Sunday, 18 December 2016

flipkart free coupons and discount

Flipkart free coupons discounts and more....



Get free discount and coupons only on the new app of flipkart....

Most bought products.....


Saturday, 12 November 2016

HACK WIFI WITH FLUXION

Description Fluxion 

Fluxion - a remake linset from vk496 with fewer bugs and more features. It is compatible with the latest release of Kali (Rolling).

How it works
  • Scans network
  • Captures handshake (can not be used without a valid handshake, it is necessary for password verification)
  • It uses a web-based interface
  • Starts an instance of a false access point, which pretends to be a true point (use the same name) access
  • Process starts MDK3 , deautentifitsiruet that all users connected to the target network, so they can be lured to connect to our fake access point for entering the password WPA
  • It runs a fake DNS server to capture all DNS requests and forward them to the host, run the script
  • Runs captive portal, which shows the page that prompts the user to enter his password WPA
  • Each entered password is verified on previously captured handshake
  • Attack will automatically stop as soon as it entered the correct password
It is recommended to use 2 or Kali Linux Kali 2016.1 rolling. 2 & Kali 2016 and external Wi-Fi card .
It can hack any network wep WPA and wpa2 two wireless card is required download from above link extract it type in terminal cd (location of fluxion) enter and type ./installer it will take some time depending on your internet speed....
.
Enjoy any questions leave a comment...

Thursday, 6 October 2016

Free Coupons Flipkart Offer Zone

Flipkart Free Coupons




Get Flipkart coupons only on the new flipkart app...

Steps...

1. Install flipkart app from the link given below...
2. Open and register from new email or number...
3. Go to the reward section to check your balance....

Get upto 80% off on electronics mobiles etc....

Flipkart app link



Friday, 29 April 2016

How to Become a Hacker?



How to Become a Hacker?




In computer security, a hacker is someone who focuses on security mechanisms of computer and network systems. There is a community and shared culture of expert programmers and networking wizards that traces its history back through decades to the first time-sharing minicomputers and the earliest ARPAnet experiments. The members of this culture were the first "hackers." Breaking into computers and breaking phone systems have come to symbolize hacking in popular culture, but hacking culture is much more complex and moralistic than most people know. Learn basic hacking techniques, how to think like a hacker, and how to gain respect in order to crack your way into the complex world of hacking.
1 Run Unix. Unix is the operating system of the Internet. While you can learn to use the Internet without knowing Unix, you can't be an Internet hacker without understanding Unix. For this reason, the hacker culture today is pretty strongly Unix-centered. A Unix like Linux can run alongside Microsoft Windows on the same machine.

2  Write HTML. If you don't know how to program, learning basic HyperText Mark-Up Language (HTML) and gradually building proficiency is essential. What you see when you look at a website of pictures, images, and design components is all coded using HTML. For a project, set out to learn how to make a basic home page and work your way up from there.
•In your browser, open the page source information to examine the HTML to see an example. Go to Web Developer > Page Source in Firefox and spend time looking at the code.
•You can write HTML in a basic word processing program like Notepad or Simple text and save your files as "text only," so you can upload them to a browser and see your work translated.
•You'll need to learn to format tags and learn to think visually using them.  "<" is used to open a tag and "/> is used to close it. "
" is the opening for a line of paragraph code. You'll use tags to signal anything visual: italics, formatting, color, etc. Learning HTML will help you to understand better how the Internet works.


3 Learn the language of programming. Before you start writing poems you have to learn basic grammar. Before you break the rules you have to learn the rules. But if your ultimate goal is to become a hacker, you're going to need more than basic English to write your masterpiece.
•Python is a good "language" to start off with because it's cleanly designed, well documented, and relatively kind to beginners. Despite being a good first language, it is not just a toy; it is very powerful, flexible, and well-suited for large projects. Java is an alternative, but its value as a first programming language has been questioned.
•If you get into serious programming, you will have to learn C, the core language of Unix. C++ is very closely related to C; if you know one, learning the other will not be difficult. C is very efficient with your machine's resources, but will soak up huge amounts of your time on debugging and is often avoided for that reason, unless the efficiency of your computer is especially important.
•It is probably a good idea to use a good starting platform such as Backtrack 5 R3, Kali or Ubuntu 12.04LTS.


Think creatively. Now that you've got the basic skills in place, you can start thinking artistically. Hackers are like artists, philosophers, and engineers all rolled up into one. They believe in freedom and mutual responsibility. The world is full of fascinating problems waiting to be solved. Hackers take a special delight in solving problems, sharpening their skills, and exercising their intelligence.


Would you suggest a Windows PC or a Mac for a hacker?
•Linux, as it is the most versatile platform to perform hacking operations. A Mac will be fine too as it is Unix based but it is very easy to get drawn into Apple's proprietary language, and C on Windows is just too much effort for what you're trying to do. Installing Linux is the best way to go by far.
•How long does it take to be a good/real  hacker ?
•This isn't really a question with a clear answer. It depends on the proficiency of your knowledge relating to technology and how fast it takes for you to learn the basic steps to become a hacker. It will also require political astuteness and an accurate understanding of people's behavior. "How much time are you willing to devote to becoming a hacker?" is probably the the better question to ask and answer yourself.
•What kind of education do I need to become a hacker?
•You'll need to learn at least one programming language, but it's not about a checklist of skills. You should try to get a deep understanding of how the language operates, and how operating systems and networks function. Most hackers teach this to themselves or learn from other hackers.

Thursday, 17 March 2016

ALL CMD COMMANDS



 ALL CMD COMMANDS




APPEND
Sets the path to be searched for data files or displays the current search path. The APPEND command is similar to the PATH command that tells DOS where to search for program files (files with a .COM, .EXE, or .BAT filename extension). The APPEND command guides the search for data files (such as text files).
ASSIGN
The command redirects requests for disk operations on one drive to a different drive. It can also display drive assignments or reset all drive letters to their original assignments. The command is available in MS-DOS 5.00.
ATTRIB
Attrib changes or views the attributes of one or more files. It defaults to displaying the attributes of all files in the current directory. The file attributes available include read-only, archive, system, and hidden attributes. The command has the capability to process whole folders and subfolders of files.
BACKUP and RESTORE
These are commands to backup and restore files from an external disk. These appeared in version 2, and continued to PC DOS 5 and MS-DOS 6 (PC DOS 7 had a deversioned check). In DOS 6, these were replaced by commercial programs (CPBACKUP, MSBACKUP), which allowed files to be restored to different locations. These commands are not given here. For getting the syntax of this command you need to check another website.
BASIC and BASICA
An implementation of the BASIC programming language for PCs. Implementing BASIC in this way was very common in operating systems on 8- and 16-bit machines made in the 1980s.
IBM computers had BASIC 1.1 in ROM, and IBM's versions of BASIC used code in this ROM-BASIC, which allowed for extra memory in the code area. BASICA last appeared in IBM PC DOS 5.02, and in OS/2 (2.0 and later), the version had ROM-BASIC moved into the program code.
Microsoft released GW-BASIC for machines with no ROM-BASIC. Some OEM releases had basic.com and basica.com as loaders for GW-BASIC.EXE.
Basic was dropped after MS-DOS 4, and PC DOS 5.02. OS/2 (which uses PC DOS 5), has it, while Microsoft Windows NT (MS-DOS 5) does not.
CALL
Starts a batch file from within another batch file and returns when that one ends.
CD and CHDIR
The CHDIR (or the alternative name CD) command either displays or changes the current working directory.
CHCP
The command either displays or changes the active code page used to display character glyphs in a console window.
CHKDSK
CHKDSK verifies a storage volume (for example, a hard disk, disk partition or floppy disk) for file system integrity. The command has the ability to fix errors on a volume and recover information from defective disk sectors of a volume.
CHOICE
The CHOICE command is used in batch files to prompt the user to select one item from a set of single-character choices. Choice was introduced as an external command with MS-DOS 6.0; Novell DOS 7[3] and PC DOS 7.0. Earlier versions of DR DOS supported this function with the built-in switch command (for numeric choices) or by beginning a command with a question mark. This command was formerly called ync (yes-no-cancel).[citation needed]
CLS
The CLS or CLRSCR command clears the terminal screen.
COPY
Copies files from one location to another. The destination defaults to the current directory. If multiple source files are indicated, the destination must be a directory, or an error will result. COPY has the ability to concatenate files. The command can copy in text mode or binary mode; in text mode, copy will stop when it reaches the EOF character; in binary mode, the files will be concatenated in their entirety, ignoring EOF characters.
Files may be copied to devices. For example, copy file con outputs file to the screen console. Devices themselves may be copied to a destination file, for example, copy con file takes the text typed into the console and puts it into FILE, stopping when EOF (Ctrl+Z) is typed.
CTTY
Defines the terminal device (for example, COM1) to use for input and output.
DATE
Displays the system date and prompts the user to enter a new date. Complements the TIME command.
DEFRAG
The command has the ability to analyze the file fragmentation on a disk drive or to defragment a drive. The command is called DEFRAG in MS-DOS/PC DOS and disk opt in DR-DOS.
DEL and ERASE
DEL (or the alternative form ERASE) is used to delete one or more files.
DELTREE
Deletes a directory along with all of the files and subdirectories that it contains. Normally, it will ask for confirmation of the potentially dangerous action.
The deltree command is included in certain versions of Microsoft Windows and Microsoft DOS Operating Systems. It is specifically available only in versions of MS-DOS 6.0 and higher, and in Microsoft Windows 9x. In Windows NT, the functionality provided exists but is handled by the command rd or rmdir which has slightly different syntax. This command has been deprecated for Windows 7.
DIR
The DIR command displays the contents of a directory. The contents comprise the disk's volume label and serial number; one directory or filename per line, including the filename extension, the file size in bytes, and the date and time the file was last modified; and the total number of files listed, their cumulative size, and the free space (in bytes) remaining on the disk. The command is one of the few commands that exist from the first versions of DOS. The command can display files in subdirectories. The resulting directory listing can be sorted by various criteria and filenames can be displayed in a chosen format.
ECHO
The ECHO command prints its own arguments back out to the DOS equivalent of the standard output stream. Usually, this means directly to the screen, but the output of echo can be redirected, like any other command, to files or devices. Often used in batch files to print text out to the user.
Another important use of the echo command is to toggle echoing of commands on and off in batch files. Traditionally batch files begin with the @echo off statement. This says to the interpreter that echoing of commands should be off during the whole execution of the batch file, thus resulting in a "tidier" output (the @ symbol declares that this particular command (echo off) should also be executed without echo.)
EDIT
EDIT is a full-screen text editor, included with MS-DOS 5 and 6, OS/2 and Windows NT to 4.0 The corresponding program in Windows 95 and later, and W2k and later is Edit v2.0. PC DOS 6 and later use the DOS E Editor and DR-DOS used editor up to version 7.
EDLIN
DOS line-editor. It can be used with a script file, like debug, this makes it of some use even today. The absence of a console editor in MS-DOS/PC DOS 1-4 created an after-market for third-party editors.
In DOS 5, an extra command "?" was added to give the user much needed help.
DOS 6 was the last version to contain EDLIN, for MS-DOS 6, it's on the supplemental disks, PC DOS 6 had it in the base install. Windows NT 32-bit, and OS/2 have Edwin.
EXE2BIN
Converts an executable (.exe) file into a binary file with the extension .com, which is a memory image of the program.
The size of the resident code and data sections combined in the input .exe file must be less than 64 KB. The file must also have no stack segment.
EXIT
Exits the current command processor. If the exit is used at the primary command, it has no effect unless in a DOS window under Microsoft Windows, in which case the window is closed and the user returns to the desktop.
FASTOPEN
FC and COMP
Show differences between any two files, or any two sets of files.
FDISK
The FDISK command manipulates hard disk partition tables. The name derives from IBM's habit of calling hard drives fixed disks. FDISK has the ability to display information about, create, and delete DOS partitions or logical DOS drive. It can also install a standard master boot record on the hard drive.
FIND
The FIND command is a filter to find lines in the input data stream that contain or don't contain a specified string and send these to the output data stream. It may also be used as a pipe.
C:\>find /V "any string" FileName
FOR
The FOR loop can be used to parse a file or the output of a command.
FORMAT
Deletes the FAT entries and the root directory of the drive/partition, and reformats it for MS-DOS. In most cases, this should only be used on floppy drives or other removable media. This command can potentially erase everything on a computer's hard disk.
GRAPHICS
A TSR program to enable the sending of graphical screen dump to printer by pressing <Print Screen>.
HELP
Gives help about DOS commands.
MS-DOS
Help 'command' would give help on a specific command. By itself, it lists the contents of DOSHELP.HLP.
MS-DOS 6.xx help command uses QBASIC to view a quickhelp HELP.HLP file, which contains more extensive information on the commands, with some hyperlinking etc. The MS-DOS 6.22 help system is included on Windows 9x cdrom versions as well.
PC DOS
PC DOS 5,6 help is the same form as MS-DOS 5 help command.
PC DOS 7.xx help uses view.exe to open OS/2 style .INF files (cmdref.inf, dosrexx.inf and doserror.inf), opening these to the appropriate pages.
DR-DOS
In DR-DOS, help is a batch file that launches DR-DOS' reference, dosbook.
Microsoft Windows
Windows NT, all versions, uses DOS 5 style help, but versions before VISTA have also a Windows help file (NTCMDS.HLP or NTCMDS.INF) in a similar style to MS-DOS 6.
INTERSVR and INTERLNK
In MS-DOS; filelink in DR-DOS.
Network PCs using a null modem cable or LapLink cable. The server-side version of InterLnk, it also immobilizes the machine it's running on as it is an active app (As opposed to a TSR app) which must be running for any transfer to take place. DR-DOS' filelink is executed on both the client and server.
New in PC DOS 5.02, MS-DOS 6.0
JOIN
The JOIN command attaches a drive letter to a specified directory on another drive.[4] The opposite can be achieved via the SUBST command.
LABEL
Main article: label (command)
Changes the label on a logical drive, such as a hard disk partition or a floppy disk.
LOADFIX
Loads a program above the first 64K of memory, and runs the program. The command is included only in MS-DOS/PC DOS. DR-DOS used memmax, which opened or closed lower, upper, and video memory access, to block the lower 64K of memory.
LOADHIGH and LH
hiload in DR-DOS.
MD or MKDIR
Makes a new directory. The parent of the directory specified will be created if it does not already exist.
MEM
Displays memory usage. It is capable of displaying program size and status, memory in use, and internal drivers.It is internal command.
MEMMAKER
Starting with version 6, MS-DOS included the external program MemMaker which was used to free system memory (especially Conventional memory) by automatically reconfiguring the AUTOEXEC.BAT and CONFIG.SYS files. This was usually done by moving TSR programs and device drivers to the upper memory. The whole process required two system restarts. Before the first restart the user was asked whether he/she wanted to enable EMS Memory, since use of expanded memory required a reserved 64KiB region in upper memory. The first restart inserted the SIZER.EXE program which gauged the memory needed by each TSR or Driver. MemMaker would then calculate the optimal Driver and TSR placement in upper memory and modify the AUTOEXEC.BAT and CONFIG.SYS accordingly, and reboot the second time.
MEMMAKER.EXE and SIZER.EXE were developed for Microsoft by Helix Software Company and were eliminated starting in MS DOS 7 / Windows 95. PC DOS uses another program RamBoost to optimize memory, working either with PC DOS's HIMEM/EMM386 or a third-party memory manager. RamBoost was licensed to IBM by Central Point Software.
MODE
Configures system devices. Changes graphics modes, adjusts keyboard settings, prepares code pages, and sets up port redirection.
MORE
The MORE command paginates text, so that one can view files containing more than one screen of text. More may also be used as a filter.
MOVE
Main article: move (command)
Moves files or renames directories. DR-DOS used a separate command for renaming directories, rendir.
MSD
Main article: Microsoft Diagnostics
The MSD command provides detailed technical information about the computer's hardware and software. MSD was new in MS-DOS 6;[8] the PC DOS version of this command is QCONFIG.[citation needed] The command appeared first in Word2, and then in Windows 3.10.
PATH
Displays or sets a search path for executable files.
PAUSE
Suspends processing of a batch program and displays the message 'Press any key to continue. . .', if not given other text to display.
PRINT
The PRINT command adds or removes files in the print queue. This command was introduced in MS-DOS version 2. Before that there was no built-in support for background printing files. The user would usually use the copy command to copy files to LPT1.
RD or RMDIR
Remove a directory (delete a directory); by default the directories must be empty of files for the command to succeed. The deltree command in some versions of MS-DOS and all versions of Windows 9x removes non-empty directories.
RECOVER
REM
Remark (comment) command, normally used within a batch file, and for DR-DOS, PC/MS-DOS 6 and above, in CONFIG.SYS. This command is processed by the command processor. Thus, its output can be redirected to create a zero-byte file. REM is useful in logged sessions or screen-captures. One might add comments by way of labels, usually starting with double-colon (::). These are not processed by the command processor.
REN
The REN command renames a file. Unlike the move command, this command cannot be used to rename subdirectories, or rename files across drives. Mass renames can be accomplished by the use of wildcards.
SCANDISK
Disk diagnostic utility. Scandisk was a replacement for the chkdsk utility, starting with later versions of MS-DOS. Its primary advantages over chkdsk is that it is more reliable and has the ability to run a surface scan which finds and marks bad clusters on the disk. It also provided mouse point-and-click TUI, allowing for interactive session to complement command-line batch run. chkdsk had surface scan and bad cluster detection functionality included, and was used again on Windows NT based operating systems.
SET
Sets environment variables. cmd.exe in Windows NT 2000, 4DOS, 4OS2, 4NT, and a number of third-party solutions allow direct entry of environment variables from the command prompt. From at least Windows 2000, the set command allows for the evaluation of strings into variables, thus providing inter alia a means of performing integer arithmetic.
SETVER
SetVer is a TSR program designed to return a different value to the version of DOS that is running. This allows programs that look for a specific version of DOS to run under a different DOS.
Setver appeared in version 4, and has been in every version of DOS, OS/2 and Windows NT since.
SHARE
Main article: share (command)
Installs support for file sharing and locking capabilities.
SMARTDRIVE
SORT
A filter to sort lines in the input data stream and send them to the output data stream. Similar to the Unix command sort. Handles files up to 64k. This sort is always case insensitive.
SUBST
A utility to map a subdirectory to a drive letter.[4] The opposite can be achieved via the JOIN command.
SYS
Main article: SYS (command)
A utility to make a volume bootable. Sys rewrites the Volume Boot Code (the first sector of the partition that SYS is acting on) so that the code, when executed, will look for IO.SYS. SYS also copies the core DOS system files, IO.SYS, MSDOS.SYS, and COMMAND.COM, to the volume. SYS does not rewrite the Master Boot Record, contrary to widely held belief.
TIME
Display the system time and waits for the user to enter a new time. Complements the DATE command.
TITLE
Enables a user to change the title of their MS-DOS window.
TREE
It is an external command, graphically displays the path of each directory and sub-directories on the specified drive.
TRUENAME
The TRUENAME command will expand the name of a file, directory, or drive, and display the result. It will expand an abbreviated form which the command processor can recognise into its full form. It can see through SUBST and JOIN to find the actual directory.
MS-DOS can find files and directories given their names, without full path information, if the search object is on a path specified by the environment variable PATH. For example, if PATH includes C:\PROGRAMS, and file MYPROG.EXE is on this directory, then if MYPROG is typed at the command prompt, the command processor will execute C:\PROGRAMS\MYPROG.EXE. In this case,
TRUENAME MYPROG
would display
C:\PROGRAMS\MYPROG.EXE
This command displays the UNC pathnames of mapped network or local CD drives. This command is an undocumented DOS command. The help switch "/?" defines it as a "Reserved command name". It is available in MS-DOS 5.00.0. This command is similar to the Unix which command, which, given an executable found in $PATH, would give a full path and name. The C library function realpath performs this function. The Microsoft Windows command processors do not support this command.
TYPE
Displays a file. The more command is frequently used in conjunction with this command, e.g. type long-text-file | more. TYPE can be used to concatenate files (type file1 file2 > file3); however this won't work for large files[dubious – discuss][citation needed]—use copy command instead.
UNDELETION
Restores file previously deleted with del. By default all recoverable files in the working directory are restored; options are used to change this behavior. if the MS-DOS mirror TSR program is used, then deletion tracking files are created and can be used by undelete.
VER
An internal DOS command, that reports the DOS version presently running, and since MS-DOS 5, whether DOS is loaded high. The corresponding command to report the Windows version is winver. Values returned:
             MS-DOS up to 6.22, typically derive the DOS version from the DOS kernel. This may be different from the string it prints when it starts.
             PC DOS typically derive the version from an internal string in command.com (so PC DOS 6.1 command.com reports the version as 6.10, although the kernel version is 6.00.)
             DR-DOS reports whatever value the environment variable OSVER reports.
             OS/2 command.com reports an internal string, with the OS/2 version. The underlying kernel here is 5.00, but modified to report x0.xx (where x.xx is the OS/2 version).
             Windows 9x command.com report a string from inside command.com. The build version (e.g. 2222), is also derived from there.
             Windows NT command.com reports either the 32-bit processor string (4nt, cmd), or under some loads, MS-DOS 5.00.500, (for all builds). The underlying kernel reports 5.00 or 5.50 depending on the interrupt. MS-DOS 5.00 commands run unmodified on NT.
             The Winver command usually displays a Windows dialog showing the version, with some information derived from the shell. In windows before Windows for workgroups 3.11, running winver from DOS reported an embedded string in winver.exe.
VERIFY
Enables or disables the feature to determine if files have been correctly written to disk. If no parameter is provided, the command will display the current setting.
XCOPY
Copy entire directory trees. Xcopy is a version of the copy command that can move files and directories from one location to another.

Thursday, 4 February 2016

Types of cyber attacks

Types of cyber attacks/hacking attacks

                     


A cyber attack, in simple terms, is an attack on your digital systems originating from malicious acts of an anonymous source. Cyber attack allows for an illegal access to your digital device, while gaining access or control of your digital device.

A different types of cyber attacks can be defined as an offensive tactic to gain an illegal control or access to your digital device, called the target system, initiated by a person or a computer against a website, computer system or a single digital device as well as a whole, which poses a serious threat to computer systems, information stored, financial structures and the entire network itself. Cyber attacks work towards compromising the integrity of the digital device and the information stored in it.

1. Backdoors – Backdoor is a type of cyber threat in which the attacker uses a back door to install a keylogging software, thereby allowing an illegal access to your system. This threat can turn out to be potentially serious as it allows for modification of the files, stealing information, installing unwanted software or even taking control of the entire computer.

2. Denial-of-Service Attack – A denial-of-service or a DOS attack generally means attacking the network to bring it down completely with useless traffic by affecting the host device which is connected to the internet. A DOS attack targets websites or services which are hosted on the servers of banks and credit card payment gateways.

3. Direct-access Attack – A direct-access attack simply means gaining physical access to the computer or its part and performing various functions or installing various types of devices to compromise security. The attacker can install software loaded with worms or download important data, using portable devices.

4. Eavesdropping – As the name suggests, eavesdropping means secretly listening to a conversation between the hosts on a network. There are various programs such as Carnivore and NarusInsight that can be used to eavesdrop.

5. Spoofing – Spoofing is a cyber attack where a person or a program impersonate another by creating false data in order to gain illegal access to a system. Such threats are commonly found in emails where the sender’s address is spoofed.

6. Tampering – Tampering is a web based attack where certain parameters in the URL are changed without the customer’s knowledge; and when the customer keys in that URL, it looks and appears exactly the same. Tampering is basically done by hackers and criminals to steal the identity and obtain illegal access to information.

7. Repudiation Attack – A repudiation attack occurs when the user denies the fact that he or she has performed a certain action or has initiated a transaction. A user can simply deny having knowledge of the transaction or communication and later claim that such transaction or communication never took place.

8. Information Disclosure– Information disclosure breach means that the information which is thought to be secured is released to unscrupulous elements who are not trustworthy.

9. Privilege Escalation Attack – A privilege escalation attack is a type of network intrusion which allows the user to have an elevated access to the network which was primarily not allowed. The attacker takes the advantage of the programming errors and permits an elevated access to the network.

10. Exploits – An exploit attack is basically a software designed to take advantage of a flaw in the system. The attacker plans to gain easy access to a computer system and gain control, allows privilege escalation or creates a DOS attack.

11. Social Engineering – An attack by a known or a malicious person is known as social engineering. They have knowledge about the programs used and the firewall security and thus it becomes easier to take advantage of trusted people and deceive them to gain passwords or other necessary information for a large social engineering attack.

12. Indirect attack – Indirect attack means an attack launched from a third party computer as it becomes more difficult to track the origin of the attack.
13. Computer crime – A crime undertaken with the use of a computer and a network is called as a computer crime.

14. Malware – Malware refers to malicious software that are being designed to damage or perform unwanted actions into the system. Malware is of many types like viruses, worms, Trojan horses, etc., which can cause havoc on a computer’s hard drive. They can either delete some files or a directory or simply gather data without the actual knowledge of the user.

15. Adware – Adware is a software that supports advertisements which renders ads to its author. It has advertisements embedded in the application. So when the program is running, it shows the advertisement. Basically, adware is similar to malware as it uses ads to inflict computers with deadly viruses.

16. Bots – Bots is a software application that runs automated tasks which are simple and repetitive in nature. Bots may or may not be malicious, but they are usually found to initiate a DoS attack or a click fraud while using the internet.

17. Ransomware – Ransomware is a type of cyber security threat which will restrict access to your computer system at first and will ask for a ransom in order for the restriction to be removed. This ransom is to be paid through online payment methods only which the user can be granted an access to their system.

18. Rootkits – A rootkit is a malicious software designed in such a way that hides certain process or programs from normal anti virus scan detection and continues to enjoy a privilege access to your system. It is that software which runs and gets activated each time you boot your system and are difficult to detect and can install various files and processes in the system.

19. Spyware – Spyware, as the name suggests, is a software which typically spies and gathers information from the system through a user’s internet connection without the user’s knowledge. A spyware software is majorly a hidden component of a freeware program which can be downloaded from the internet.

20. Scareware – Scareware is a type of threat which acts as a genuine system message and guides you to download and purchase useless and potentially dangerous software. Such scareware pop-ups seem to be similar to any system messages, but actually aren’t. The main purpose of the scareware is to create anxiety among the users and use that anxiety to coax them to download irrelevant softwares.

21. Trojan Horses – Trojan Horses are a form of threat that are malicious or harmful codes hidden behind genuine programs or data which can allow complete access to the system and can cause damage to the system or data corruption or loss/theft of data. It acts as a backdoor and hence it is not easily detectable.

22. Virus – A computer virus is a self replicating program which, when executed, replicates or even modifies by inserting copies of itself into another computer file and infects the affected areas once the virus succeeds in replicating. This virus can be harmful as it spreads like wildfire and can infect majority of the system in no time.

23. Worm – Just like a virus, worm is a self replicating program which relies on computer network and performs malicious actions and spreads itself onto other computer networks. Worms primarily rely on security failures to access the infected system.

24. Phishing – Phishing is a cyber threat which makes an attempt to gain sensitive information like passwords, usernames and other details for malicious reasons. It is basically an email fraud where the perpetrator sends a legitimate looking email and attempts to gain personal information.

25. Identity Theft – Identity theft is a crime wherein your personal details are stolen and these details are used to commit a fraud. An identity theft is committed when a criminal impersonates individuals and use the information for some financial gain.

26. Intellectual Property Theft – Intellectual Property theft is a theft of copyrighted material where it violates the copyrights and the patents. It is a cybercrime to get hands onto some trade secrets and patented documents and research. It is basically a theft of an idea, plan and the methodology being used.

27. Password Attacks – Password attack is a form of a threat to your system security where attackers usually try ways to gain access to your system password. They either simply guess the password or use an automated program to find the correct password and gain an entry into the system.

28. Bluesnarfing – Bluesnarfing is a threat of information through unauthorized means. The hackers can gain access to the information and data on a Bluetooth enabled phone using the wireless technology of the Bluetooth without alerting the user of the phone.

29. Bluejacking – Bluejacking is simply sending of texts, images or sounds, to another Bluetooth enabled device and is a harmless way of marketing. However, there is a thin line between bluejacking and bluesnarfing and if crossed it results into an act of threat.

30. DDoS – DDoS basically means a Distributed Denial of Service. It is an attempt to make any online service temporarily unavailable by generating overwhelming traffic from multiple sources or suspend services of a host connected to the internet.

31. Keylogger – A keylogger is a spyware that has the capability to spy on the happenings on the computer system. It has the capability to record every stroke on the keyboard, web sites visited and every information available on the system. This recorded log is then sent to a specified receiver.

Wednesday, 3 February 2016

Who is a hacker?

 A hacker is someone who likes to tinker with electronics or computer systems. Hackers like to explore and learn how computer systems work, finding ways to make them do what they do better, or do things they weren’t intended to do. There are two types of hackers:

 White Hat – These are considered the good guys. White hat hackers don’t use their skills for illegal purposes. They usually become Computer Security experts and help protect people from the Black Hats.

 Black Hat – These are considered the bad guys. Black hat hackers usually use their skills maliciously for personal gain. They are the people that hack banks, steal credit cards, and deface websites.

                                                


 Hacker positions (Hierarchy)

Script kiddies – These are the wannabe hackers. They are looked down upon in the hacker community because they are the people that make hackers look bad. Script kiddies usually have no hacking skills and use the tools developed by other hackers without any knowledge of what’s happening behind the scenes.

Intermediate hackers – These people usually know about computers, networks, and have enough programming knowledge to understand relatively what a script might do, but like the script kiddies they use pre-developed well-known exploits (- a piece of code that takes advantage of a bug or vulnerability in a piece of software that allows you to take control of a computer system) to carry out attacks.

Elite Hackers – These are the skilled hackers. They are the ones that write the many hacker tools and exploits out there. They can break into systems and hide their tracks or make it look like someone else did it. You should strive to eventually reach this level.

What does it take to become a hacker?

Becoming a great hacker isn’t easy and it doesn’t happen quickly. Being creative helps a lot. There is more than one way a problem can be solved, and as a hacker you encounter many problems. The more creative you are the bigger chance you have of hacking a system without being detected. Another huge quality you must have is the will to learn because without it, you will get nowhere. Remember, Knowledge is power. Patience is also a must because many topics can be difficult to grasp and only over time will you master them.

for any questions leave a comment....

source: The hackers underground handbook