Archive for April 2015

How To Hack Into Computers Through Wifi

How To Hack Into Computers Through WiFi

The internet is ever growing and you and I are truly pebbles in a vast ocean of information. They say what you don’t know can’t hurt you. When it comes to the Internet believe quite the opposite. On the Internet there a millions and millions of computer users logging on and off on a daily basis. Information is transferred from one point to another in a heartbeat. Amongst those millions upon millions of users, there’s you.In this tutorial i am going to show you how to to access someone's facebook, youtube, and many other accounts which is using the same WiFi as you.

You need:

  Mozilla Firefox
    Firesheep - A Firefox extension that demonstrates HTTP session hijacking attacks.
   WinPcap - WinPcap is an open source library for packet capture and network analysis for the Win32 platforms. It includes a kernel-level packet filter, a low-level dynamic link library (packet.dll), and a high-level and system-independent library.

Step 1: Install WinPcap then drag the Firesheep add-on, and put it on the Firefox icon. Firefox will open and will ask you to install the add on. Install it and restart Firefox.

Step 2: Open the add-on (You can do it by clicking on View -> Sidebar -> Firesheep), then click on Start Capturing and it'll start capturing, and as soon as somebody logs in any account it'll show up the logs, and then you can access their account.

Simple, but functional and VERY effective method to hack someones facebook, youtube, myspace, etc. account through WiFi.
Tuesday, 28 April 2015
Posted by Christina Evangeline

How To View Saved Wifi Password In Android

How To View Saved Wifi Passwords In Android
I love working from cafes, especially the ones with free Wi-Fi. Nothing better than working with a bit of white noise around and writing with a hot cup of coffee by my side. That’s the reason I have saved Wi-Fi passwords of many cafes in my locality. However, sometimes you don’t go to these places alone and are accompanied by your friends who might as well need the Wi-Fi access. If you have your laptop with you then it’s not that difficult to make it show the passwords. But on a phone, it isn’t that straightforward. And the chances of our phones being with us than our laptops is significantly more.


                                      How to View saved Wifi Password on Android

 Method To View Saved Wifi Passwords on Android :-

Requirements :-


 Rooted Android (how to root)
 ES File Explorer

Steps to View Saved Wifi Passwords In Android 2015

1. Move up a folder (to the root folder) in ES File Explorer and you will see a directory called data.



 2. Go to data/misc/wifi folder and you will find a file named wpa_supplicant.conf. Open the file and make sure you use ES File Explorer ‘s built-in text/HTML viewer for the task.

3. Now in this file you will be able to see the network SSID and their passwords next to it




 4. Now note down the network name and its password.

In this way you will be able to view all saved wifi password in android device. Please do not edit anything in wpa_supplicant.conf as it can alter your device working or it will have affect on own  wifi connectivity.


View Saved Wifi Passwords In Android 2015 – There are many apps in Play Store which can perform save work but it is better to do it manually than to add that adware crap. 
Posted by Christina Evangeline
Tag : ,

Find Who Is Connected To Your Wi-Fi

Find Who is Connected to Your Wi-Fi





Worried of slow connections on using Wi-Fi? Do you think somebody might been using your Wi-Fi connection?  How will it be if you been able to find who is connected to your Wi-Fi with (or without) your know?
Yes, it is Possible for you to find who is using your Wi-Fi connection.
Lets Get Started:
There are two methods available for you to find the connected devices with your router.

 1) Finding Devices Connected to WiFi Connection

Via Router:

By default, all the router provides with this feature. For that, we need to login to your router’s admin panel and move over to Connected Devices. Your Router configuration page can provide you so much of information about your WiFi connection including the number of people connected to your WiFi connection.
 

The router’s admin panel differs with each model, and here it is for netgear router.

2) Using Tools(softwares)-the easiest method:

If you could not follow with the first method, then this trick will help you to find out the connected devices.
Download and Install (any one of the below tools)

   Wireless Network Watcher
   Connectify


In this method you will be using a small tool to scan your WiFi connection for the connected devices, Press Scan

As soon as you run and scan the tool you will get the complete list of devices connected to your WiFi connection along with their assigned IP address and Mac Address.

By this way you will need to find who is connected to your Wi-Fi.
Incase if you find any other ip and a MAC address apart from yours, you can block that particular MAC address from getting connected to your connection.

Secure your Router 
Configure your router:

Goto your router’s official website and check  with your model number for a firmware update. If there is an update for your model, then download and install it. By doing this, your router will have the latest firmware thus resulting in less attacks and security.

Find the list of Connected Devices:

Look out for this option on your router interface. A button named link or attached devices will take you to the list. This list can be seen on the configuration page of WiFi or on any status page which will bring out complete information about the users of the router.

Monday, 27 April 2015
Posted by Christina Evangeline
Tag : ,

Learn To Hide Files Behind The Images



There are some important files or document you want to hide from others on your computer. To do that you might be creating folder inside folder to hide such files but in today’s tutorial we will change this by teaching you a interesting trick to hide files behind images. To hide a file behind an image means that if any one opens that image he will see the image, but to see the hidden file we need to open that image in a specific way. So let’s get started.

How to hide files behind the images:

In order to do this you should have basic understanding of command line, but if you don't know check out  tutorial given below.

1. Select an image to be used for hiding file behind the image.

2. Now select a file to hide behind the image and make it in .RAR format, With the help of the WinRAR.

3. And most important is that paste both the files on desktop. You may do this anywhere instead of desktop if you have some basic understanding of command line.

4. Now open cmd by going to Start > Accessories > Command Prompt and type following commands in it.


Cd desktop
  


5. CD stands for change directory by typing above command you change your directory to desktop. After that, type command given below.

     Copy /b imagename.jpg + filename.rar finalimage.jpg



Replace imagename.jpg with the name of image you want your file to be hidden behind. Don't forget to add image format.
Replace filename with name of your file you want to hide. It must be in .rar format.

{C}{C}Finally replace finalimage.jpg with whatever name you want your final image with hidden files should be. This is the image where your file will be hidden.



6. Now when you will try to open this newly created image it will open as normal image, but to open you hidden file you need follow steps given.
Friday, 24 April 2015
Posted by Unknown
Tag :

STEPS NECESSARY TO BECOME AN ETHICAL HACKER





Hacking is an engaging field but it is surely not easy. To become a hacker one has to have an attitude and curiosity of learning and adapting new skills. You must have a deep knowledge of computer systems, programming languages, operating systems and the journey of learning goes on and on. Some people think that a hacker is always a criminal and do illegal activities but they are wrong. Actually many big companies hire hackers to protect their systems and information and are highly paid. These are 12 most important steps necessary to become a hacker.

 Code in C language

C programming is the base of learning UNIX/LINUX as this operating system is coded in C programming which makes it the most powerful language as compared to other programming languages. C language was developed by Dennis Ritchie in late 1970’s. To become a hacker you should master C language.

Learn UNIX/LINUX

UNIX/LINUX is an open source operating system which provides better security to computer systems. It was first developed by AT&T in Bell labs and contributed a lot in the world of security. You should install LINUX freely available open source versions on your desktops as without learning UNIX/LINUX, it is not possible to become a hacker.

Learn to code in more than one Programming Language
It is important for a person in the hacking field to learn more than one programming. There are many programming languages to learn such as Python, JAVA, C++. Free eBooks, tutorials are easily available online.

Learn Networking Concepts


Another important and essential step to become a hacker is to be good at networking concepts and understanding how the networks are created. You need to know the differences between different types of networks and must have a clear understanding of TCP/IP and UDP to exploit vulnerabilities (loop holes) in system.

Understanding what LAN, WAN, VPN, Firewall is also important.

You must have a clear understanding and use of network tools such as Wire shark, NMAP for packet analyzing, network scanning etc.

Learn More Than One Operating Systems
It is essential for a hacker to learn more than one operating system. There are many other Operating systems apart from Windows, UNIX/LINUX etc. Every system has a loop hole, hacker needs it to exploit it.

Learn Cryptography
To become a successful hacker you need to master the art of cryptography. Encryption and Decryption are important skills in hacking. Encryption is widely done in several aspects of information system security in authentication, confidentiality and integrity of data. Information on a network is in encrypted form such as passwords. While hacking a system, these encrypted codes needs to be broken, which is called decryption.

Learn more and more about hacking
Go through various tutorials, eBooks written by experts in the field of hacking. In the field of hacking, learning is never ending because security changes every day with new updates in systems.

Experiment A Lot
After learning some concepts, sit and practice them. Setup your own lab for experimental purpose. You need a good computer system to start with as some tools may require powerful processor, RAM etc. Keep on Testing and learning until you breach a system.

Write Vulnerability
Vulnerability is the weakness, loop hole or open door through which you enter the system. Look for vulnerabilities by scanning the system, network etc. Try to write your own and exploit the system.

Contribute To Open Source Security Projects
An open source computer security project helps you a lot in polishing and testing your hacking skills. It’s not a piece of cake to get it done. Some organizations such as MOZILLA, APACHE offer open source projects. Contribute and be a part of them even if your contribution is small, it will add a big value to your field.

Continue never ending Learning
Learning is the key to success in the world of hacking. Continuous learning and practicing will make you the best hacker. Keep yourself updated about security changes and learn about new ways to exploit systems

Join Discussions and meet hackers
Most important for a hacker is to make a community or join forums, discussions with other hackers worldwide, so that they can exchange and share their knowledge and work as a team. Join Facebook groups related to hacking where you can get more from experts.



Posted by Unknown

Follow by Email

Google+ Followers

Pageviews

Cloud Label

Blogumulus by Roy Tanck and Amanda Fazani

- Copyright © 2013 Redback IT Academy -- Powered by Redback - Designed by @ Redback Studio -