Ethical Hacking Institute™

You are all welcome to the latest blog that is dedicating it's life time in making sure your online accounts are save and secured from the hands of these wicked crackers of our time.You are always welcome to Ethical Hacking Institute Please note that we are not responsible for any form of misuse of information gotten in here.All you will acquire is for educational purpose only

Thursday 28 July 2011

Network Hacking

This PART introduces TCP/IP to a person with any level of computer skills or computer
background knowledge. My hope in writing this PART is to explain in a simple way some concepts that may be considered difficult. My ambition is to write a note that makes no assumptions and that leads a TCP/IP beginner to an intermediate understanding of TCP/IP.
This note isn't boringly technical; each topic is covered to sufficient depth but not to an EXTREME.
part :1
chapter : origin of Tcp/ip
so let us start:=====>
Q : WHAT IS TCP/IP ? WHY WE NEED IT?
ANS :TCP/IP Transmission Control Protocol/Internet Protocol (TCP/IP) is a set of protocols that enable communication between computers. There was a time when it was not important for computers to communicate with each other. There was no need
for a common protocol. But as computers became networked, the need arose for computers to agree on certain protocols.SO WE NEED IT TO COMMUNICATE TWO COMPUTER SIMPLY .
ORIGIN :
Understanding the roots of the Internet will give you insight into the development of TCP/IP
and many of its rules and standards. If you know why TCP/IP was created and how it evolved,
the TCP/IP protocol suite is easier to understand.
The predecessor of today's Internet was ARPAnet ,but we will not cover to arpanet .because to day is latest tcp/ip.so will cover it but some understanding of it also require
ARPAnet, a supernetwork that was created by the
Advanced Research Projects Agency (ARPA)
The protocol, or language of choice, used on the ARPAnet was called Network Control
Protocol (NCP)-TCP/IP had not yet been developed. As the ARPAnet grew, however, a new
protocol was needed because NCP simply didn't fulfill all the needs of a larger network. The
NCP protocol was similar to a human language that has only a few words. The language
might enable a few people to communicate, but as you include more people who want to talk
about many more subjects, you have to improve the language.so due to limitation a tcp/ip came in origin
The Birth of TCP/IP As stated earlier, the "language" spoken by hosts on the ARPAnet in 1969 was called NCP.
However, NCP had too many limitations and was not robust enough for the supernetwork,
which was beginning to grow out of control. The limitations of NCP and the growth of the
ARPAnet lead to research and development of a new network language.
SO TCP/IP CAME INTO EVOLUTION .
As you will learn in later chapters, TCP is responsible for making sure that the data gets
through to the other host. It keeps track of what is sent and retransmits anything that did not
get through. If any message is too large for one package, TCP splits the message into several
packages and makes sure that they all arrive correctly. After they have arrived, TCP at the
other end puts all the packages back together in the proper order.
==== So Ma fRend this is birth of tcp/ip=======
Actually tcp/ip is set of different protocol for e.g = we can say that there is a person whose name is pappu and he has 14 child . so when outsider person call to thier child ,they will simply use word that [o pappu ke bachey ] pappu'child .such like that there is so many protocol and tcp ,ip is also a partbut when we called this we simply say tcp/ip stack .hope u understand it.


Monday 25 July 2011

How To Hack Using Google





Google is able to index almost everything now is more than satisfied, even this feature plays her very often to the benefit of those who have some pretty questionable purposes related all'hacking and infringement of Internet servers and websites. And 'Just a poorly configured web server to enable the' access to Google's crawlers, and directories containing sensitive information resources, configuration files and utilities password. And of course when Googlebot access to a resource accessible via HTTP provides "right" to index it and then making it available for research.     In this article we will see a list of interesting hacking techniques based on using Google to obtain credentials for access and use information to make intrusions and attacks. Try to just enter in the Google search box the search strings below in italics.
#1 Utilities and passwords stored on FTP and WS FlashFXP WS FlashFXP and FTP are two popular FTP client, respectively, using a file called ws_ftp.ini and flashFXP.ini to save the information for access to FTP sites configured. Search string for WAS FTP: intitle: index.of ws_ftp.ini or filetype: ini pwd WS_FTP or "index of /" "ws_ftp.ini" "parent directory" Search string for FlashFXP: filetype: ini inurl: flashFXP.ini.
#2 Utilities and passwords of sites created with Frontpage Frontpage client is still widely used to create static web sites: the authentication system for automatic connection is based on the service.pwd file that contains the users and encrypted passwords that can be decoded with little effort by using John The Ripper. Ricenca string: "#-FrontPage-" inurl: service.pwd
#3 Log files with users and passwords It seems incredible but that happens very often the users and passwords for access to restricted areas or sites are stored in a file passwords.log. Try it yourself ...Search string: filetype: log inurl: "password.log"
#4 Download complete database mdb Forums Web Wiz Forums If a forum Web Wiz Forums is not properly configured, you can download the entire database in an instant!String of ricenca: filetype: mdb wwforum
#5 VNC server interface exposed via Java Applet VNC is a remote control software that can also be exposed via web through a Java applet that is normally listens on port 5800.String of ricenca: intitle: vnc.desktop inurl: 5800 or "VNC Desktop" inurl: 5800
#6 Configuration file for proftpd The configuration file for proftpd server contains a lot of information about installing, utilities and logs.Search string: filetype: conf inurl: proftpd.conf-sample
#7 Create a user on the mail server pro Argosoft If a mail server Argosoft is not properly configured, you can create your own mail user entering a URL ad hoc.Search string: "adding new user" inurl: addnewuser - "there are no domains"
#8 Administration interface for Web Data Administrator Microsoft SQL Server Web Data Administrator is a web utility written in ASP.NET and used to manage via a web database SQL Server.Search string: intitle: "Web Data Administrator - Login"
#9 Files backup of passwords and configurations Many managers are (rightly) used to make a backup copy before you edit a configuration file, and often change the extension. "Bak".Search string: filetype: bak inurl: "htaccess | passwd | shadow | htusers"
#10 Archives of e-mail in Microsoft Outlook Outlook stores the email on file with the extension. Pst: uploading a file of this type on Outlook you can access all the email that contains immediately.Search string: outlook filetype: pst

Tuesday 19 July 2011

How to detect a hacker attack



Most computer vulnerabilities can be exploited in a variety of ways. Hacker attacks may use a single specific exploit, several exploits at the same time, a misconfiguration in one of the system components or even a backdoor from an earlier attack.Due to this, detecting hacker attacks is not an easy task, especially for an inexperienced user. This article gives a few basic guidelines to help you figure out either if your machine is under attack or if the security of your system has been compromised. Keep in mind just like with viruses, there is no 100% guarantee you will detect a hacker attack this way. However, there's a good chance that if your system has been hacked, it will display one or more of the following behaviours.

For windows:
1. Suspiciously high outgoing network traffic. If you are on a dial-up account or using ADSL and notice an unusually high volume of outgoing network (traffic especially when you computer is idle or not necessarily uploading data), then it is possible that your computer has been compromised. Your computer may be being used either to send spam or by a network worm which is replicating and sending copies of itself. For cable connections, this is less relevant - it is quite common to have the same amount of outgoing traffic as incoming traffic even if you are doing nothing more than browsing sites or downloading data from the Internet.
2. Your resident antivirus suddenly starts reporting that backdoors or trojans have been detected, even if you have not done anything out of the ordinary. Although hacker attacks can be complex and innovative, many rely on known trojans or backdoors to gain full access to a compromised system. If the resident component of your antivirus is detecting and reporting such malware, this may be an indication that your system can be accessed from outside.
Unix machines:
1. Suspiciously named files in the /tmp folder. Many exploits in the Unix world rely on creating temporary files in the /tmp standard folder which are not always deleted after the system hack. The same is true for some worms known to infect Unix systems; they recompile themselves in the /tmp folder and use it as 'home'.
2. Modified /etc/passwd, /etc/shadow, or other system files in the /etc folder. Sometimes hacker attacks may add a new user in /etc/passwd which can be remotely logged in a later date. Look for any suspicious usernames in the password file and monitor all additions, especially on a multi-user system.
Regards! 

Friday 15 July 2011

Wlan Hacking Security




It sounds bad each time I hear people say that their WLAN have been hacked or difficult for them to secure their WLAN from crackers.
A friend of mine by name Mankind once told me that the best way to secure your WLAN password is to make use of a german password.But today,I am confidently telling you guys that your german password can still be cracked.
        HOW POSSIBLE???
Every (L)WAN have a password and as we all know that if your password is cracked,you are no longer sure of your privacy nor the life time of your (L)WAN.These crackers make use of some techniques and softwares that enables them gain access to your login details and once your login details have been gotten,it's already known that you have been hacked.
        SOLUTION
Let's take for instance that you are making use of a german password and the cracker is making use of a german cracker,what will be your fate of security?
If am to rate,I will say that you are as good as someone that is already hacked with out stress.
Now let's take a good reasoning!
I have not heard that any traditional dictionary exists.
So I think with my own findings,your password is save.All you need to do is just make use of a traditional word and combine it with an upper case word and also with numbers,I can assure you that your account is very secured.
Give it a try and lets see how the cracker cracks your password.
If you later find out that your password is still cracked,know that it must have been cracked using scam page hacking or a keylogger.
Hope your privacy is a bit secured now?
Place your comment and questions for fast answers.

Monday 11 July 2011

Hacking and cracking news

Every year the Web security community produces a stunning amount of new hacking techniques published in various white papers, blog posts, magazine articles, mailing list emails, etc. Within the thousands of pages are the latest ways to attack websites, Web browsers, Web proxies, and so on. Beyond individual vulnerability instances with CVE numbers or system compromises, we're talking about actual new and creative methods of Web-based attack. Now it its fifth year the Top Ten Web Hacking Techniques list encourages information sharing, provides a centralized knowledge-base, and recognizes researchers who contribute excellent work.
Since inception of the Top Ten Web Hacking Techniques list, the diversity, volume, and innovation of security research has always been impressive. 2010 produced 69 new attack techniques! This years point-position voting system worked well and the results showed exceptionally strong competition throughout all the entries. In fact, only two entries did not gain any points.
Please do not go to sleep after all these warnings all in the name of having a well formed firewall security.
Always on the run to help out in making sure your passwords and privacy is always save.
Regards!

Keylogger hacking security

What is a keylogger?
A keylogger is a kind of software that steals information from a computer and sends it to the database of the sender.It steals every stroke you make on your keyboard and also does screen snapping in time intervals.
What is a database?
A database is a space on the web that information is stored.For instance,a website.A website makes use of a database in other to exist on the internet.For a website the url{www.**************.com} you type is the name of the D.N.S in other for you to be able to view the destination you typed.I am sorry,I will not be discussing about web hosting for now but will focus on security.
This keylogger steals your information and stores it at the database of the sender.Any time he or she checks his database,he finds all your information that your computer have been doing.
        Security
This is mostly for those of you that checks your email account on cafes.If keylogger is installed on the system,you have been hacked.
Although,some people binds keylogger with software,application and any other thing they know you will like to download.I will advise you mind what ever download and install.
To manually detect if keylogger is installed on a system,press and hold this short code: shift+Ctrl+Alt and then tap H twice.
For some stubborn system hold: Shift+Ctrl+Alt+Del and then tap H twice.
If you are making use of a personal computer,get a version of system care.But the best is to format the computer if it is infected.

Saturday 9 July 2011

The difference between a hacker and a cracker

Today I found out that most people do not know the difference between hacking and cracking so I decided to make a clear understanding.
What is hacking?
Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator's original purpose. The person who is consistently engaging in hacking activities, and has accepted hacking as a lifestyle and philosophy of their choice, is called a hacker.
Computer hacking is the most popular form of hacking nowadays, especially in the field of computer security, but hacking exists in many other forms, such as phone hacking, brain hacking, etc. and it's not limited to either of them.
Due to the mass attention given to blackhat hackers from the media, the whole hacking term is often mistaken for any security related cyber crime. This damages the reputation of all hackers, and is very cruel and unfair to the law abiding ones of them, from who the term itself originated. The goal of this website is to introduce people the true philosophy and ethics of hackers, hopefully clearing their name and giving them the social status they deserve.
What is cracking?
Cracking means to break into a computer system. The term was coined in the mid-80s by hackers who wanted to differentiate themselves from individuals whose sole purpose is to sneak through security systems. Whereas crackers sole aim is to break into secure systems, hackers are more interested in gaining knowledge about computer systems and possibly using this knowledge for playful pranks. Although hackers still argue that there's a big difference between what they do and what crackers do, the mass media has failed to understand the distinction, so the two terms -- hack and crack -- are often used interchangeably.
Hope this will give you a clearer understanding of hacking and cracking.

Sunday 3 July 2011

Javasript hacking security

I talked about scam page hacking security and now we are on the most deadly type of hacking,javascript hacking.
Javascript  is one of the most deadly type of hacking and the hardest to secure against because,it can be used to hack even a hacker.So I wonder how easy it will look like for a non hacker to secure.
Never the less,am sure with this little you should be able to secure yourself from every form of javascript hacking.
HOW IT IS PERFORMED
Javascript hacking can only be secured against if only you are careful enough to be in readiness and always cautious of your url box.
Javascript can is sent to steal your cookies and for sure,once your cookies is stolen,you have been hacked and you might not even know that you have been hacked.It even steals your browser's detail.
SOLUTION
* You must always be on a cautious mind each time you click on any unread message.
* Your eyes must always be on the {URL} tab while loading.if you see anything like "checkscript" or anything related to script know that you have been script hacked.
* Change your password periodically.
* Only check your email account with a computer each time.
* Sometimes you will see on the subject of your mail in this format: javacript: getform/script*******************,just ignore it or delete it less you will be hacked once you click on it

Scam page hacking security

Today I found out that it is necessary for you guys to know that yahoo,gmail and every other mail agents will not ask you guys to re-login to your account when an upgrade or anything want's to be done to your account.
As for some of you that makes use of online account,you must take this very serious.
HOW POSSIBLE?
These days cracking is very common especially with teenagers.I know you must have heard of something called scam page one way or the other.
Scam page is a fake page configured by a cracker to steal information from you in other to get access to your privacy.This scam page is sent to the victim after configuration and in you by any means make use of it, your information will be sent to the sender of the scam page and he will have full access to your privacy and can do anything with it.
SOLUTION
Some people sends this scam page with their email account and with my post on how to trace the source of an email,you would be able to detect where it is from,if from a right source or a cracker.
Just trace the source of the message and you will verify if it's from the right source or not

How to trace the source of an e-mail

Tracing the source of an email sent to you is one of my favorite due to the fact that it gives me more confidence of where and who sent the mail and avoid being hacked unknowingly.
This tutor will be covering outlook,Gmail,Yahoomail,Hotmail,AOL and Windows live.
I found it necessary to make an article of this because,these days cracking is so common among teenagers making it deadly for you and me to keep our heads layed down asleep.
Most crackers makes use of something called scam page which I will be making a post of in my next post.with this,you should be able to know if it is a scam or real.
For sure we all know that all email comes with headers,these headers contains various information that could be used to identify where it comes from in which containing the original internet protocol(I.P) address and the routing of the message.
Although not all electronic message you receive will allow you to trace them back to their originating point.
HOW TO
For:
Outlook - Right click on the message while in inbox and chose MESSAGE OPTION ,a new window will appear containing the headers at the bottom of it.
Gmail - Open the correspondent,at the upper right corner of the page,you will see the word REPLY with a little down arrow,chose chow original,the headers will be shown.
Yahoomail - Right click on the note and chose VIEW FULL HEADER,and you will be left with the headers of the mail.
AOL - Click on ACTION and then VIEW MESSAGE SOURCE
Windows - Right click on the correspondent while in inbox and then chose PROPERTIES,then click the DETAIL tab and you will be left with headers.
Note: You have to look carefully less you mistake something else for another.
You have successfully traced the source of you mail!

How to activate windows after expiration

To activate your expired windows,just follow my little explanation below!
Click on START >> RUN >> and then type 'regedit'.
Now click on HKEY_LOCAL_MACHINE >> SOFTWARE >> MICROSOFT >> WINDOWS INT
Now you will see WPAEvent,all you need to do is just to locate OOBETimer,double click on it for it to open.
You will see a code,delete it and let's proceed...
In the position in which you deleted the old code,type and insert the following code:
FF D5 71 D6 8D 6F D5 33 93 FD
Note:You must not copy paste the code above because,if you do,it may not work so type it as shown above.
Next is to click on OK.
Right click on WPAEvents and then permissions and then select system and then DENY of FULL CONTROL and finally,click on OK.
Now click on OK dialog box until you are finished with it.
Next step is to close everything cos you are done.
CHECK IF IT WORKED
Now click on START >> ALL PROGRAMS >> ACTIVATE WINDOWS.
You will find out that the message that comes up will no longer be that windows is expired but windows already updated.
Regards!

Search for Hacking security

Custom Search