Showing posts with label Security. Show all posts
Showing posts with label Security. Show all posts

Friday, July 14, 2017

Cross-platform Remote Access Trojan - Adwind

Hello Friends,

Remote Access Trojan(RAT) Called “Adwind”(Adwind/jRAT)  Targeting Aerospace Industries to steal credentials, record and harvest keystrokes, take pictures or screenshots, film and retrieve videos, and exfiltrate data.

Its a Cross Platform Remote Access Trojan which Detect as JAVA_ADWIND and Malware Authors developed this Malware to run on any machine installed with Java, including Windows, Mac OSX, Linux, and Android.

This RAT Mainly Targeting Aerospace industries and infected countries including Switzerland, Ukraine, Austria and US listed as Most Affected Countries.
Read More

6 Million Verizon Customers Data Leaked online

Hi Friends,
Telecommunications giant Verizon’s Customers 6 Million Sensitive personal data leaked online due to misconfigured cloud-based file repository and this Misconfiguraton leads to exposed customer phone numbers, names, and some PIN codes publicly available online.


This Data Breach occurred due to “Human Error” and  Verizon’s Cloud-based file server was operated by Verizon’s Third Party vendor  NICE Systems.
Read More

Wednesday, April 12, 2017

Microsoft Office Word 0-day remote code execution vulnerability

Hello Friends,
On April 7, two researchers from McAfee and FireEye broke a 0-day vulnerability in Microsoft Office Word. By sending a message with an OLE2link object attachment, when the user opens the attachment, the code executes and connects to an attacker-controlled remote server, thereby downloading a malicious HTML application file (HTA) that will disguise Become a Microsoft RTF document.
Read More

Sunday, January 24, 2016

How to Protect Your Hard Drives from Data Forensics ?

Hello Friends,
The mass arrests of 25 anons in Europe and South America, and the rumors of an FBI sweep on the east coast of America floating around, times look dicey for hackers. Over the past few days, a lot of questions have been posed to me about removing sensitive data from hard drives. Ideas seem to range from magnets to microwaves and a lot of things in-between. So, I’d like to explain a little bit about data forensics, how it works, and the steps you can take to be safe.
Often, an anon will delete files from his computer, but that is only half the story, as those files are still really there. And if the careless anon doesn’t take steps to fix that, when his door gets kicked in and the FBI takes his hard drive, they will be able to see everything. Don’t be that anon.
Read More

Sunday, May 10, 2015

Trace Facebook Profile Visitors

hi friends,
Today billions of people are using Facebook today, Facebook is one of the biggest network of internet and is very much popular worldwide. Today billions of people using Facebook daily in their life and many of user visits each other profile daily and more than even the respective user another user visits more than him/her. But you can’t see directly the visitors that have visited in your profile. So in this post i will tell you the method by which you can easily trace the friends that visit your profile. And you will also check the visitor that visit your profile everyday.
Read More

Friday, December 5, 2014

Hacking PayPal Accounts

Hi Friends,
The computer security industry has made many positive changes since the early days of computing. One thing that seems to be catching on with bigger tech companies is bug bounty programs. PayPal offers such a program and [Yasser] decided to throw his hat in the ring and see if he could find any juicy vulnerabilities. His curiosity paid off big time.
Read More

Tuesday, October 28, 2014

Samsung 'Find My Mobile' Flaw Allows Hacker to Remotely Lock Your Device

Hi friends,
follow us on facebook https://www.facebook.com/justhackitnow
Join group https://www.facebook.com/groups/197622320253974/
The National Institute of Standards and Technology (NIST) is warning users of a newly discovered Zero-Day flaw in the Samsung Find My Mobile service, which fails to validate the sender of a lock-code data received over a network.
The Find My Mobile feature implemented by Samsung in their devices is a mobile web-service that provides samsung users a bunch of features to locate their lost device, to play an alert on a remote
Read More

Saturday, October 25, 2014

Google Launches USB-Based "Security Key" To Strengthen 2-Step Verification

Hi Friends,
Google is taking its users’ privacy very serious and making every possible effort for its users just to make them feel secure when they are online.
Today, the tech giant has announced its enhanced two-step verification service that is based on a physical USB key, adding yet another layer of security to protect its users from hackers and other forms of online theft.
Read More

Google Search Algorithm to Demote Piracy Sites In Search Results

Hi Friends,
The Search Engine giant is not going to spare the Pirated content providing sites. Google is ready to fulfill its commitment to downgrade the search rankings of ‘notorious’ piracy sites globally that often rank above legal and commercial sites.
Google and the Copyright holders are, to some extent, enemies for years, but in Google's ongoing anti-piracy efforts, the company will fight copyright infringement and assure rights holders that their contents will be appeared at the top of its search results and that the search made up only a small portion of pirate traffic.
Read More

Tuesday, October 21, 2014

TAILS VERSION 1.2 RELEASED

Hi Friends,

A new version Tails 1.2 has also been released. Tails, also known as 'Amnesiac Incognito Live System', is a free security-focused Debian-based Linux distribution, specially designed and optimized to preserve users' anonymity and privacy.
The operating system came into limelight when the global surveillance whistleblower Edward Snowden said that he had used it in order to remain Anonymous and keep his communications hidden from the law enforcement authorities.
Read More

Tor Browser 4.0 and Tails 1.2 Update Released

Hi Friends..
Like us on facebook:- https://www.facebook.com/justhackitnow
 Tor - Privacy oriented encrypted anonymizing service, has announced the launch of its next version of Tor Browser Bundle, Tor version 4.0, which disables SSL3 to prevent POODLE attack and uses new transports that are intended to defeat the Great Firewall of China and other extremely restrictive firewalls.

Tor is generally thought to be a place where users come online to hide their activities and remain anonymous. Tor is an encrypted anonymizing network considered to be one of the most privacy oriented service and is mostly used by activists, journalists to circumvent online censorship and surveillance efforts by various countries.
Read More

Tuesday, March 11, 2014

Website Hacking Using Havij (sql injection)

Hi Friends,

The technique we are going to use sql injection. For more information about the topic can be found here. I will be soon posting tutorial about manual sql injection.

Google Dorks: Google dorks are specifically query's that can reveal all the information about the specific website. I am giving you some Google dorks which you can use for finding the website vulnerable to sql injection.

Read More

10 reasons Why websites get HACKED.

Hi Friends Welcome Back,
For more updates join our facebook group:-
https://www.facebook.com/groups/197622320253974/

Below you will find list of top 10 web vul­ner­a­bil­i­ties clas­si­fied by OWASP, here is also descrip­tion of the prob­lem and some examples.
I will just give you the list in case you missed it before, i will not com­ment on any of these as there is already hot dis­cus­sion about this mat­ter on sev­eral sites/​forums.
Read More

4 Ways to Crack a Facebook Password and How to Protect Yourself from Them

Hi Friends,
We share our lives on Facebook. We share our birthdays and our anniversaries. We share our vacation plans and locations. We share the births of our sons and the deaths of our fathers. We share our most cherished moments and our most painful thoughts. We divulge every aspect of our lives.
But we sometimes forget who's watching.
We use Facebook as a tool to connect, but there are those people who use that connectivity for malicious purposes. We reveal what others can use against us. They know when we're not home and for how long we're gone. They know the answers to our security questions. People can practically steal our identities—and that's just with the visible information we purposely(?) give away through our public Facebook profile.
Read More

Friday, November 22, 2013

Man In the Middle attack using BT5 Ettercap Tutorial

Ettercap

Ettercap is a suite for man in the middle attacks on LAN (local area network ). It features sniffing of live connections, content filtering on the fly and many other interesting tricks.It supports active and passive dissection of many protocols (even ciphered ones) and includes many feature for network and host analysis. In this tutorial i will explain how to sniff (user names,passwords) in LAN using Ettercap.....


The man-in-the-middle attack (also known as a bucket-brigade attack and abbreviated MITM) is a form of active  eavesdropping  in which the attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to each other over a private connection when in fact the entire conversation is controlled by the attacker



There are several kinds man in the middle attacks that we can perform, But in this tutorial we will see attacks based on the ARP protocol




Steps to be followed 

1. Open terminal  and type ettercap -G. This will open GUI based ettercap utility ....
2. Now scan for hosts in your sub net  by going to Hosts ---> scan for hosts




3.   Now open host list from hosts tab and select the IP address of the victim as target 1 and IP address of the router as target 2.




4.. Now start ARP poisoning by going to mitm ---> ARP Poisoning 


























Finally start the sniffer by going to start ---> start sniffing . Now if the victim logs into gmail , face book yahoo mail...etc .we will get his user name and password  

Hope you Enjoyed the article, In my coming posts i will be writing about the countermeasures that you can take against ARP poisoning , MITM ..etc .Till then have a nice time

If you have any doubts please feel free to post a comment.....:) :)

Read More

Tuesday, July 23, 2013

Security Apps To Help Protect IPhone Apps

Hello Friends,
Smart iPhone practices like carefully vetting apps before you download can help keep your phone safe. However, security goes far beyond making careful choices: If you use your iPhone for business or keep sensitive information on it, you need better protection. Here is a collection of downloads you can use to increase your phone security and prevent viruses, malware, and data theft from ruining your smartphone experience.

Like us on facebook https://www.facebook.com/justhackitnow
Join Just hack it now group on facebook

SecureWeb

SecureWeb is a free app that functions as a mobile browser, but with a lot of extra filtering features that
Read More

Monday, May 20, 2013

Mozilla Firefox Top 5 Extensions a Hacker Must Have>>>>>

Hi Friends Mozilla Firefox is a browser which is loved by security experts and hackers. Mozilla has more that 450 million world wide users and is written in majorly in c,c++,javacript, XSS, XBL. The reason why it is so popular amongst security expert's is because it is open source and has a number of extension's available which make work of penetration testing easier and faster.

1. HackBar: HackBar is like a toolbar but it comes very handy while testing for web vulnerabilities like SQL, XSS etc. Loading,Splitting and Execution of URL can be done using this toolbar. When testing for SQL and XSS vulnerabilities the codes/queries can be injected into the URL quickly using this toolbar.
Read More

Bypass Phone and SMS verification of Any Website

Hi Friends Now days, almost most websites need sms verification which includes google, facebook, youtube and other survey websites.

First of all we should understand why SMS and Phone Verification System is Important?

  •   Keep More Visitors for Market
  •   Providing Extra Security for their Website
  •   Keep Spammers out
  •   Daily Advertisement and promotional ads daily

Rather we can able to create and Bypass gmail (facebook, youtube, other shopping sites) without SMS verification. Because gmail allow to create only few account. When you try to create more account with same mobile number, google restricted and you can't create more account. so we can create counterless gmail accounts using following steps.
Read More

Sunday, December 9, 2012

Kaspersky Anti-Virus & Internet Security 2013 Final + Key

Hi Friends,

Kaspersky Anti-Virus & Internet Security 2013 provides a wide range of technologies to protect your privacy and your identity – including two unique security features for entering personal information online.

 Secure Keyboard is a new Kaspersky technology that automatically activates whenever you open a bank website or payment website – or you enter a password within any web page – to ensure that information you enter using your physical keyboard can’t be accessed by keyloggers

 For our ultimate protection, Kaspersky’s improved Virtual Keyboard feature allows you to use mouse-clicks to enter your banking information – so that keystrokes can’t be tracked or stolen by keyloggers,
Read More

Monday, December 3, 2012

Why These Days Hacking Is Easy And Everyone Is Hacked?

Hi Friends,
This is among the most common questions which seem to be troubling the modern day generation. People with even some basic computer and internet knowledge can understand the severity of this issue. However, hacking is not an easy nut to crack; it requires lots of skills and efforts and is considered among the tougher tasks. Yet, these days, hackers have created whole lot of mess by simply cracking passwords of emails, bank accounts, and other similar things. This has emerged as a serious threat in the present context especially when you transfer money online, and carry out countless things on the web. The following are few possible reasons why hacking is becoming a rampant phenomenon where so many people
Read More

Search This Blog

Powered by Blogger.

Pages