Wednesday 10 August 2016

ROOTKIT






Hey Friends,
Today I am going to introduce term ROOTKIT.

Rootkit is a tool or malicious tool that helps to get back door.
Rootkit is divided into two words ROOT + KIT.... ROOT means root/admin access and KIT means set of tools.
The Rootkit is installed in your computer system through various methods like virus inserted into your system,from download or copy from internet, through email,installing unsafe program etc.
Once a Rootkit is installed , this will create a back door for hackers/attackers which will help in remote access and authorize access.


Some Facts About ROOTKIT

1- It is a Malicious Software
2- It's hard to detect Rootkit, because it activated at the time of booting process.
3- Rootkit is developed for Unix OS.
4- It is limitless, because it also works inside windows directories/functions.
5- Rootkit is mainly used for making money through cyber crimes.
6- It is the most powerful technique among all.



If you want to know more about rootkit...Please visit

1- www.techrepublic.com   click here..
2- www.bleepingcomputer.com  click here..



By - Somesh Sah



Tuesday 9 August 2016

⁠⁠⁠Trojan, Virus and Worm..




Hey Friends,
Today, I am going to explain you "Terms Like ⁠⁠⁠Trojans, Viruses and Worms...
There are very useful things for the hackers to get the information about the victim.
They often use these skills to gain access to the victim's systems. The aim of targeting an organization or a victim to steal sensitive data or information and physically damage computer controlled equipment and many more. Trojans, viruses and worms can be used to help to complete above tasks.





Trojan


-The full name of Trojan is a "Trojan Horse".
-A Trojan horse is a kind of a program that allows the attacker/hacker to control the user’s computer from a remote location.
-The program "Trojan" comes with your additional applications that is useful for users.
-When the user install the application, then hacker is able to install malicious softwares, create backdoors, install other unwanted applications that can be used to damage your system.

Activities performed by hacker by using Trojan horse.

-Hacker is able to use the user’s computer as part of the Botnet.
-Damage the user’s computer (crashing, blue screen of death etc.)
-Stealing sensitive data(password,card number etc).
-Modifying files on the user’s computer
-Installs various software like keylogger.
-Viewing the user’s personal data (pictures,screenshot etc)
- Able to Downloading and access all the useful information.



  Worm

A worm is a malicious computer program that replicates itself usually over a computer network. An attacker/hacker use a worm to complete the following tasks...
-Install backdoors on the victim’s computers.
(The created backdoor may be used to create zombie computers that are used to send spam emails, perform distributed denial of service attacks etc. the backdoors can also be exploited by other malware.Worms may also slowdown the network by consuming the bandwidth as they replicate.)
-Install harmful payload code carried within the worm.




Virus


-A virus is a computer program that attaches itself to legitimate programs and files without the user’s consent.
-Viruses can consume computer resources such as memory and CPU time.
-The attacked programs and files are said to be “infected”. A computer virus may be used to....
1-Access private data such as user id and passwords
2-Display annoying messages to the user
3-Corrupt data in your computer
4-Log the user’s keystrokes

These techniques involve deceiving the users to open the files which appear to be normal files such as word or excel documents. Once the file is opened, the virus code is executed and does what it’s intended to do.



Summary


Definition

Trojan - Malicious program used to control a victim’s computer from a remote location.
Worm - Self replicating program that attaches itself to other programs and files
Virus - Illegitimate programs that replicate themselves usually over the network

Purpose

Steal sensitive data, spy on the victim’s computer etc.
Disrupt normal computer usage, corrupt user data etc.
Install backdoors on victim’s computer, slow down the user’s network etc.

Precautions

-Use of anti-virus software (updated),
-Update patches for operating systems,
-Security policy on usage of the internet and external storage media etc.
⁠⁠⁠⁠-Take regular backup



By - Somesh Sah



ALSO READ -


VIRUS using BATCH Files









Sunday 7 August 2016

FOOTPRINTING



Hey Friend,
Today i am here to tell you about Footprinting.

Footprinting 



" Footprinting is defined as the collection of all the information of the victim gathered."  

0r

"A fine art of gathering target information of the victim."



Types of Footprinting 


1-Active Footprinting
2-Passive Footprinting



Active Footprinting -

In this Footprinting , Hackers/Attacker does not make any direct connection but they can use same source by download as it is, to reduce risk and able to find out almost all the loopholes .
Example is google database hacking.


Passive Footprinting -

In Passive Footprinting, Hacker/Attacker does not make any direct connection/relation with the victim system.
All the information gathered by using internet (via google search ,web sites,social networking etc)


By Somesh Sah

Saturday 6 August 2016

Linux and its Distributions

Hey Friends,
Today i am telling you about LINUX and IT'S DISTRIBUTIONS.


Linux is an open source operating system (For detailed description of Linux click here). So basically Distribution is nothing but the version or types of linux.
In Windows XP 2000,Vista, 8, 8.1 .10  etc are the windows various versions...like that Linux also has different versions or types known as  Distribution or Distro.

There are more than thousand linux operating system, as we all know that Linux is an open source operating system therefore anyone with little knowledge of linux can modify its original source code and make its own linux distribution is also called customized operating system (make modifications according to your need. )

So some famous Linux Distribution are...



1.Arch linux



-It is for developers (Not for beginners)
-Do it yourself Approach based OS
-Fun for Developers
-Light weight  and flexible OS

official website- https://www.archlinux.org/






2.Cent OS


-Mostly used by enterprise and web services
-Free OS
-It is based on Rad Hat enterprise Distro

official website- https://www.centos.org/





3.Gentoo Linux


-It is not for beginners but fun for experience users
-It is Source based Distribution means you have to configure source code of a program before use.
-full to flexible used in any hardware configuration system.

official website- https://www.gentoo.org/




4.Linux Mint


-4th most popular operating system
-launch in 2006
-generally used for desktops and GUI Based

official website- https://www.linuxmint.com/



5.Ubuntu 


-Is the 3rd most popular operating system(after Windows and Mac)
-Used in home Desktop and Laptops
-based on Debian distribution
-Fully GUI Based
-It is also used for mobile,tablets ,cloud etc.

official website- http://www.ubuntu.com/



 

6.Backtrack and Kali Linux


-These are used for Pentesting and Vulnerabilities
-Used by  Hackers for hacking purpose,
- Debian Linux distributing.
- Backtrack is the old distribution of Kali Linux.
-To know more Click here

official website(backtrack)- http://www.backtrack-linux.org/
official website(kali)- https://www.kali.org/




7.Gnome and Zorin


- These have a very attractive GUI and Whereas Zorin Somehow resembles like Windows.
- GNOME Shell is the graphical shell of the GNOME desktop ...
-Zorin OS is a multi-functional operating system designed specifically for Windows users who want to have easy and smooth access to Linux. It is based on Ubuntu, and uses a customized version of Gnome and the Avant Window Navigator which they call the 'Zorin Desktop'.
-GNOME 3 is an easy and elegant way to use your computer. It is designed to put you in control and bring freedom to everybody.
official website(Gnome)- https://www.gnome.org/
official website(Zorin)- http://zorinos.com/





By - Somesh Sah



Also Read this --



Monday 1 August 2016

DEEP-WEB


WHAT IS “DEEP WEB”?



Deep web is also termed as ‘Invisible Web’ because it is that part of internet that can’t be accessed as through usual browser like Google Chrome, Firefox etc. and couldn’t be indexed by search engines. Websites of deep web particularly use dynamic databases and non-indexed file formats, also they do not have any direct link, that’s why search engine can’t web crawl to them.


How You Can Access Deep Web?



To access deep web, user should download Tor browser and install on there systems. In the address bar of the browser, user should type particular deep web websites. Every deep web sites have .onion domains. Some general deep web sites you can use to explore deep web.



Advantages of Deep Web.



-Anonymity ( User can be anonymous on deep web ).
-User Privacy( no one can distinguish your identity)
-Security of Information.
-Safe from government surveillance like NSA Prism, GHCQ.
-In deep web, user can find various sites which do illegal activities which can be inhumane.


Various Deep Web Search Engines:-

-DeepPeep
-Intute
-Ahmia
-Scirus




 By - VIJAY BHUSAN 



Trace your Andriod Device using IMEI Number

Hey ,
Welcome Friendz...
Today i am here with the amazing and useful topic..That is really helpful to all of you.

In my last post , We see IMEI Number is very useful to us...
So, In this post , I will show you how to trace your Smart mobile phones (Android device) by yourself...


There are many ways to trace your mobile devices using IMEI Number...

1- Trace by Tele-operator
2- Trace by pre-installed applications
3- Trace by using Google Dashboard 



Trace By Tele-Operator

By using this method you need police permission (need to register FIR) ... without permission tele operator cannot find your lost or stolen mobile phone.
But It find out exact location of your device.
Mobile phone should be switched on under network area.  


Trace By Pre-Installed App's

Some applications (Apps) provide these facilities , like anti-virus application such as AVG Anti-Virus, CMS, Clean Master etc..
It can be installed before lost or stolen your mobile phone.
And my be thief can uninstall or deactivate your app from your mobile phone....
Therefore this is not a feasible way to find out our phone.


Trace By GOOGLE DASHBOARD

This is the best way we have...
suppose you don't have IMEI Number of your phone...Then WHAT TO Do???
Don't worry ...

I will explain step by step with screenshots...  


1- Open web browser
2- Go to GOOGLE DASHBOARD
3- Login your self
4- Now list of google thinks will open...in which you are registered with lot of details..
5- Search for android and click on it..
6- Now ,under Android section..you can see list of android devices which are login with your id
7- Then Click on Manage Device.
8- Now, new google Active Manager device window open..
9- Now, you can lock your phone, Ring your phone and erase important data from your phone and you can also find the location of your device in the map.

NOTE- Your device should be connected with internet ( Via 3G or WIFI )


SCREEN SHOT 







    


For Video ....
See this...By Guiding Tech 

It will show how to trace your lost or stolen Android and iPhone Devices. 







WINDOWS SUBSYSTEM FOR LINUX

Microsoft partnered with Canonical (creator of Ubuntu) to bring Linux environment experience in Windows 10. Through Windows Subsystem F...