Saturday, 24 January 2015

trace ip using skype

                                                                                                                                                                                  Trace  ip address  using skype

There are various ways of getting someones ip address . but do you know that you can trace ip address from skype also ?

First of all  what is ip address ???

IP Address is a unique address assigned  to every computer. In other words it is the unique identity  of your computer.
  The way students have unique roll no. , every product has unique serial no.  etc similarly every computer has  its unique IP Address.

Uses of ip address..

IP Address  is used  to trace any computer’s location .
It is found to to be  used in steal information  from others computer.
(  but more skill is required for that).
One can connect to others computer using  ip address.
The first step in HACKING is to knowing the hosts ip address.

Know let’s get into the work

There are 2 ways of  knowing one’s  ip address using skype.

              1.     Tracing ip with skype name.
  2.      Using task manager.

Method 1.

Step 1:  click on the following link  http://skype-resolver.org/
Step 2: Enter  user name   >>  press  enter  …
              You are done you got the ip address.

  
Method 2

Step 1:   Open skype.

        skype enables you to have face to face conferencing with your loving ones
you minimize the distance and share your all emotions by having your loving ones infront of your eyes.


























Step 2:  start conversation with your friend.

           Inorder to trace hosts ip address it's important that the person should be online. conversation will enable the sharing of data packets and these data packets    travels only when both the computer addresses are bridged.
   



Step 3:  Open Task Manager .  To open task manager press  ctrl + alt +delete.
             Click on the   Open Resource monitor . 

                      Task manager shows all the tasks going on . It not only shows the tasks performed by the user but also shows the tasks performed by a system.
One can start or end the tasks manually from  here. If system got hanged due to overloading or due to any other reason then you can end the applications from here.
   Other than this Task Manager also shows the usage of memory,cpu , disk etc.  



Step 4:  click on Network.
                    Here you will  see all . All the networked resource transactions.
                        what ever running on your computer using networkig resource 
                        will be displayed  over here.
                         


Step 5: Click on the  skype.exe checkbox.
             This is program which contains the details that you want i.e. IP Address.
                using this method you can trace ip of any system using any media of conversation. 
                i.e. facebook chatting , gmail chatting etc.

                As  soon as you will click on skype.exe it will start showing its processing.
             At  Remote Address  column you will find ip address .  


  
 Hurray u r done !!!
***enjoy***


note :- Learning hacking is a good thing . But after learning using it for personal benefit is inhuman activity. learn , enjoy but don't harm others.

                                          @vin_sin

Monday, 19 January 2015

Create partition in easiest way.

How to create a partition in a system.

Hi guys today will tell u how to create partitions. to create a Custom Partition Follow these steps:-
1. To create a partition simply right click on computer .
2. There will be a option named as MANAGE.

click on it.
3. Computer Management's window will popup.
like this.
4. After that click on STORAGE option.
5. After that click on Disk Management(Local).
6. After clicking on that a window will show up which will show you all about your hard disk states. :P

.
7. Now select the disk or partition from where u want to take out the space .
8. Right click on that partition and select the SHRINK VOLUME option.

9. Now calculate the space according to your will..
for example : i want to create 50 GB's partition so simply multiply 50 X 1024 . LIKE THIS:

and put the value there .
Then click on next button.
10. Now u have created a Free space . to make it a disk click on it and then right click on it and select
the first option i.e. new simple volume.

11. simply click on it. name your partition and select NEXT button.
12. after that your Disk /partition is ready now.
DONE.

                                     Thanx for Reading This article...
#DeMox. :)


Monday, 12 January 2015

how to install a windows

               HOW TO INSTALL A WINDOWS 


You can install windows  directly i.e. just by clicking on the ISO or you can do it systematically .

In our earlier post we have mentioned that  how to  make pend-rive Bootable.  So this tutorial is next step of  it.
In order to see our previous post click over the link  http://techmutator.blogspot.in/

Follow the steps :-
1>> insert usb and restart a pc. Press f2 , f10 or f12 ( booting button varies with the different systems) .

2>> follow the instructions click on install button when  it appear   
       then go on following the instructions.

         The following steps are applicable to the installation of all the windows.

                     In order to download windows click here.

     
                                                *** Good Luck ***     
                                                     @vin_sin

Saturday, 10 January 2015

Create Bootable Pendrive

How To make Pen dive Bootable

Hello Guys welcome to our blog..
In today's Article i teach you how to create Pendrive bootable and to install any operating system on your machine.For This process you needed These things:
1. A Pen drive (Minimum 4 GB and Maximum more than 4 GB).
2. USB bootable creator Software.
3. ISO File of That Operating system that you want to install.
4. A PC/Laptop also. (As you also know that).

Steps to make Any pendrive bootable:

1. Download The ISO Of operating system that you want to install.
you can find all Operating system's ISO From here: Downloads | FreeOS, free operating systems .
2. After Downloading the iso you have to donwload the USB Bootable Creator software. There are so many softwares available that can do this but few are the best,like: 

  1. Rufus
  2. Universal USB Installer
  3. Windows Bootable Image Creator
Download any one of them, but *Rufus* is Best ... :)

3.
             Attach you Pendrive To the USB port.
4. Install The Software you have downloaded to create your USB Bootable.(*Rufus and Universal USB Installer* Donot get installed on Your system.)
5.
                 Then Run the program As Admin.
6.For Example If You are using RUFUS:
After that above window will pops up and do the following things:

1. Firstly Check Your USB device was Shown there.
2. Check the properties shown on that window.
3. Check the Format Options Present in there.
4. Select Quick Format option.
(*Quick Format option will Delete all things present on your USB Disk*).
5.  After that select the Disk Type Button to select the ISO File that you have already downloaded.
6. Browse that file on your hard drive and select that file. Like this:

 
7. After that Click on Start Button. It will start the Boot Creating process.
8. After all Things Get done click on Close... :)

NOW Your USB DISK was Bootable and ready to use and ready to install the Operating system on any Computer.*if it was Compatible to install on that machine*

Thank you for your time and thank you for reading this..

#DeMoX.

windows review

windows review






                           

                                                              ##Thank you for reading ##
                                                              for any queries  do comment .
                                                                           @vin_sin

Friday, 9 January 2015

phishing : how to identify it

  HOW  TO  BE  SAFE  FROM
 PHISHING ATTACK


      If you face any page that makes your eye believe , but not the mind regarding its   ORIGINALITY. Then it would be better to confirm it .
       3 sensitive efforts can keep the person away from the biggest problem over the World Wide             Web (www) .
      

                          THINK  and ANALYSE  before you  RESPOND

  


    Things Over Which You can Run Your Eyes Are >>

                               * URL / LINK             * ICON_IMAGE           *  PAGE_LOOK


       ALWAYS REMEMBER ..AFFILATED WEBSITES Never  Ask For The  PERSONAL CONFIDENTIAL untill and unless the user visit them for using their services.


                 <<<Thank-you for reading>>>
                @vin_sin

Thursday, 8 January 2015

Intro To Session Hijacking/Cookie Stealing

Session Hijacking/Cookie Stealing

Session Hijacking is a way to get access on someones account by stealing the cookies exchanged while the last session or while the session is on. Session hijacking is very common now but it is not that tough if you know how to do it correctly. In this article i will only tell you what happen on session hijacking and what type of Softwares are required for this process...Most of them will be free and will be available for the number of Platforms...and also i will provide you the download links...so enjoy....  :) 

Every time we visit to any site and log in into that site. At that time our confidential information was sent in the form of COOKIES, and in the Session Hijacking or Cookie Stealing we steal that cookie and hijack that session.... Simple to understand But not That simple to do that . 
Ok its time to introduce you with the tools that will help u to steal cookies.. :-
  1.   
    Wiresheep 

    Wireshark (For PC)

  2.  
    Firesheep 
    Firesheep (For PC)

  3.  
    Droidsheep 

     DroidSheep (For Androids)

  4.  
    FaceNiff 

     

     FaceNiff (For android)

  5.  
    CookieCatcher 

    CookieCatcher (for PC)


    Thats all These Softwares will help you..... To know how they Work Read the Another Article That will Help you to know How to Do Session Hijacking.. :D

    Thank u For Reading the post...

    #DeMOx..



Increase RAM in just 7 steps

HOW TO USE YOUR PEN-DRIVE AS A RAM   

Hello guys Today i will tell you how to extend your RAM Without  opening its body or all that mechanical stuff.. To do that we require a Pen drive/ Removable disk..and perform these steps:-

STEP 1 :-  OPEN MY COMPUTERS.

STEP 2 :-  RIGHT CLICK ON THE PEN-DRIVE.



STEP 3 :-  CLICK ON THE READY BOOST MENU.

STEP 4 :-  CLICK on the USE THIS DEVICE Check Button.


STEP 5 :- CLICK  OK ..  Following screen will appear. 


STEP 6 :-  Your Pendrive seems to be occupied.



STEP 7 :- In order to REMOVE PEN-DRIVE.  

                  CLICK ON THE DO NOT USE  Check Button.


                    

 DIRECT REMOVAL OF PEN DRIVE MAY LEAD TO CRASH OF         WINDOWS. 

                                                           #Vin_Sin
                                                   

Wednesday, 7 January 2015

phishing attack

phishing attack

                                PHISHING ATTACK  

Phishing is the attempt to           acquire sensitive information by sending the           fake pages to the users.These pages looks exactly the real ones but responds in a different manner.They may ask for the user details like username,password,bank related informations and if entered by the user then all the informations are send to that Hacker. Other than that , phishing emails may contain link to harmful viruses which could crass the system . Mainly phishing travels through bulk emails,popups,spoofing etc.
   HOW TO BE SAFE.. Their are various ways to keep your self safe from phishing attack but only 5 steps can keep you away from this.
 1.  Never click on any unknown email , website or pop-ups.
 2.  Keep your Antivirus up-to-date.
 3.  Activate add-blocker.
 4. Make a habit of browsing in incognito mode.
     incognito browsing can be activated by  ctrl+shift+N (google crome)   clrl+shift+p (firefox).
 5. Enter URL in the url-bar inspire of visiting the website through any unknown          link your webpage.

 *****enjoy safe browsing*****

    for any query do-write in comment. we will feel happy and try our best for your satisfaction.

laptops

what all features to be checked while purchasing a pc or laptop.
  
 Following things can be put on consideration. 
  
1. Look for Condition and Model ( if opting for a NOT NEW  pc ).
2. Go for the RAM and HARDISK  check.
3. Check the Processor OR simply type DxDiag at the search bar present in the start bar.
4. check it all and if u want to save it u can simply click on save all information button...
5.  you are done.
  

     DxDiag will  display all the features of the computer... u can check it out and u can also save it..




   
                                                                 thank u..

Filter Bypass

  4 Ways to Bypass Filtering Internet Censorship

These days every big institute,schools,universities etc.. Every one is using Educational Filters that do not allow students to download and surf websites that are not useful for them...every time they use net and try to access the unauthorised or banned sites they get an Error message. For example: we try to open a video in YouTube.but filter will not allow us to do that... so we will get this message..
So to over come these things Students can do Following Things:

1. Use Proxies/FilterBypass Services.

2. Use VPN.

3. Use TOR Browser.

4. Use DNS Server.

1. Use FilterBypass Service: To use These services we can simple go to on FilterBypass - Anonymous Web Proxy.. You can simply click on that link use add your links you want to visit and then hit SURF button.. It will Take You to that WebSite Annonymously and filter will not be able to track you...

2. Use VPN(Virtual Private Network): To use VPN services we can use Softwares as well as we can create our own VPN.VPN software lets you join private networks as though you're sitting at a local computer on that network, giving you access to shared folders and tons more handy stuff. Here's a look at five of the most popular VPN tools. 
Here are the list of Various VPN Softwares Which are available for various Platforms and they are free also:

OpenVPN (Windows/Mac/Linux, Free)

Cisco VPN (Windows/Mac/Linux, Variable Cost).

LogMeIn Hamachi (Windows/Mac/Linux, Free).

Shrew Soft (Windows/Linux, Free).


Windows Built-In VPN (Windows, Free):

Windows has a built-in VPN client. Surprised? Many people are. It's not a heavily advertised feature, but it covers many people's needs. Before exploring other client solutions, it's worth pulling up the quick launch box in the Windows start menu and typing "VPN" to start the configuration process. In Windows versions prior to Windows Vista, the built-in VPN client received a fair amount of criticism for lacking features and supported protocols. Since Vista and especially in the Windows 7 implementation, it's grown significantly and unless you need a feature or standard that isn't implemented you may not need to install anything at all.

 
3. Use DNS Server:

This method is the least likely to work, but it’s worth covering here. Some Internet service providers have implemented filtering by changing their DNS servers to redirect requests for the blocked websites to another website.
Assuming the filtering is just at the DNS level and requests to other DNS servers aren’t being blocked, you can get around the filtering by setting a custom DNS server on your device. This overrides and bypasses the default DNS server controlled by your Internet service provider or the organization running the network. Use something like Google Public DNS and you’ll know no DNS-level filtering is taking place.
That's all ..... These are the mostly used ways to bypass the Educational Filters.....
Thank u....

Tuesday, 6 January 2015

Bill Gates Video

DOS Attack

DOS Attack

DOS Attacks or Denial Of Services Attack have become very common amongst Hackers who use them as a path to fame and respect in the underground groups of the Internet. Denial of Service Attacks basically means denying valid Internet and Network users from using the services of the target network or server. It basically means, launching an attack, which will temporarily make the services, offered by the Network unusable by legitimate users.
In others words one can describe a DOS attack, saying that a DOS attack is one in which you clog up so much memory on the target system that it cannot serve legitimate users. Or you send the target system data packets, which cannot be handled by it and thus causes it to either crash, reboot or more commonly deny services to legitimate users.
DOS Attacks are of the following different types-:
1.  Those that exploit vulnerabilities in the TCP/IP protocols suite. 
2.  Those that exploit vulnerabilities in the Ipv4 implementation.        
3     There are also some brute force attacks, which try to use up all resources of the target system and make the services unusable.
Before I go on with DOS attacks, let me explain some vulnerabilities in TCP/IP itself. Some common vulnerabilities are Ping of Death, Teardrop, SYN attacks and Land Attacks.
Ping of Death
This vulnerability is quite well known and was earlier commonly used to hang remote systems (or even force them to reboot) so that no users can use its services. This exploit no longer works, as almost all system administrators would have upgraded their systems making them safe from such attacks.
In this attack, the target system is pinged with a data packet that exceeds the maximum bytes allowed by TCP/IP, which is 65 536. This would have almost always caused the remote system to hang, reboot or crash. This DOS attack could be carried out even through the command line, in the following manner:
The following Ping command creates a giant datagram of the size 65540 for Ping. It might hang the victim's computer:
C:\windows>ping -l 65540

Teardrop:

The Teardrop attack exploits the vulnerability present in the reassembling of data packets. Whenever data is being sent over the Internet, it is broken down into smaller fragments at the source system and put together at the destination system. Say you need to send 4000 bytes of data from one system to the other, then not all of the 4000 bytes is sent at one go. This entire chunk of data is first broken down into smaller parts and divided into a number ofpackets, with each packet carrying a specified range of data. For Example, say 4000 bytes is divided into 3 packets, then:
The first Packet will carry data from 1 byte to 1500 bytes The second Packet will carry data from 1501 bytes to 3000 bytes The third packet will carry data from 3001 bytes to 4000 bytes
These packets have an OFFSET field in their TCP header part. This Offset field specifies from which byte to which byte does that particular data packet carries data or the range of data that it is carrying. This along with the sequence numbers helps the destination system to reassemble the data packets in the correct order.  Now in this attack, a series of data packets are sent to the target system with overlapping Offset field values. As a result, the target system is not able to reassemble the packets and is forced to crash, hang or reboot.
Say for example, consider the following scenario-: 
(Note: _ _ _ = 1 Data Packet)
Normally a system receives data packets in the following form, with no overlapping Offset values.
          _ _ _                                                  _ _ _                               _ _ _ 
(1 to 1500 bytes)                             (1501 to 3000 bytes)              (3001 to 4500 bytes)
 
Now in a Teardrop attack, the data packets are sent to the target computer in the following format:
        _ _ _                                                  _ _ _                                       _ _ _ 

(1 to 1500 bytes)                             (1500 to 3000 bytes)              (1001 to 3600 bytes)
 
When the target system receives something like the above, it simply cannot handle it and will crash or hang or reboot.

SYN Attack:

The SYN attack exploits TCP/IP's three-way handshake. Thus in order to understand as to how SYN Attacks work, you need to first know how TCP/IP establishes a connection between two systems. Whenever a client wants to establish a connection with a host, then three steps take place. These three steps are referred to as the three-way handshake.
 In a normal three way handshake, what happens is that, the client sends a SYN packet to the host, the host replies to this packet with a SYN ACK packet. Then the client responds with a ACK (Acknowledgement) packet. This will be clearer after the following depiction of these steps-: 

1.  Client --------SYN Packet--------------  Host
 
In the first step the client sends a SYN packet to the host, with whom it wants to establish a three-way connection. The SYN packet requests the remote system for a connection. It also contains the Initial Sequence Number or ISN of the client, which is needed by the host to put back the fragmented data in the correct sequence.
 
2.  Host -------------SYN/ACK Packet----------  Client
 
In the second step, the host replies to the client with a SYN/ACK packet. This packet acknowledges the SYN packet sent by the client and sends the client its own ISN. 

3.  Client --------------ACK-----------------------  Host 
 
In the last step the client acknowledges the SYN/ACK packet sent by the host by replying with a ACK packet. 
These three steps together are known as the 3-way handshake and only when they are completed is a complete TCP/ IP connection established.
In a SYN attack, several SYN packets are sent to the server but all these SYN packets have a bad source IP Address. When the target system receives these SYN Packets with Bad IP Addresses, it tries to respond to each one of them with a SYN ACK packet. Now the target system waits for an ACK message to come from the bad IP address. However, as the bad IP does not actually exist, the target system never actually receives the ACK packet. It thus queues up all these requests until it receives an ACK message. The requests are not removed unless and until, the remote target system gets an ACK message. Hence these requests take up or occupy valuable resources of the target machine. 
To actually affect the target system, a large number of SYN bad IP packets have to be sent. As these packets have a Bad Source IP, they queue up, use up resources and memory or the target system and eventually crash, hang or reboot the system. 

Land Attacks

A Land attack is similar to a SYN attack, the only difference being that instead of a bad IP Address, the IP address of the target system itself is used. This creates an infinite loop between the target system and the target system itself. However, almost all systems have filters or firewalls against such attacks.

Smurf Attacks

A Smurf attack is a sort of Brute Force DOS Attack, in which a huge number of Ping Requests are sent to a system (normally the router) in the Target Network, using Spoofed IP Addresses from within the target network. As and when the router gets a PING message, it will route it or echo it back, in turn flooding the Network with Packets, and jamming the traffic. If there are a large number of nodes, hosts etc in the Network, then it can easily clog the entire network and prevent any use of the services provided by it.
 
Read more about the Smurf Attacks at CERT: http://www.cert.org/advisories/CA-98.01.smurf.html
 

UDP Flooding

This kind of flooding is done against two target systems and can be used to stop the services offered by any of the two systems. Both of the target systems are connected to each other, one generating a series of characters for each packet received or in other words, requesting UDP character generating service while the other system, echoes all characters it receives. This creates an infinite non-stopping loop between the two systems, making them useless for any data exchange or service provision.
 
Distributed DOS Attacks   
DOS attacks are not new; in fact they have been around for a long time. However there has been a recent wave of Distributed Denial of Services attacks which pose a great threat to Security and are on the verge of overtaking Viruses/Trojans to become the deadliest threat to Internet Security. Now you see, in almost all of the above TCP/IP vulnerabilities, which are being exploited by hackers, there is a huge chance of the target's system administrator or the authorities tracing the attacks and getting hold of the attacker. 
Now what is commonly being done is, say a group of 5 Hackers join and decide to bring a Fortune 500 company's server down. Now each one of them breaks into a smaller less protected network and takes over it. So now they have 5 networks and supposing there are around 20 systems in each network, it gives these Hackers, around 100 systems in all to attack from. So they sitting on there home computer, connect to the hacked less protected Network, install a Denial of Service Tool on these hacked networks and using these hacked systems in the various networks launch Attacks on the actual Fortune 500 Company. This makes the hackers less easy to detect and helps them to do what they wanted to do without getting caught. As they have full control over the smaller less protected network they can easily remove all traces before the authorities get there.
Not even a single system connected to the Internet is safe from such DDOS attacks. All platforms Including Unix, Windows NT are vulnerable to such attacks. Even MacOS has not been spared, as some of them are being used to conduct such DDOS attacks. 
With this we come to the end of the first edition of DOS Attacked!!! Hope you liked this manual. This manual was an excerpt from the DOS attacked Tutorial, which was written exclusively for the HT Club. If you too are interested in receiving such manuals in the future, simply join the HT Club. On this note this is Ankit Fadia saying goodbye. :) 

ADAPT---------IMPROVISE--------OVERCOME