Types of Hacker

Let’s see the categories of Hackers on the basis on their knowledge. Coders **The Real Hackers are the Coders, the ones who revise the methods and create tools that are available in the market. Coders can find security holes and weaknesses in software to create their own exploits. These Hackers can use those exploits to develop fully patched and secure systems.

Concept of Ethical Hacking

hi guys this is my first post i hope to present hacking A to Z 101 lets begun :) Hacking The Art of exploring various security breaches is termed as Hacking. # Computer Hackers have been around for so many years. Since the Internet became widely used in the World, We have started to hear more and more about hacking

Why Hackers Hack?

The main reason why Hackers hack is because they can hack. Hacking is a casual hobby for some Hackers — they just hack to see what they can hack and what they can’t hack, usually by testing their own systems. Many Hackers are the guys who get kicked out of corporate and government IT and security organizations. They try to bring down the status of the organization by attacking or stealing information

Steps Performed By hackers

1) Reconnaissance 2) Scanning 3) Gaining Access 4) Maintaining Access 5) Clearing Tracks • Performing Reconnaissance • Scanning and Enumeration • Gaining access • Maintaining access and Placing Backdoors • Covering tracks or Clearing Log

Prevention from Hackers

What can be done to prevent Hackers from finding new holes in software and exploiting them? Information security research teams exist—to try to find these holes and notify vendors before they are exploited. There is a beneficial competition occurring between the Hackers securing systems and the Hackers breaking into those systems. This competition provides us with better and stronger security, as well as more complex and sophisticated attack techniques.

ad

Tuesday, September 18, 2012

More Facts About Email Hacking

 

 

Consequences of fake emails








Email from your Email ID to any Security Agency declaring a Bomb Blast can make you spend rest of your life 
behind the iron bars. 

Email from you to your Girl friend or Boy friend can cause Break-Up and set your friend’s to be in relationship.

  Email from your Email ID to your Boss carrying your Resignation Letter or anything else which you can think of.  There can be so many cases drafted on Fake Emails. 

Proving a fake Email 

Every Email carry Header which has information about the Travelling Path of the Email

  Check the Header and Get the location from the Email was Sent

  Check if the Email was sent from any other Email Server or Website

  Headers carry the name of the Website on which the mail sending script was used. 

 Email Bombing

   Email Bombing is sending an Email message to a particular address at a specific victim site. In many instances, the 
messages will be large and constructed from meaningless data in an effort to consume additional system and 
network resources. Multiple accounts at the target site may be abused, increasing the denial of service impact.







Email Spamming

 

  Email Spamming is a variant of Bombing; it refers to sending Email to hundreds or thousands of users (or to lists 
that expand to that many users). Email spamming can be made worse if recipients reply to the Email, causing all 
the original addressees to receive the reply. It may also occur innocently, as a result of sending a message to 

Email Password Hacking 

 There is no specified attack available just to hack the password of Email accounts. Also, it is not so easy to compromise the Email server like Yahoo, Gmail, etc.

  Email Password Hacking can be accomplished via some of the Client Side Attacks. We try to compromise the user 
and get the password of the Email account before it reaches the desired Email server.

  We will cover many attacks by the workshop flows, but at this time we will talk about the very famous 'Phishing 
attack'.

mailing lists and not realizing that the list explodes to thousands of users, or as a result of a responder message 
(such as vacation(1)) that is setup incorrectly. 

Comming Soon Post Phising ----->>>>> 

Saturday, September 15, 2012

PHP mail Sending Script

PHP mail Sending Script

 











Wednesday, September 12, 2012

Email Spoofing

Email Spoofing

 







Email spoofing is the forgery of an Email header so that the message appears to have originated from someone or
somewhere other than the actual source. Distributors of spam often use spoofing in an attempt to get recipients 
to open, and possibly even respond to, their solicitations. Spoofing can be used legitimately.

There are so many ways to send the Fake Emails even without knowing the password of the Email ID. The Internet 
is so vulnerable that you can use anybody's Email ID to send a threatening Email to any official personnel. 

Methods to send fake Emails 

1.Open Relay Server

2.Web Scripts

 Fake Emails: Open Relay Server

 An Open Mail Relay is an SMTP (Simple Mail Transfer Protocol) server configured in such a way that it allows 
anyone on the Internet to send Email through it, not just mail destined ‘To’ or  ‘Originating’ from known users.

An Attacker can connect the Open Relay Server via Telnet and instruct the server to send the Email.

Open Relay Email Server requires no password to send the Email

 Fake Emails: via web script

 Web Programming languages such as PHP and ASP contain the mail sending functions which can be used to send Emails by programming Fake headers i.e.” From: To: Subject:”

 There are so many websites available on the Internet which already contains these mail sending scripts. Most of 
them provide the free service.





Monday, September 10, 2012

Back Track Full Traning Course Free Fun Hacker

Back Track Full Training Course Free From Fun Hacker

Hi hacking lovers :P .Today Im going to give a Special Present Fun Hacker Fans.Full Video course About Back Track.Only For Fun Hacker Fans.
If you Want  This Video Training Course.Please Leave You'r email below as a comment.And Don't Forget To say Thanks :)
Hope to see you in next post


Sunday, September 9, 2012

Email Security

Email Security

 






Now let’s check how secure this fast mean of communication is. There are so many attacks which are applied on
Emails. There are people who are the masters of these Email attacks and they always look for the innocent people
who are not aware of these Email tricks and ready to get caught their trap.

You have to make sure that you are not an easy target for those people. You have to secure your Email identity
and profile, make yourself a tough target

If you have an Email Id Do not feel that it does not matters if hacked because there is no important information in
that Email account, because you do not know if someone gets your Email id password and uses your Email to send
a threatening Email to the Ministry or to the News Channels.

Attacker is not bothered about your data in the Email. He just wants an Email ID Victim which will be used in the
attack. There are a lots of ways by which one can use your Email in wrong means, i am sure that you would have
come across some of the cased where a student gets an Email from his friends abusing him or cases on Porn
Emails where the owner of the Email does not anything about the sent Email.









Friday, September 7, 2012

How To Hack PC Using LAN pdf Download


hi friends today im going to give a very short ebook about how to hack pc using LAN connection.




Download Link
Download PDF

Wednesday, September 5, 2012

Configuring an Email Server

Configuring an Email Server

 





 Email server software like Post cast Server, Hmailserver, Surge mail, etc can be used to convert your Desktop PC
into an Email sending server.

  HMailServer is an Email server for Microsoft Windows. It allows you to handle all your Email yourself without
having to rely on an Internet service provider (ISP) to manage it. Compared to letting your ISP host your Email,
HMailServer adds flexibility and security and gives you the full control over spam protection