Posts

Showing posts with the label HACKING

Wannalocker: Android Users Wanna'Cry'

Image
Wannalocker: Android Users Wanna'Cry'. After the terror we saw with the dangerous Wannacry ransomware, another ransomware is on play. Unlike the wannacry, those ransomware is specialized for infecting android phones. Although, now the attack is spread only among Chinese users. Connection to Wannacry When it infects, the message screen coming by may scare you. Because it has a most familiar look we all saw presently. That’s why it is called as a Copycat of Wannacry Ransomware. Also the security company Avast named it as “wannalocker”. But the point is, the ransomware could spread havoc among the infected people and it can easily get famous. Only the name is enough, WANNACRY. We can understand that the attacker expects a quicker transfer of money. That might be the reason why the attacker decided to design the message screen display to look alike wannacry. [caption id="attachment_3655" align="aligncenter" width="422"] wannalocker display photo: avas...

Britney Spears' Instagram Used By Russian Hacker Group

Image
The social media giants like Instagram, which is on its way to hitting a billion users this years, surely have a number of harmless comments posted each day. But, will be there some occasional moments when some clever hacker posts some comments that instructing a malware how to get in touch with its controllers or servers?! A latest report says a Big yes! The Slovakian security company ESET said on Tuesday that a Russian espionage hacker group called, Turla has created such cleverly hidden comment. The interesting thing is that it was on the popular American singer Britney spears. Instagram comments on the American singer just got used to store the location of a C&C server (command & control server) of the 'Turla' hackers. The shocking operation was made by using a Mozilla firefox extension, in which a hidden backdoor in it. The team said it is one of the tool owned by the group, which is believed to be funded by the Russian government. Off course, The singer might not ...

Carding Credit Card Hacking Full Explain

Image
Carding Credit Card Hacking Full Explain Carding Credit Card Hacking [caption id="attachment_3659" align="aligncenter" width="960"] Carding Credit Card Hacking Full Explain[/caption] Carding Credit Card Hacking I had posted some posts about credit card hacking or generally known as carding, but I never try to well explain them, I was really enough busy in posting tutorial instead of explaining the basic of carding. So today I am trying to give you a well intro to carding as well as explaining all term related to carding. " Use Socks 5 In Carding" Please don’t be lazy! try to read all if you don’t want to be fooled by other in future Don't forget to read full post. Note From Admin: We need a 20 Author for this website, who have previously write a for any WordPress or blogger blog & have a knowledge of how to write post in blog, we pay to every Author. We pay 60 Rupees for every 20 post. If you are interested in writing a posts for this ...

Top Indian Hackers You Should Know

Image
Top Indian Hackers Top Indian Hackers  Computer hackers are almost always celebrated, whether they fall in the ‘black’ or ‘white’ side of the law. But you rarely get to hear about Indian hackers in our own media. And especially when these hackers are decisively helping organizations and governments in positive ways they ought to be celebrated. Here are 11 best Indian hackers we all should know of. 1. Rahul Tyagi [caption id="attachment_16103" align="aligncenter" width="613"] Top Indian Hackers[/caption] Rahul Tyagi | Source: twitte Aside from being an expert on breaking and entering computers Rahul Tyagi is also an author and a talented actor. With over a hundred training sessions under his belt this guy is as versatile as it gets. 2. Pranav Mistry [caption id="attachment_16104" align="aligncenter" width="610"] Top Indian Hackers[/caption] Source: vulcanpost.com This hacker extraordinaire is also famous for the invention of ...

What Is DoS Attack ? Types Of DoS Attack ?

Image
What Is DoS Attack What is DoS Attack  DOS is an attack used to deny legitimate users access to a resource such as accessing a website, network, emails, etc. or making it extremely slow. DoS is the acronym for  D enial  o f Service . This type of attack is usually implemented by hitting the target resource such as a web server with too many requests at the same time. This results in the server failing to respond to all the requests. The effect of this can either be crashing the servers or slowing them down. THIS POST ONLY FOR EDUCATIONAL PURPOSES TRY ON OWN RISK ASK2GURUJI NOT RESPONSIBLE FOR ANY DAMAGES OR ANY ELLIGIAL ACTIVITY Cutting off some business from the internet can lead to significant loss of business or money. The internet and computer networks power a lot of businesses. Some organizations such as payment gateways , e-commerce sites entirely depend on the internet to do business. In this tutorial, we will introduce you to what denial of service attack is, how it is performe...

20 Best Hacking Apps For Android Phones Part - 3

Image
20 Best Hacking Apps For Android Phones 20 Best Hacking Apps For Android Phones Part 3  We are writing this posts in 4 parts, if you not read earlier part so, first read all earlier parts of this posts. We bring you 5 apps in each posts. Read Previous Parts  Part - 1  | Part - 2 Disclaimer: "The Content inside the post is only for educational purposes. we are not responsible if anyone misuses it." 1. DroidSheep [caption id="attachment_3514" align="aligncenter" width="448"] 20 Best Hacking Apps For Android Phones - droidsheep - ASK2GURUJI - BLOGGER ASHOK PUNETHA[/caption] DroidSheep is an android tool developed by Andreas Koch  for security analysis in wireless networks. It is basically a session hijacking tool that allows hackers to capture session cookies over the wireless network. That means you can sniff and capture the web session profiles of a person who is on the same network. both FaceNiff and DroidSheep are the tools capable of hijacking...

Good News for Wannacry Victims: Your Files Are Easy to Recover!

We all know about the panic made by the infamous ransomware worm wannacry. It hit more than 3lakhs of systems within 72 hours. The latest reports says that there are some errors found in the wannacry code and it might allow the victims to restore the files without any decryption keys. Senior researcher at security company kasperkey lab Anton Ivanov, along with his team mates’ fedor sinitsy and orkhan mamedov explained thursday that some critical errors in the code made by wannacry developers. They made mainly 2 types errors. While deleting the original file. While processing the read-only files. By utilizing these errors, the victims can restore their files using just a recovery software. 1.Error in the removal logic When wannacry encrypts a file it first reads the original file, encrypts it and save it to an extension .WNCRYT. Then it moves to another extension .WNCRY and deletes the original file. Our issue resides in this area that is in the way the ransomware deletes the orig...

20 Best Hacking Apps For Android Phones Part - 2

Image
20 Best Hacking Apps For Android Phones Part 2 We are writing this posts in 4 parts, if you not read earlier part so, first read all earlier parts. This is the second part of "20 Best Hacking Apps For Android Phones" . Hope you read our earlier part. Now we bring you the next. Read Previous Parts  Part - 1 Disclaimer: "The Content inside the post is only for educational purposes. we are not responsible if anyone misuses it." 1. zANTI [caption id="attachment_3524" align="aligncenter" width="480"] 20 Best Hacking Apps For Android Phones - zANTI - ASK2GURUJI - BLOGGER ASHOK PUNETHA[/caption] zANTI is a penetration testing toolkit developed by Zimperium Mobile Security for cyber security professionals. Basically, it allows you to simulate malicious attacks on a network. With the help of zANTI, you will be able to do various types of operations such as MITM attacks, MAC address spoofing, scanning, password auditing, vulnerability checks a...

Top 5 All Time Best Hacking Tools For Hackers

Image
Top 5 All Time Best Hacking Tools For Hackers Top 5 All Time Best Hacking Tools For Hackers: Today in this post i am tell about 5 best hacking tools. So, if want to to learn hacking these tools are important for you. Read  What Is SQL Injection? How To Hack Website Using SQL Injection ? "THIS TUTORIALS ONLY FOR EDUCATIONAL PURPOSE ONLY" so lets start. 1. Metasploit Penetration testing software to help you act like the attacker [caption id="" align="aligncenter" width="635"] Top 5 All Time Best Hacking Tools For Hackers[/caption] Attackers are always developing new exploits and attack methods—Metasploit penetration testing software helps you use their own weapons against them. Utilizing an ever-growing database of exploits, you can safely simulate real-world attacks on your network to train your security team to spot and stop the real thing. 2. NMAP Used to Scan Ports and Map Networks – and a whole bunch more! [caption id="" align=...

Warning! You Are Being Watched Without Your Knowledge

Image
When NSA contractor the famous(' infamous', 'the hero' ) Edward Snowden revealed that the US government is watching us through the yahoo web chat in a project called, 'Optic Nerve', we got really scared. A Developer from AOL, Mr.Ran Bar Zik has reported the similar situation Now. He insists we could get spied, watched without our knowledge through a UX design flaw in google chrome. If any hacker with malicious intention exploit this flaw, yes. it is possible. User will be not aware that they are being spied. How it Works Presently the modern web browsers like google chrome and mozilla firefox uses a collection of protocols called, webRTC(Web real time communication) protocol for real time audio video communication. Web browsers doesn't need a plugin if they are using webRTC. To protect from unauthorized audio and streaming using this webRTC, browser requests the users to allow particular websites to use webRTC and then to access devices camera and microphone...

What Is SQL Injection ? How To Hack Website Using SQL Injection ?

What Is SQL Injection ? How To Hack Website Using SQL Injection ? WHAT IS SQL INJECTION ? SQL injection, also known as SQLi, is a common attack vector that uses malicious SQL code for backend database manipulation to use information that was not intended to be displayed. This information may include any number of items, including sensitive company data, user lists or private customer details. How To View Your Email Subscribers In WordPress DroidSQLi Hack Website Using SQL Injection DroidSQLi Pro Android App For Hackers The impact SQL injection can have on a business is far-reaching. A successful attack may result in the unauthorised viewing of user lists, the deletion of entire tables and, in certain cases, the attacker gaining administrative rights to a database, all of which are highly harmful to a business. When calculating the potential cost of a SQLI, it’s important to consider the loss of customer trust should personal information such as phone numbers, addresses and cr...