)as a result of visiting website that contain malicious programs email phishing most ransomware is distributed by the popular malware infection technique know as...

crack any zip file's password

                            how to crack any zip file password? 1)first, the password protected file is necessary... 2)if you don't know how to make it so we will create new one... 3)select the file by right click and go to "add  archive" 4)select the .zip and set password  5)and click ok... we made our password protected file and we are going to crack it... 6) go to kali-linux.. 7) and search for the fcrackzip and open it. 8)type the following command " fcrackzip -b -c a -l 5-5 -u file location  and press enter" yeah, finally we crack the password........      

honeypot

Image
 what is honeypot? in computer terminology , a honeypot is a computer security mechanism set to detect,deflect or in some manner, counteract  attempts at unauthorized use of information system. honeypot consists of data that appears to be a legitimate part of the site, but is actually isolated and monitored, and that seems to contain information or a resource of to attackers, who are then blocked. what is goal of create honeypot? the goal of a honeypot is to create an environment where the tools and behavior of blackhats can be captured and analyzed in the wild. based on this information, we can gain intelligence on threats faced by the internet community. a honeypot works by creating a highly controlled environment that is probed, attacked, and compromised  by blackhats. types of honeypot 1)production honeypots 2)research honeypots production honeypot : this honeypot are easy to use,capture only limited information, and are used ...

botnets

Image
  what is botnets?  'a botnet is a collection of computers, connected to the internet , that interact to accomplish some distributed task ' the botnets used for illegal purpose. who controls botnets? the botnets are controlled by one person or a group. how do they work? 1)bootmaster infects victim with bot (worm,social engineering) 2)bot connects to c&cc server. this could be done using http,irc,ot any other protocol 3)bootmaster sends commands through c&c server to bot what are they used for? bootmasters have botnets in upwards of 400,000 bots. and they used it to steal money.                              botnet uses 1) distributed denial of services(ddos) 2)spam/phishing 3)ad-ware 4)click fraud ddos the ddos has been available in bots since the beginning. used for extortion take down system until they pay --> threats work too...