Monday, 27 May 2019

CChange Or Spoof A Mac Address In Windows Or Os

Each network interfacecard has a special MAC address. This applies to a wide range a system cards, including Ethernet cards and wifi cards. This MAC address is a six byte number or 12 digit hexadecimal number that is utilized to remarkably distinguish a host on a system.

Different Ways Of Finding Your MAC Address

There are several ways of finding your Ethernet and communications protocol information. Many Ethernet card manufacturer's have proprietary software that can reval this information, but they work differently depending on the manufacturer. So you will use the Windows 2000 and XP "ipconfig
" utility since this is available in the majority of Windows Opreating System.
First go the "start" -> "run" and type "cmd" without the quotes. Then hit the enter key. At the command  line type "ipconfig / all", again without the quotes. Actually, just typing ipconfig without the / all will work but will only provide you with abbreviated information regarding your network cards. An example of what you might see by typing the "ipconfig" / all" command is below:

OutPut Of The "Ipconfig /All" Command



Recommended Tool For Changing Mac Address 

MacMakeUp- https://macmakeup.en.softonic.com/

MacMakeUp allows to changing MAC Address to one of your choice or randomized one. Since first few sysbols of MAC are code for hardware manufacturer app also has the internal list of those codes you can choose from. There are some advanced setting, but i suggest they are not to be tinkered with unless you have good reason to. Same as with actual MAC address editing.

Sunday, 26 May 2019

Recommended VPN Providers For TOR

www.hidemyass.com
www.ipvanish.com
www.expressvpn.com
www.cyberghost.com
www.hsselite.com

Setting up VPN

Setting up VPN can be done for various purposes such as for Remote Access over the internet, connecting networks over the internet and connecting computers over an internet. The aim of VPN is provide the same services as that received through leased lines, but at a lower cost.

Here is a look at the step involved in setting up a VPN in your home computer. Select 'control panel' from the 'start' menu. Here yoyu need to select"Network and internet setting" and from here select 'Network Connections' in XP or the network and sharing center in vista. Proceed to complete the steps here by selecting 'Create a new connection'. Next follow the upcoming steps till you complete the 'allow virtual private connections' step. select the check box for each user that you want to give access over the VPN. This process completes the VPN setup. You can see new incoming connections at this point.

You need to visit a VPN service provider's website. Register online in the site and download the software to any system in the office network. This downloaded software establishes connection between the office networks with the VPN service through the internet without any need to change in the firewall. By leaving the firewall unchanged, the network is highly secured once the office network is connected. The users can setup their computers for VPN access. There are advanced VPN service available, which allows the remote user to work immediately after registration. VPN service helps in limited hardware procurement and employing consultants to setup thus providing freedom to add or remove users at owner's requirement.

Using VPN AND TOR

Although using a proxy server is not completely secure. The website that you want to view is communicating with your preferred server, the proxy must decrypt your traffic, and thus the Internet service provider of the proxy server is encrypted or just using a service that is called TOR which manages your traffic through three proxies. 
"Noods". It is almost impossible to detect this way, but.

'Big but' is that the exit mode decrypts your traffic to communicate with the server you are trying to reach, such as google.com. This means exit mode can easily spy on the contents of the package sent to the Tor Network, for example, encrypted passwords and SSLs, which are not encrypted. This can be used against you in many ways:

Absolutely everyone can provide a nerve node. Goverment, criminala, ... although exit node providers do not send traffic through their nodes and send traffic, but they can fish any information about this watch against you. In addition, it is very easy to define what you can easily record recorded packages.

Alternative VPN service of TOR and similar services. The same problem applies here: VPN service providers can easily see your unauthorized traffic and use it against you. It has become happy once law enforcement broke down such services and at least brought the entire organization of internet criminals.

The conclusion for which is that anonymous ways can be effective, but you are always forced to trust the proxy provider, who you want to use the VPN service. This archive of reality can not be archived. You do not know who is behind the service and do not even know whether this person can be trusted, you will not be allowed to infiltrate the service because of not mentioning the risk of hacking services.

Tips for Using VPN and Tor Online (www.torproject.org)

A VPN or a virtual private network extends a specific private network to the public network and includes Internet in it. It enables users to retrieve information on public networks as well as shared networks. This is done as if they are computing devices and these devices are connected to the private network. A VPN is created by placing points on points using different dedicated conventions, traffic encryption and tunneling protocols. This is basically a lot like WAN which can be called a wide area network. You should follow the tips below to be a confident user in a VPN.

* Your firewall should be up and running

It should be a bit difficult and trivial. However, a firewall should be launched and running and you do not mind if you are using a VPN, but the firewall must run for 24 hours.

* You must remain incognito

Many people always forget these days that their browsers can provide huge amount of personal information. Most of the time, when using the website, users do not use incognito or safe mode. Notify that there are some websites that inform the user to go incognito when it is not secure and you as a user must need to di it.

* Disable all the geo-location services

Many of us are using smartphones and tablets for everyday use like Facebook and YouTube. All those who essentially want to use all these devices have to watch out for all the geo-location services.

* Manage all your cookies

These days no one in his or her busy life pays any attention to cookies. However these cookies are almost everywhere and this cookies often try to improve the recurrent browsing of the web. These cookies can very well be transformed and modified into various tracking scripts and these can monitor your activity as well as the network informaton.

* The VPN over a TOR

TOR is probably a very big deal when this particular technology had come out and also an lot of us have used this TOR browser to use the Facebook at work. You can also replay on the TOR yourself. It is a very great and also an open source solution that is available for all the platforms. It is one of the important things to remember.

A VPN Virtual Private Network connects a PC or laptop over the internet to the office network allowing the remote user to work as if they were sitting at their desk in the office.Normally, setting up a VPN requires significant technical skills as the offfice firewall needs to be reconfigured, the VPN server has to be setup and the whole lot has to be made secure. Once setup and working, the VPN server needs to be monitored  (to ensure there is nothing suspicious going on) and maintained with the latest security patches provided by the VPN vendor.

However, there is an alternative way to setup a VPN using a VPN service. A VPN service gives all the features of a VPN server but removes the complexity and cost of setup, monitoring and maintaince. To setup a VPN provided as a service, you need to visit the providers website, register online and download a piece of software to a system in the office network. This software connects the office network to the VPN service via the internet without having to change your firewall, By not changing your firewall, you have removed a potential attack point for hackers who scan firewalls to identify weaknesses. Once the office network is connected, you can then add users to the service and setup their PCs for VPN access. The more advanced VPN services provide a way to let the remote user set themselves up for access to the office so that within minitues of registering a remote user can be working on their applications and files as if they were in the office.

Some hosted VPN services only provide access to a person's own PC which means that their office PC must always be powered on and that they have a PC/Laptop when out of the office. While these type of VPN services work, they are not very eco-friendly (you need a powered on PC for each remote user) and they don't support activities such as composing and reading mail when there is no internet access

Other VPN services connect to remot user to the office network as if there PC was on a very long cable. With these services a remot user connects directly to the file and mail servers without having to use a desktop PC. With this type of access, people use there laptop exactly the same way in and out of the office without having to remember if a file was stored on a server or on the laptop. Mail applications such as Microsoft Outlook work especially well on a network  VPN as they allow the user to read and compose mail even when they are not connected to the VPN. When the user next connects to the VPN, outlook will automatically send all the newly created mail. Some VPN services will also provide a secure way to access mail and files from any web browser so that remote users do not need to have a laptop with them at all times.

Saturday, 25 May 2019

Reconnaissance

In the computer world, there are good guys who create networks that help us communicate, work with others and get information and then there are those not-so- good guys who, for a variety of reasons, like to use their computers to worm their way into those networks and cause trouble.

They,re called hackers, and they,ll routinely do things like:

1. Steal secrets.
2. Obtain passwords.
3. Get credit card information.
4. Create so much traffic that a website has to shut down.

Hackers are ALWAYS at work, either trying to steal information for their own gain or disrupt business as usual. You hear a lot of about hackers on the news now and then, but just what are they doing.

Here's  bit of background to help you understand what it means when a website or company is"hacked".Hackers aren't heroes.

For some reason,there are those who think that hackers are 
"cool" and that there spirit of mischief and sneaking is admirable. But the IT (Information Technology) experts who spend a lot of money building business or goverment networks would disagree. And for that matter, so would anyone who has ever had their money or identity stolen by a hacker. Thers's nothing playful about that.Most people would agree that there are three types of hackers...!

* Young kids "having fun". There are adolescents who are essentially vandals on the internet and are also know as script kiddies. They,re not looking for more than few hours of their fun messing with websites or networks.
* Recreational "hackers". These are savvy computer users who intrude on networks when they feel they have a valid reason to...in their minds at least. They may have a grudge against a certain website or company and take their dislike out by "hacking"or disrupting the website.
* Professionals. When a computer expert gets a taste of hacking and likes the flavor, he or she will continue to use their skill,often for breaking into people's accounts to steal money. They also might like taking down a big network for 
"fun."

Stealing passwords and getting in the system.

Finding out a password is the usually the frist step in cracking a network's security. That's why there are so many airticles telling you to change your passwords often and make them hard to figure out!

Here are a few key terms that you'll hear in discussions about hackers and what they do..!

1. Backdoor. A secret pathway a hacker uses to gain entry to a computer system.
2. Buffer overflow. A method of attack where the hacker delivers malicious commands to a system by overrunning an application buffer.
3. Denial of service attack. A attack designed to cripple the victim's system by preventing it from handling its normal traffic, usually by flodding it with flase traffic.
4. Email worm. A virus laden script or mini program sent to an unsuspecting victim through a normal hacking email message.
5. Root access. The highest level of access and most desired by serious hackers to a computer system, which can give them complete control over the system.
6. Root kit. A set of tools used by an intruder to expand and disguise his control of the system.
7. Script kiddie. A youn or unsophisticated hacker who uses base hacker tookls to try to act like a real hacker.
8. Session hijacking. When a hacker is able to insert malicious data packets right into an actual data transmission over the internet connection.
9. Trojan connection. A seemingly helpful program that tricks the computer user into opening it, only to deliver unnoticed and behind the scenes as unexpected attack on the user's computer.

Friday, 24 May 2019

Virtualbox For Hacking

Many of you have been having difficulty setting up your hacking environment to practice your hacks. In this chapter, I will show you the simplest and fastest way to set up an lab to practice your hacks before taking them out into the real world where any slip-ups could be devastating.

Download VMware Workstation or Box.

The best way to practice hacking is within a virtual environment. Essentially you setup a hacking system, such as Kali Linux, and some victims to exploit. Ideally, you would want multiple opreating system. Windows XP, Vista, 7 , and 8, as well as Linux/Unix and applications so that you can try out a variety of hacks.Virtual machines and a virtual network are the best and safest way to set up a hacking lab. There are several virtualization system out there including citrix, oracle,s VirtualBox, KVM, Microsoft,s Virtual PC and hyper-v, and VMware,s Workstation, VMware Box, and ESXi. For a laboratory environment, I strongly recommend VMware,s Workstation or Box.

Download Kali VMware Images

Once you have downloaded and installed your virtualization systems, our next step is to download the VMware images of kali provided by Offensive Security, you won,t have to create the virtual machine, but simply run it from Workstation or Box This means that once you have downloaded  the VM of Kali, you can then use it in either Workstation or Box without actually installing a new OS.

Open image with VMware

Once all the files have been unzipped, our next step is to the open this new virtual machine. Make note of  the location where you have unzipped the virtual machine image. Then, go to either VMware Workstation or Box and go to file >create new machine > Allocate Ram & HDD Space > Select ISO File & Install the new OS in VMware.

Download & Install Targets

For the next step, you need to download and install a target system. Of course, you could se your host Windows 7 or 8 system, but since this is practice, you might want to use an older, easier to hack system. Also, hacking your system can leave it unstable and damaged.

I recommend installing a Windows XP, Vista, server 2003, or and older version of Linux. These systems have many known security flaws that you can practice on and, then when you become more proficient at hackingl, and you can then upgrade to Windows 7 and 8 and newer versions of Linux.

If you or your friends don,t have a copy of these older opreating systems, you can purchase them very inexpensively many places on the internet. Of course,you can also obtain these opreating systems for free on many of the torrent sites, But BEWARE you will likely be downloading more than just the operating systems. VERY  often, these free downloads include rootkits that will embed in your systems when you open the file.

Download Old Applicatons

Once you have your operating system in place, very often you will need applications to run on these older versions of the Windows and Linux operating systems. You will likely need a browser, Office, Adobe products, etc. These older products have well-known security flaws that you can hone your skills on.

Wednesday, 22 May 2019

People Searching

There are millions of or billions of searches conducted on a daily basis on all popular search engines as well as the popular social networking platforms. However what exactly these man search for is a matter of our concern. There are some platforms or tools that can be used to determine what exactly people search for on these search engines.

5 Steps People Use To Search

1. Pipl: What you will find when you visit Pipl is that this search engine does does not just search the web, but rather goes through searching an area this site refers to as the invisible web. There are some hidden resources on the internet that search engines simply can not or do not access. for a variety of reasons. Some contains personal information, and the sites containing that information opt out of being indexed by the common search engines. Pipl is different because it does index such information.

What you can add will determine  how exact your results may be. If you only have a name, you may get any information on anyone with that name. If you can add more, like a state, you are going to get more specific results.

2. Wink:  Wink searches across what you would find using a regular search engine as well as acoss social communities, online profiles,etc. Some pwople searches work by looking for as many possibilities as possible, but Wink works in an almost opposite manner. Wink only searches for known information, so any advanced terms you enter need to be facts, like a birthday or city of birth about which you are certain. Possibilities will only confuse and limit unfairly your results. For this reason, Wink is particularly useful for those who known a lot of basic personal informatino about the person they are trying to find.

3. Facebook:  Facebook is one of the world,s largest social network with hundreds of millions of people on this platform on a daily basis, it makes sense to use facebook as an incredibly useful tool to find people online. This platform is used by billions of people over the world but only an few people know how to properly use this website. Facebook is often a widely used online networking programme that allows peoples to share information with other people. You can even spy on people,s find peoples working as an artist, singer, professionals, etc. And contact them for your purpose.

4. PeekYou:  PeekYou is an interesting twist to the world, it allows you to search for usernames across a variety of social networking. PeekYou considers itself to be "The Smartest People Search Online" it is a website that brings people from all over the world together. Anyone with a PeekYou prifiles helps other people locate their websites, photos, social networking pages, or any other contact information they have provided online.

5. Linkedin:  Linkedin is completely free though they do have a pro version which gives you a lot more features such as the pro account shows what keywords bring up your profile, what industry these people are in when they viewed your profile, and where they are located geographically. You can also see everyone who has ever checked out your profile whereas the free version just shows you five most recent. Generally if you,re just starting out, the free version is all you need. Linkedin can be a goldmine for you if you know how to target peoplesand sell your stuff or help yourself to find a job with Linkedin.

FootPrinting

What is the first step one would take before seeking admission in a university or collage? Quite unanimously, it must be a primary research about the institute.Footprinting is an analogous step which hackers take before gaining access into any network. The systematic foot printing of a organization enables attackers to create a complete profile of an organization,s security posture like system architecture, network blocks and IP address exposed on the internet. Hackers gain reconnaissance of the target following a sequence of steps as:


1 open source footprinting the frist step a hacker takes is to visit the website of a potential target. He then looks for contact information of the administrators which may help in gusseing  the password or in social Engineering.

1 Network Enumeration this the next step in gaining information where the hacker tries to identify the domain names and the network blocks of the target network.

1 Scanning Once the network blockis known, the next step is to spy for active IP address on the target network. The internet control Message Protocol (ICMP)  is a good alternative for identifying active IP addresses.