Saturday 17 March 2012

PORT SCANNING

Port scanning is a technique which uses a port scanner software whose work is to check a server/computer for its open ports. People uses port scanner to see which services are running on which port on their computer. And Administrator of the server uses port scanner to keep a check on his network in respect of ports and to check the network policies of his network.

Attackers uses port scanner to check if they can break into the victim's system.
they check the vulnerability in the victim's system by checking the active and open ports and by knowing which services are running on which port in the victim's server.

Attacker may know the open ports in the server by using port scanner(port scanning) and then he can try to get the access of the server, he can also install a worm in victim's server to compromise some of his services.



Feel free to comment on this post. Any comment is appreciable.

This post is only for educational purpose. 

HOW TO MAKE BATCH FILE

Batch files are the files that contain the batch-script(DOS commands).
Basically you can run the DOS commands on the command prompt in windows OS.
in linux we have TERMINAL in place of command prompt.

DOS commands are the commands which can be used to make files, delete files, rename files, copy files, etc and the same for the directories.

We can manipulate almost anything in Windows by using DOS commands.
We will have to type some commands in command prompt and we can see the different interesting results by typing the different commands.


HOW TO MAKE BATCH FILES
(1) Open notepad
(2) type batch-script (sequence of DOS commands)
(3) save file with the extension .bat (Example:- hack.bat,trick.bat,prank.bat,etc)


That is it...!
Feel free to comment on this post. Any comment is appreciable.

This post is only for educational purpose. 

windows Prank 1

Want to give some little shocks to your friends????
try this one, (This prank will shutdown the computer. It will not make any harm)

create a batch file with code:-

shutdown -s -t 15 -c "This is a trojan.your computer is crashed."


now save this file and this to your friends and have some fun...!


Feel free to comment on this post. Any comment is appreciable.

This post is only for educational purpose. 

Thursday 15 March 2012

TELNET


INTRODUCTION
Telnet is the network protocol which run over the internet or in the LAN(Local Ares Network). TELNET is for making the two way connection between two computers for making the text based information passing between the computers.

SOCIAL ENGINEERING

INTRODUCTION
Social engineering is the act of manipulating people with the intention of making harm to them. Social engineering includes the act of talking or convincing people to get their valuable information.
Social engineering includes winning the trust of the person whose confidential information you want to steal.

Wednesday 14 March 2012

NETWORK MONITORING

The beauty of Internet is that you can use for hacking the same technique, features, software and tools which are meant to make computers more easier and efficient.

In this post we are going to discuss about a very interesting topic and that is PACKET SNIFFING.

Windows hack 1

STAR WARS IN YOUR COMMAND PROMPT
If you show your friends the text version of the famous series STAR WARS in your computer then you'll surely get fame among them.. !
okay, so all you need to do is open your command prompt (start > run > cmd)

Windows hack 2

MAKE YOUR FOLDER INVISIBLE IN WINDOWS
Do you ever think to make your folder of files INVISIBLE.. May be you can do it for fun, as a prank, or to save your data from unauthorized access or to become popular among your friends by showing them this trick..

Windows Hack 4

FOLDER LOCK WITHOUT ANY SOFTWARE
In this "window hack" post we are going to see that how can we make a folder hidden from our windows computer without using any software like "folder lock, etc"

All we need is just command prompt.

WINDOWS HACK 3

HIDE DATA
If you want to hide your personal data stored in your computer from your siblings, parents or spouse then this windows trick will definitely help you.
All your data will remain in-front of other people but still they cannot see what the files are containing.

Tuesday 13 March 2012

IP ADDRESS

How to trace ip address of someone
Many Rats, keyloggers, and trojan horses require IP address of the victim. You can even hack any computer if you got his/her IP address. IP address can be traced by using a simple trick.

Monday 12 March 2012

KEYLOGGER

What is keylogger
Precisely keylogger is a malware which gets install in computer to secretly steal the confidential informations stored in the computer.
Good keyloggers are hard to detect. There are a lot of free keyloggers available in the internet. You can buy some keyloggers too.

MALWARE

Lets see how to make a very simple malware..

All you need is NOTEPAD or any other text editor like NOTEPAD.
In this post we are trying to make a simple virus.

Sunday 11 March 2012

WHAT IS SPYWARE

Spyware is a type of malware which secretly collects the inforamtion about the user of the computer. The user of the computer may find it difficult to detect the spyware installed in their computer.

ANTI-MALWARE

Many viruses and spywares may come inside the word Malware therefore securing someone's computer from viruses and spywares is less important than securing a computer from MALWARES.
Securing a computer from malwares is very important because some malwares

WHAT IS MALWARE

Malware is the term used for Malicious software. Malicious softwares make harm to the computers, steal confidential informations from the computers, and provide remote unauthorized access of someone's computer secretly.

PHISHING

Phishing is a way of stealing informations such as usernames and passwords of any social networking website or auction sites of any particular person. Or Phishing can be used to steal the credit card information.
Basically, Phishing is carried out by sending emails or by sending instant messages

FACEBOOK HACK

Facebook is the world's most popular social networking website. It is having largest number of active users. Now almost every person is having an account on facebook.

HACKING

What is hacking
Hacking is a act of breaking into someone's computer, server, website, email account, messenger account, etc and steal their confidential informations.

There are a lot of different techniques and ways to perform hacking.