Archive for September 2014
There are a lot of tools with which we can crack any OS password. Kon-Boot is one of the best tools with which you can log in into Windows without password. It works by entering into the system BIOS and temporarily changing the contents of the Windows kernel while booting. It then allows you to enter anything (or You can leave it blank) as the password during login. The next time you start the computer without Kon-Boot, the original password will be back, the temporary changes will be discarded and the system will behave as if nothing has happened.
And the technique can be taken as a remedy for forgotten password.
With the help of kon boot U can login into any OS without knowing the actual password. Kon boot simply byepass the password by entering into the system BIOS and temporarily changing the contents of the Windows kernel while booting and then we can access that computer.
To install and boot with kon boot just follow the given steps::-
Step 1 : Extract the downloaded file anywhere on your system.
Step 2 : Now only insert a USB drive for Konboot (deattach all other USB drives ).
Step 3 : In extracted files, find a file with name KonBootInstall.
Step 4: Open this file as Run as administrator.
Step 5 : Select the drive and chose Install to USB stick (with EFI support).
Step 6 : while the process finishes and after this your USB stick is ready.
Step 7 : Now Boot from this USB stick.
Step 8 : After booting with this device, You will see the login screen as usual with a password
Step 9 : Type anything there or leave blank and Just hit enter. And it's done.
Advantages of Rooting AndroidAdvantages of Rooting Android : These days android rooting is becoming a trend which every android user wants to follow but always has a sense of fear. Well rooting is important for the users because they love having the authority to customize their phone to the fullest and many other benefits. Rooting an Android Phone also gives a user faster performance with its device and also enables him to install custom ROMs.
Firstly you should know what is Android rooting?
Android rooting is the process of allowing users of Smartphone’s, tablets, and other devices running the Android mobile operating system to get the full control and authority within subsystem. When you root an Android phone it enables you to act as the administrator of the phone. Android rooting provides you the facility to completely remove and replace your device’s operating system, usually with a more recent release of its current operating system for example from ICS to JellyBean Though the rooting is very popular these days but many Android users are completely unaware how to root their Smartphone’s and tablets. Before, Rooting an device was cumbersome task and moreover rooting also removed the manufacturer’s warranty from the device. As a result, many users were frightened away from rooting their Android. But today users can root their devices in minutes. Thanks to new rooting software programs; any user can root the device easily and quickly.
- Plenty of Apps.
- Speed /Battery life Boosts.
- A Free Wi-Fi Hotspot.
- Better Backup.
- Latest Operating System (OS)Updates.
- Infinite Features.
- Increases Performance.
- Access Blocked Features.
- Install Custom ROM’s.
- Full control over your system.
Wednesday, 24 September 2014
Posted by Unknown
Android Hacking Tricks: Today, The best android hacking apps or Download Best Android Hacking Apps. As we all know hacking and pen testing is only can be done on computers. But now the world is changing now your mobile is small hacking toolkit using these apps.
Apart from the normal mobile user, techie guys also like their flexible feature that allows them to do various new tasks. As with this its security concerns also headed up. Recently we have noted that many of the cyber hackers are targeting Android users. There are many techie guys have also unrestricted the features that are restricted by its owners, Google. So I think the below words are familiar to them but many of them have not been aware. Here I am discussing some of the Apps that are meant for the Security tester, Ethical hacker and for those guys who really explore the tech world.
Best Android Hacking Apps
Let’s see 12 Android Hacking Apps that are meant for hacking, hackers, security researchers;
Hackode : The hacker’s Toolbox is an application for penetration tester, Ethical hackers, IT administrator and Cyber security professional to perform different tasks like reconnaissance, scanning performing exploits etc.
Remote Administration Tool for Android. Androrat is a client/server application developed in Java Android for the client side and in Java/Swing for the Server.
APKinspector is a powerful GUI tool for analysts to analyze the Android applications. The goal of this project is to aide analysts and reverse engineers to visualize compiled Android packages and their corresponding DEX code.
Droid Box is developed to offer dynamic analysis of Android applications.
5) Burp Suite
Burp Suite is an integrated platform for performing security testing of web applications. Its various tools work seamlessly together to support the entire testing process, from initial mapping and analysis of an application’s attack surface, through to finding and exploiting security vulnerabilities.
zANTI is a comprehensive network diagnostics toolkit that enables complex audits and penetration tests at the push of a button. It provides cloud-based reporting that walks you through simple guidelines to ensure network safety.
7) Droid Sheep
Droid Sheep can be easily used by anybody who has an Android device and only the provider of the web service can protect the users. So Anybody can test the security of his account by himself and can decide whether to keep on using the web service.
DSploit is an Android network analysis and penetration suite which aims to offer to IT security experts/geeks the most complete and advanced professional toolkit to perform network security assessments on a mobile device.
Android Pen test Platform Unified Standalone Environment:- AppSec Labs recently developed the AppUse Virtual Machine. This system is a unique, free, platform for mobile application security testing in the android environment, and it includes unique custom-made tools created by AppSec Labs.
10) Shark for Root
Traffic sniffer, works on 3G and Wi-Fi (works on FroYo tethered mode too). To open dump use Wireshark or similar software, for preview dump on phone use Shark Reader. Based on tcpdump.
11) Nmap for Android
Nmap (network mapper) is one the best among different network scanner (port finder) tool, Nmap mainly developed for Unix OS but now it is available on Windows and Android as well. Nmap for android is a Nmap apps for your phone! Once your scan finishes you can e-mail the results. This application is not a official apps but it looks good.
Android Secure Shell: Secure shell or SSH is the best protocol that provides an extra layer of security while you are connecting with your remote machine.SSHDroid is a SSH server implementation for Android. This application will let you to connect to your device from a PC and execute commands (like “terminal” and “adb shell”).
In this way you able to Download Best Android Hacking Apps or best android tools for hacking, As we all know hacking and pen testing is only can be done on computers. But now the world is changing now your mobile is small hacking toolkit using these apps.
Why Hackers Choose Linux ? However, in terms of hacking, programming or any other related Geeky stuffs, Linux is at the top a good overview with this is because Linux use is growing at an amazing rate. This operating system, which has no public relations department, advertising, or government lobby, is being used widely in homes and server rooms alike. It’s also free, and 100% open source, meaning anyone can look at each and every line of code in the Linux kernel.
Linux is a true multiuser operating system, and has been since the very first version. It is powerful in it’s simplicity. Linux use is growing at an amazing rate. This operating system, which has no public relations department, advertising, or government lobby, is being used widely in homes and server rooms alike. It’s also free, and 100% open source, meaning anyone can look at each and every line of code in the Linux kernel. Linux is a true multiuser operating system, and has been since the very first version. It is powerful in it’s simplicity. Though there are robust graphical environments and tools, you can still do everything you could possibly need with just a keyboard and a shell prompt. Since you have the code, you could even make Linux do things it was never meant to. That’s one of the things that draws both the gurus and the attackers alike. When deciding on an operating system to cover in depth, we had a variety to choose from: Windows 95/98/NT/2000/ME/etc, MacOS, OpenBSD, NetBSD, FreeBSD, Solaris, HPUX, AIX, IRIX, and many others. So how did Linux win our favor?
· It’s use is on the rise.
· It’s an Open Source operating system.
· It’s available to everyone at a great price — free.
· It comes in many flavors (aka distributions.)
· It is too commonly broken into due to out of date packages, poor system configuration, and its ubiquity.
· Hackers use Linux.
· We feel that Linux can be secured.
The power and flexibility of Linux makes it the hacker’s playground. They use it, learn it, and understand it intimately. And that means that if there’s an insecurity, they’re going to find it. The black-hats have thronged to Linux. It allows them the control they require to do strange and ingenious things. If they want to experiment with new or invalid network packets, they can do so easily without relying on undocumented (or non-existant) API support from the vendor. Millions of lines of code have been written for Linux applications and libraries, usually in an extremely modular manner, which allows it to be integrated into widely diverse projects. For example a library that allows you to sniff the network for proactive performance monitoring could be used as part of network hijacking code. The power and flexibility of Linux makes it the hacker’s playground. They use it, learn it, and understand it intimately. And that means that if there’s an insecurity, they’re going to find it. However the very reasons the hackers like Linux are the same reasons more folks are installing it on their own systems today. The ability to look at each and every line of Linux code, and patch it when problems arise, means that Linux can be secured not just by a few programmers locked away in some corporate headquarters, but by any user at any time. However the very reasons the hackers always like Linux are the same reasons more folks are installing it on their own systems today. The ability to look at each and every line of Linux code, and patch it when problems arise, means that Linux can be secured not just by a few programmers locked away in some corporate headquarters, but by any user at any time.
Wednesday, 3 September 2014
Posted by Unknown
The difference between hacking and cracking : Hacking, and cracking. Two different forms of Internet and computer related privacy and copyright breaches, usually malicious. I’ll be discussing the differences between hacking, and cracking. They are two completely different things, but people usually get confused between the two, they both end with a similar sound, or ‘acking’ (that’s probably why!) and they’re both malicious forms of cyber activity.
Let’s start off by explaining what the words mean, in computer vocabulary – that is. Hacking, is the act of stealing personal or private data, without the owner’s knowledge or consent, it could also include other things like stealing passwords, creating a bot net, or pretty much any act that breaches someone’s privacy, without their knowledge, or consent.
Now, on to cracking. Cracking is where edit a program’s source code, or you could create a program, like a key generator (more commonly known as a ‘keygen’), patch, or some sort of application that tricks an application in to thinking that a particular process has occurred. For example, a key generator and a patch for the Adobe Master Collection would trick the software in to thinking that the key entered is correct, and not let it verify the key with the Adobe master server. Cracking is pretty much looking for a back door in software, and exploiting it for malicious use or for a copyright breaching act.
The difference (if you have not noticed it yet) is that a hacker is someone that uses their extensive knowledge of computer logic and code for malicious purposes, while a cracker – looks for back doors in programs, and exploits those back doors. Cracking is generally less harmful than hacking. Hackers are usually involved with web related hacking, like MySQL interception, or phishing, other forms of hacking would include things like brute force, or password lifting.
Well, the difference is simple. One is more malicious than the other, crackers usually have an extensive knowledge in code related to Python and .NET (Visual Basic, C, C++, C#) and Objective C (Mac), while hackers are fluent in different forms of web code, like PHP, MySQL, Java Script , Ajax, and HTML and CSS. I hope, after reading this, we all have got what the difference between hacking, and cracking are. Basically, it’s just what they do, that’s the difference.
Monday, 1 September 2014
Posted by Unknown