Showing posts with label Learning. Show all posts
Showing posts with label Learning. Show all posts
Saturday, 31 August 2013

Hers is Top password cracking method

Note:-This Article is only for education purpose
1. Dictionary attack“This uses a simple file containing words that can, surprise surprise, be found in a dictionary. In other words, if you will excuse the pun, this attack uses exactly the kind of words that many people use as their password…”
2. Brute force attack
“This method is similar to the dictionary attack but with the added bonus, for the hacker, of being able to detect non-dictionary words by working through all possible alpha-numeric combinations from aaa1 to zzz10…”
3. Rainbow table attack
“A rainbow table is a list of pre-computed hashes – the numerical value of an encrypted password, used by most systems today – and that’s the hashes of allpossible password combinations for any given hashing algorithm mind. The time it takes to crack a password using a rainbow table is reduced to the time it takes to look it up in the list…”
4. Phishing
“There’s an easy way to hack: ask the user for his or her password. A phishing email leads the unsuspecting reader to a faked online banking, payment or other site in order to login and put rightsome terrible problem with their security…”
5. Social engineering
“A favourite of the social engineeris to telephone an office posing asan IT security tech guy and simply ask for the network access password. You’d be amazed how often this works…”
6. Malware
“A key logger or screen scraper can be installed by malware whichrecords everything you type or takes screen shots during a login process, and then forwards a copy of this file to hacker central…”
7. Offline cracking
“Often the target in question has been compromised via an hack ona third party, which then providesaccess to the system servers and those all-important user password hash files. The password cracker can then take as long as they need to try and crack the code without alerting the target system or individual user…”
8. Shoulder surfing
“The service personnel ‘uniform’ provides a kind of free pass to wander around unhindered, and make note of passwords being entered by genuine members of staff. It also provides an excellent opportunity to eyeball all those post-it notes stuck to the front of LCD screens with logins scribbled upon them…”
9. Spidering
“Savvy hackers have realised that many corporate passwords are made up of words that are connected to the business itself. Studying corporate literature, website sales material and even the websites of competitors and listed customers can provide the ammunition to build a custom word list to use in a brute force attack…”
10. Guess
“The password crackers best friend, of course, is the predictability of the user. Unless a truly random password has been created using software dedicated to the task, a user generated ‘random’ password is unlikely to be anything of the sort…”

send friend request s on facebook whn you are blocked using simple step

Step.1  
Go to  this LINK.
This link will help you to add people by email address.If you want to add many people then it will good for you if you create contact list of to whom you want to send request.If you do not know how to make contact list then follow given below steps a) Open new text document (.txt) in notepad.
b) Add all the email addresses separated by a comma ( , ).
c) Save that file with the extension .vcf
You have created your conatct file.
Step. 2
Upload this file to Facebook. and you will be able to send friend request.

How to Upload contact file:In order to know how to upload contact file on facebook go to below link.
 
In above link you will see option of “upload files”  or
“others tools” below on Skype in the mid of page.Clik on it to upload files.

Step. 3
Click “OK”and now you are able to send many request known or unknown people.

Learn programming language for ethical hacking

a) HTML

    HTML stands for Hypertext Markup Language (HTML) is the fundamentals for developing web pages and other similar net related tasks that can be displayed in a web browser. One should learn HTML at its priority.

.b) JAVAScript
  • The knowledge of JAVA script will help you understand the basics of Cross Site Scripting.

.c) PHP/SQL

  • Majority of web applications are written using PHP and MySQL .So it is a must to learn PHP

  • For Writing / Understanding Exploits, Shell Codes, Root kits etc

.d) C & C++

  • Approximately 60% of the exploits you observe on the internet are written in C & C ++.

.e) Assembly

  • The knowledge of Assemble will help you in understanding and writing Shell Codes which will ultimately help you in Reverse Engineering applications.
Languages Used in Most popular websites.
.
1. Google – Java (Web), – C++ (indexing)
2. Facebook – PHP
3. YouTube - Flash, Python, Java
4. Yahoo – PHP and Java
5. Microsoft Live.com – .NET
6. Baidu – Unknown
7. Wikipedia  – PHP
8. Blogger – Java
9. MSN – .NET
10. Twitter – Ruby on Rails, Scala, Java