Google Analytics

20 Things You Didn't Know - Computer Hacking

1 Hacker originally meant “one who makes furniture with an ax.” Perhaps because of the blunt nature of that approach, the word came to mean someone who takes pleasure in an unconventional solution to a technical obstacle.

2 Computer hacking was born in the late 1950s, when members of MIT’s Tech Model Railroad Club, obsessed with electric switching, began preparing punch cards to control an IBM 704 mainframe.

3 One of the club’s early programs: code that illuminated lights on the mainframe’s console, making it look like a ball was zipping from left to right, then right to left with the flip of a switch. VoilĂ : computer Ping-Pong!

4 By the early 1970s, hacker “Cap’n Crunch” (a.k.a. John Draper) had used a toy whistle to match the 2,600-hertz tone used by AT&T’s long-distance switching system. This gave him access to call routing (and brief access to jail).

5 Before they struck it rich, Apple founders Steve Wozniak and Steve Jobs made and sold “blue boxes,” electronic versions of Draper’s whistle.

6 Using a blue box, Wozniak crank-called the Pope’s residence in Vatican City and pretended to be Henry Kissinger.

7 Hacking went Hollywood in the 1983 movie WarGames, about a whiz kid who breaks into a Defense Department computer and, at one point, hi­jacks a pay phone by hot-wiring it with a soda can pull-ring.

8 That same year, six Milwaukee teens hacked into Los Alamos National Lab, which develops nuclear weapons.

9 In 1988 Robert T. Morris created a worm, or self-replicating program, purportedly to evaluate Internet security.

10 The worm reproduced too well, however. The multi­million-dollar havoc that ensued led to Morris’s felony conviction, one of the first under the Computer Fraud and Abuse Act (PDF).

11 They all come home eventually. Morris now researches computer science at...MIT.

12 British hacker Gary McKinnon broke into 97 U.S. Navy, Army, Pentagon, and NASA computers in 2001 and 2002.

13 McKinnon’s defense: He wasn’t hunting military secrets; he was only seeking suppressed government files about space aliens.

14 According to rumor, agents of China’s People’s Liberation Army attempted to hack the U.S. power grid, triggering the great North American blackout of 2003.

15 It took IBM researcher Scott Lunsford just one day to penetrate the network of a nuclear power station: “I thought, ‘Gosh, this is a big problem.’”

16 Unclear on the concept: When West Point holds its annual cyberwar games, the troops wear full fatigues while fighting an enemy online.

17 Think your Mac is hackproof? At this year’s CanSecWest conference, security researcher Charlie Miller used a flaw in Safari to break into a MacBook in under 10 seconds.

18 Cyborgs beware: Tadayoshi Kohno at the University of Washington recently hacked into a wireless defibrillator, causing it to deliver fatal-strength jolts of electricity.

19 This does not bode well for patients receiving wireless deep-brain stimulators.

20 The greatest kludge of all? Roger Angel of the University of Arizona has proposed building a giant sunscreen in space to hack the planet’s climate.

Hacking facebook,twitter with Ettercap and SET in Kali Linux





Every day we see only one question in the web that goes like this "how do we hack Facebook?". The method i am going to share can be used to hack Facebook and other social media accounts on your local network. The same method can be used online with a bit of intuition.




The basic requirements for this hack will be
1. Kali Linux updated and running
2. Ettercap (comes with kali linux)
3. Social engineering toolkit (comes with Kali Linux)
4. Common Sense



So lets begin


1. The first step is to boot from kali linux and we are going to host a fake facebook site on our Kali linux machine using social engineering toolkit. So click SET from menu.






2. SET will load and a welcome screen will be shown. Select social enginnering attacks from the menu.






3. Now select website attack methods.






4. Select credentials harvester method.







5. Select site cloner. you will be asked to give an ip address. its the same ip address of the machine you are using Kali linux from not the attack victim. Give the address of website address you want to clone. the SET will do its job and will ask you to start Apache server. Select "Y" and Apache server will start.


















6. Now Social engineering tool kit has been set and we are ready to perform man in the middle attack to do DNS poisoning. First goto etc/ettercap/ettercap.dns file.






7. Edit the file as shown in the screenshot. Here the IP address will be the same we are hosting our fake website from.







8. Open a command prompt and open the graphical version of ettercap by typing "ettercap -G". Start unified sniffing. Select your interface. Scan for hosts and add the router Ip to one target and other Ip as second target. Start MITM with remote connections sniffing as well and start sniffing.






























9. Select manage the plugins. Double click "DNS Spoof" a * will appear with it and our plugin will be loaded.










10. Whenever the victim will open facebook, he will be redirected to our own website without any prompt or indication.










11. To view the logs, go to var/www and the text files there will provide you the required usernames and passwords.








Leave a comments or suggestion. Thanks!




The Hackers Manuals 2015 & 2016


Hi guys, just so you know that there's a Hackers Manuals. I believe you guys have heard of it.
So now I will give you the link on the two manuals for the last two years.


It includes how to set up your Linux, comparison of Linux vs Windows OS, difference of the two OS, about Network hacking, internet censorship, privacy, and it's all 100% Legal and Safe!









80+ Hacks to make you a power user! From security tricks to sysadmin secrets and hardware hacks - learn how to do it all!



Download Hackers Manual 2015



Download Hackers Manual 2016

Best Online Website Scanner

Virus Total


Virus Total is a free service that analyzes suspicious files and URLs and facilitates the quick detection of viruses, worms, Trojans, and all kinds of malware.







https://www.virustotal.com/


AVG Online Web Page Scanner


The AVG Link Scanner® Drop Zone lets you check the safety of individual web pages you are about to visit. You may have received a suspicious link in an e-mail — just copy the URL (web page address) and drop it into the box below. Link Scanner® will examine the web page against 30-day domain threat history reports to see whether it’s hiding any suspicious downloads.





http://www.avgthreatlabs.com/au-en/website-safety-reports


URL Black List Checker



Use this form to find out if a list of sites or URL is in the blacklist and in which categories all in one go. Only valid domains and URLs will be accepted.




http://urlblacklist.com/?sec=search


Norton Web Safe


Norton Safe Web is a new reputation service from Symantec. Our servers analyze Web sites to see how they will affect you and your computer.




http://safeweb.norton.com/


Unmask Parasites

Hackers exploit security vulnerabilities in popular web software such as blogs, forums, CMS, image galleries and wikis to insert hidden illicit content into web pages of innocent third-party web sites. Thousands of website owners are unaware that their sites are hacked and infected with parasites.




http://www.unmaskparasites.com/



Website Malware Scanner


Enter a URL (ex. sucuri.net) and the Sucuri Site Check scanner will check the website for known malware, blacklisting status, website errors, and out-of-date software.





http://sitecheck.sucuri.net/scanner/

Windows 7-8.1-10 October Updates All in One [94in1][x86x64]





Software Version: 6.1.7601.23564, 6.3.9600.18505, 10.0.14393.321 / v16.10.18
Language: English, Russian
Treatment: no
Credit to: Adguard
System requirements: Processor: 1 gigahertz (GHz) or higher. * RAM: 1 gigabyte (GB).


-Integrated update on October, 2016;
-Integrate language packs: English, Russian;


Windows 7 Starter (32-bit) - English
Windows 7 Home Basic (32-bit) - English
Windows 7 Home Basic (64-bit) - English
Windows 7 Home Premium (32-bit) - English
Windows 7 Home Premium (64-bit) - English
Windows 7 Professional (32-bit) - English
Windows 7 Professional (64-bit) - English
Windows 7 Professional VL (32-bit) - English
Windows 7 Professional VL (64-bit) - English
Windows 7 Ultimate (32-bit) - English
Windows 7 Ultimate (64-bit) - English
Windows 7 Enterprise (32-bit) - English
Windows 7 Enterprise (64-bit) - English
Windows 7 Starter (32-bit) - Russian
Windows 7 Home Basic (32-bit) - Russian
Windows 7 Home Basic (64-bit) - Russian
Windows 7 Home Premium (32-bit) - Russian
Windows 7 Home Premium (64-bit) - Russian
Windows 7 Professional (32-bit) - Russian
Windows 7 Professional (64-bit) - Russian
Windows 7 Professional VL (32-bit) - Russian
Windows 7 Professional VL (64-bit) - Russian
Windows 7 Ultimate (32-bit) - Russian
Windows 7 Ultimate (64-bit) - Russian
Windows 7 Enterprise (32-bit) - Russian
Windows 7 Enterprise (64-bit) - Russian
Windows 8.1 Single Language (32-bit) - English
Windows 8.1 Single Language (64-bit) - English
Windows 8.1 Core (32-bit) - English
Windows 8.1 Core (64-bit) - English
Windows 8.1 Pro (32-bit) - English
Windows 8.1 Pro (64-bit) - English
Windows 8.1 Pro VL (32-bit) - English
Windows 8.1 Pro VL (64-bit) - English
Windows 8.1 Pro with Media Center (32-bit) - English
Windows 8.1 Pro with Media Center (64-bit) - English
Windows 8.1 Enterprise (32-bit) - English
Windows 8.1 Enterprise (64-bit) - English
Windows Embedded 8.1 Industry Professional (32-bit) - English
Windows Embedded 8.1 Industry Professional (64-bit) - English
Windows Embedded 8.1 Industry Enterprise (32-bit) - English
Windows Embedded 8.1 Industry Enterprise (64-bit) - English
Windows 8.1 Single Language (32-bit) - Russian
Windows 8.1 Single Language (64-bit) - Russian
Windows 8.1 Core (32-bit) - Russian
Windows 8.1 Core (64-bit) - Russian
Windows 8.1 Pro (32-bit) - Russian
Windows 8.1 Pro (64-bit) - Russian
Windows 8.1 Pro VL (32-bit) - Russian
Windows 8.1 Pro VL (64-bit) - Russian
Windows 8.1 Pro with Media Center (32-bit) - Russian
Windows 8.1 Pro with Media Center (64-bit) - Russian
Windows 8.1 Enterprise (32-bit) - Russian
Windows 8.1 Enterprise (64-bit) - Russian
Windows Embedded 8.1 Industry Professional (32-bit) - Russian
Windows Embedded 8.1 Industry Professional (64-bit) - Russian
Windows Embedded 8.1 Industry Enterprise (32-bit) - Russian
Windows Embedded 8.1 Industry Enterprise (64-bit) - Russian
Windows 10 Home Single Language (32-bit) - English
Windows 10 Home Single Language (64-bit) - English
Windows 10 Home (32-bit) - English
Windows 10 Home (64-bit) - English
Windows 10 Pro (32-bit) - English
Windows 10 Pro (64-bit) - English
Windows 10 Pro VL (32-bit) - English
Windows 10 Pro VL (64-bit) - English
Windows 10 Pro for Education (32-bit) - English
Windows 10 Pro for Education (64-bit) - English
Windows 10 Education (32-bit) - English
Windows 10 Education (64-bit) - English
Windows 10 Education VL (32-bit) - English
Windows 10 Education VL (64-bit) - English
Windows 10 Enterprise (32-bit) - English
Windows 10 Enterprise (64-bit) - English
Windows 10 Enterprise 2016 LTSB (32-bit) - English
Windows 10 Enterprise 2016 LTSB (64-bit) - English
Windows 10 Home Single Language (32-bit) - Russian
Windows 10 Home Single Language (64-bit) - Russian
Windows 10 Home (32-bit) - Russian
Windows 10 Home (64-bit) - Russian
Windows 10 Pro (32-bit) - Russian
Windows 10 Pro (64-bit) - Russian
Windows 10 Pro VL (32-bit) - Russian
Windows 10 Pro VL (64-bit) - Russian
Windows 10 Pro for Education (32-bit) - Russian
Windows 10 Pro for Education (64-bit) - Russian
Windows 10 Education (32-bit) - Russian
Windows 10 Education (64-bit) - Russian
Windows 10 Education VL (32-bit) - Russian
Windows 10 Education VL (64-bit) - Russian
Windows 10 Enterprise (32-bit) - Russian
Windows 10 Enterprise (64-bit) - Russian
Windows 10 Enterprise 2016 LTSB (32-bit) - Russian
Windows 10 Enterprise 2016 LTSB (64-bit) - Russian


DOWNLOAD HERE:

USERCLOUD

UPLOADS

TB.RG


TORRENTS FILES


Extratorrent 1

Extratorrent 2

Anonymous Hackers Issue DDoS Warning Just Days after ‘Bringing Down’ Twitter, Spotify and Netflix


Taking to Twitter, the secretive group posted: “DDoS comin” – a reference to a Distributed Denial of Service attack.



Anonymous hackers have issued a chilling threat that a Distributed Denial of Service attack is “coming”.


The attack – known as a DDoS attack – overloads websites and services to the point that they become unable to function.


Major banks have been hit in the past by similar attacks, and popular webpages and services such as Twitter, Spotify and Netflix have all been subject to recent attacks.


Hackers did not specifically say which service they would be attacking, however.


As well as targeting political campaigns and popular services, the hacking group has also campaigned against Islamic State in the past.








On Friday Twitter, Spotify and Netflix were targeted by hackers in a widespread cyber attack.


Users also reported being unable to access sites such as PayPal, Pinterest, AirBnB and PlayStation’s online service.


US officials said they were investigating a DDoS attack.


That attack appears to have been focused on Dyn – a server provider for those websites.


Dyn confirmed in a post on its website: “Starting at 11:10 UTC on October 21th [sic]-Friday 2016 we began monitoring and mitigating a DDoS attack against our Dyn Managed DNS infrastructure.


“Some customers may experience increased DNS query latency and delayed zone propagation during this time. Updates will be posted as information becomes available.”


Anonymous is a group of ‘hacktivists’ which was formed in 2003.


After the Paris attacks in November 2015, they released a video declaring war on ISIS.


They are well known for unusual tactics and taking websites offline, apparently motivated by social justice and a reaction against censorship.


10 Things Everyone Should Know About Anonymous










Have you ever thought about joining Anonymous? If you do, be careful who you trust. To become a member of Anonymous is easy. All you have to do is proclaim yourself one of them.


The hard part is not getting caught.


VISITORS AROUND THE WORLD