Showing posts with label Hackers. Show all posts
Showing posts with label Hackers. Show all posts

Saturday, 31 August 2013

Top 10 Free Hacking Tools.

If you start working with computer, you soon develop a interest in 'hacking'. So, what is basically 'hacking'? It's not just entering into another system, its a chain of processes that ultimately results in unauthorized access into one's computer or network. Yeah, it is not true. And you need special set of skills to achieve that. And for that special set skills you need a special set of tools. So now, I'm going to tell u here top 10 soft wares that will definitely help you to achieve what you dream as hacker.

1.Nmap


Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics.

2.Wireshark



Wireshark is a network protocol analyzer. It lets you capture and interactively browse the traffic running on a computer network.

3.Metasploit Community edition



Metasploit Community Edition simplifies network discovery and vulnerability verification for specific exploits, increasing the effectiveness of vulnerability scanners. This helps prioritize remediation and eliminate false positives, providing true security risk intelligence.

4.Nikto2



Nikto is an Open Source (
GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6400 potentially dangerous files/CGIs, checks for outdated versions of over 1200 servers, and version specific problems on over 270 servers. It also checks for server configuration items such as the presence of multiple index files, HTTP server options, and will attempt to identify installed web servers and software.

5.John The ripper



John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix systems, supported out of the box are Windows 
LM hashes, plus lots of other hashes and ciphers in the community-enhanced version.

6.ettercap



Ettercap is a comprehensive suite for man in the middle attacks. It features sniffing of live connections, content filtering on the fly and many other interesting tricks. It supports active and passive dissection of many protocols and includes many features for network and host analysis.

7.NexPose Community edition



The Nexpose Community Edition is a free, single-user vulnerability management solution. Nexpose Community Edition is powered by the same scan engine as Nexpose Enterprise and offers many of the same features.

8.Ncat



Ncat is a feature-packed networking utility which reads and writes data across networks from the command line. Ncat was written for the Nmap Project as a much-improved reimplementation of the venerable Netcat. It uses both TCP and UDP for communication and is designed to be a reliable back-end tool to instantly provide network connectivity to other applications and users. Ncat will not only work with IPv4 and IPv6 but provides the user with a virtually limitless number of potential uses.

9.Kismet



Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring (rfmon) mode, and (with appropriate hardware) can sniff 802.11b, 802.11a, 802.11g, and 802.11n traffic. Kismet also supports plugins which allow sniffing other media such as DECT.

10.w3af



w3af is a Web Application Attack and Audit Framework. The project’s goal is to create a framework to find and exploit web application vulnerabilities that is easy to use and extend.

Sunday, 7 July 2013

Hackers can control almost all Android phones?

Do you know that 

Hackers can control almost all Android phones?


NINETY-nine per cent of all Android devices are vulnerable to hacking or being completely taken over remotely by cyber criminals.
This is the claim of a study by BlueBox security, a mobile security company which claims it has discovered a flaw in the operating system of almost all Google phones and tablets (which runs on the operating system Android) that allows hackers to modify its code in a way that "turns any legitimate application into a malicious Trojan" virus.
The company claims this vulnerability exists on any Android phone or tablet released over the last four years, affecting approximately 900 million devices.
According to the researchers the issue is central to Google's open source operating system and so far only one device has been patched.
The way it works:
Rather than creating a malicious app, cyber criminals wait for legitimate apps to be approved for sale and then go in and modify the code after and create an exploit that allows them to take over people's phones via the app.
This flaw would allow hackers to access your passwords, credit card information, emails, any information you store on your phone.
"The implications are huge!," Blue box wrote on its website.
"Depending on the type of application, a hacker can exploit the vulnerability for anything from data theft to creation of a mobile botnet."
So far it appears though this flaw only affects non Google apps, considering the amount of third party apps that exist in the Google store that's hardly a paltry number. There is also no evidence that this flaw has been exploited by anyone.
Google declined to comment.
The claims come less than six months after it was revealed by a Sydney developer that every time you purchase an app on Google Play, your name, address and email is passed on to the developer.
Last year antivirus company Trend Micro recorded 350,000 security threats on Android devices.
So what can I do about this?
- Do not allow apps from unkown sources. To do this go to Settings, Security and untick "allow unknown sources".
- Well, the news isn't good. Until further notice, news.com.au recommends that you don't download any non-Google apps.
- Bluebox has recommended that users update their operating system to the latest version.
- Also, if you have any apps which store your personal information such as credit card or PayPal information (like eBay, Amazon or Etsy), you should remove this information immediately. 
- Remove any personal information from your phone (do you have your credit card pin stored in your notes? Get rid of it).
Related Posts Plugin for WordPress, Blogger...