Monday, March 27, 2017

How to Hide a File in an Image

Create a new folder anywhere in your system.  For example :- D:\new folder



Select files you want to hide and get them zipped WinRar. Click on "Add to archive"
this file be called 'zzz.rar'.



Select an image file like '344.jpg' in which you want to hide your 'zzz.rar'.

Open command prompt (press windows key Hold +R 'as n Rita' hit ENTER key and type : CMD ;).



navigate to the folder where you placed both '344.jpg' & 'zzz.rar' files.
type in cmd " D:\newfolder3 "



Following command in command prompt. " copy /b 344.jpg + zzz.rar  SrkhanS.jpg."



Simply right-click " SrkhanS.jpg' and select 'open with winrar'. You can (send the file) see 'SrkhanS.jpg'



just unzip it and here your all files are.............

Sunday, March 26, 2017

Hacking Tools

A hacking tool is a program designed to assist with hacking, or a piece of software which can be used for hacking purposes and save hackers time.Best Hacking Tools Of 2017 For Windows, Linux, And OS X


Metasploit :- 


 Metasploit is available for all major platforms including Windows, Linux, and OS X. Rather than calling Metasploit a collection of exploit tools,
I’ll call it an infrastructure that you can utilize to build your custom tools.This free tool is one of the most popular cyber security tools around that allows you to locate vulnerabilities at different platforms.


Acunetix WVS :- 


 Acunetix is available for all version Windows. Acunetix is a web vulnerability scanner (WVS) that scans and finds out the flaws in a website that could prove fatal.
This multi-threaded tool crawls a website and finds out malicious Cross-site Scripting,SQL injection, and other vulnerabilities.


Nmap :- 


Nmap is available for Windows, Linux, and OS X.I think everyone has heard of this one, Nmap (Network Mapper) is a free open source utility for network exploration or security auditing. It was designed to Nmap rapidly scan large networks, although it works fine against single hosts.


Wireshark :- 



Wireshark is a free and open source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education. Originally named Ethereal, the project was renamed Wireshark in May 2006 due to trademark issues. Wireshark lets the user put network interface controllers that support promiscuous mode into that mode, so they can see all traffic visible on that interface, not just traffic addressed to one of the interface's configured addresses and broadcast/multicast traffic.


Social-Engineer Toolkit :- 



The Social-Engineer Toolkit (SET) was created and written by the founder of Trusted Sec. It is an open-source Python-driven tool aimed at penetration testing around Social-Engineering. SET has been presented at large-scale conferences including Black-hat, DerbyCon, Defcon, and ShmooCon.there are different types of social engineering techniques and tools, some of which are really the best in the business. Before staging a social engineering attack, information gathering is a critical step. Without proper information about the company, employees or target, a successful attack is unlikely.


Netsparker :-



Netsparker is a web application security scanner, with support for both detection and exploitation of vulnerabilities. It aims to be false positive–free by only reporting confirmed vulnerabilities after successfully exploiting or otherwise testing them.netsparker finds and reports web application vulnerabilities such as SQL Injection and Cross-site Scripting (XSS) on all types of web applications, regardless of the platform and technology they are built with. Netsparker unique and dead accurate Proof-Based scanning technology does not just report vulnerabilities, it also produces a Proof of Concept to confirm they are not false positives.

Wednesday, March 22, 2017

DOS Attack's

What is DOS ?

The term DOS can refer to any operating system, but it is most often used as a shorthand for MS-DOS (Microsoft disk operating system). Originally developed by Microsoft for IBM, MS-DOS was the standard operating system for IBM-compatible personal computers.




All MS-DOS-type operating systems run on machines with the Intel x86 or compatible CPU's, mainly the IBM PC and compatibles. Machine-dependent versions of MS-DOS were produced for many non-IBM-compatible x86-based machines, with variations from relabeling of the Microsoft distribution under the manufacturer's name, to versions specifically designed to work with non-IBM-PC-compatible hardware. For as long as application programs used DOS APIs instead of direct hardware access, they could thereby also run on non-IBM-PC compatible machines.

Attack's :
  1. HTTP POST DOS attack :- The HTTP POST attack sends a complete, legitimate HTTP POST header, which includes a 'Content-Length' field to specify the size of the message body to follow. It is notable that unlike many other DOS attacks, which try to subdue the server by overloading its network or CPU, a HTTP POST attack targets the logical resources of the victim, which means the victim would still have enough network bandwidth and processing power to operate.
  2. Peer-to-peer attacks :- Attackers have found a way to exploit a number of bugs in peer-to-peer servers to initiate D Dos attacks.                                                                                                                               While peer-to-peer attacks are easy to identify with signatures, the large number of IP addresses that need to be blocked (often over 250,000 during the course of a large-scale attack) means that this type of attack can overwhelm mitigation defenses.
  3. Slow Read attack :- Slow Read attack sends legitimate application layer requests but reads responses very slowly, thus trying to exhaust the server's connection pool. Slow reading is achieved by advertising a very small number for the TCP Receive Window size and at the same time by emptying clients' TCP receive buffer slowly. That naturally ensures a very low data flow rate.
  4. Ping of death :- DOS attack in which the attacker sends a ping request that is larger than 65,536 bytes, which is the maximum size that IP allows.  Ping of death attacks are rare today as most operating systems have been fixed to prevent this type of attack from occurring.

Email hacking

Do U Think If Email Can Not Been Hackable, Then You Are Wrong
Email-ID Can Be Hacked… But Its Can Be Hack Only Fault by User.. Most Of The Peoples Think That Their Has A Software to Hack A Email- ID’s But Truth Is There Is No Software Present For Hacking E-Mail.


Email Hacking can be possible to many ways :-

  • By Keyloggers
  • Cookie Hijacking
  • Social Engineering
  • Phishing Attacks
  1. Keylogger :- Keylogger is a software program or hardware device that is used to monitor and log each of the keys a user types into a computer keyboard. The user who installed the program or hardware device can then view all keys typed in by that user. Keyloggers, as a surveillance tool, are often used by employers to ensure employees use work computers for business purposes only. Unfortunately, keyloggers can also be embedded in spyware allowing your information to be transmitted to an unknown third party.
  2. Cookie Hijacking:- In cookie hijacking we can hack email accounts very easily.. This trick is very dangerous because whenever user change a password then there is no need to attacker for again hack Email- ID of victim. And it would take you to inbox of victim’s yahoo account without asking for any password of victim account.
  3. Social Engineering :- This has become one of the hottest topics today and it seems to work out most of the times. Social Engineering doesn’t deal with the network security issues, vulnerabilities, exploits, etc. It just deals with simple Psychological tricks that help to get the information we want.We are all talking about network security and fixing the vulnerabilities in networks.But what happens if some internal person of a network accidentally gives out the passwords. 
  4. Phishing Attack :- The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organisation already has. 

U Can Hack Yahoo Account by Cookies Stealing or Hijacking From Browser.

Follow Steps and Learn it.
Enjoy ................. 

Virus Type's

What is a Computer Virus ?

A computer virus, much like a "flu virus", is designed to spread from host to host and has the ability to replicate itself. 
A potentially damaging computer programme capable of reproducing itself causing great harm to files or other programs without permission or knowledge of the user.
Similarly, in the same way that viruses cannot reproduce without a host cell, computer viruses cannot reproduce and spread without programming such as a file or document.



A computer virus is a type of malicious software program ("malware") that, when executed, replicates by reproducing itself or infecting other computer programs by modifying them.Infecting computer programs can include as well, data files, or the "boot" sector of the hard drive. When this replication succeeds, the affected areas are then said to be "infected" with a computer virus.The term "virus" is also commonly, but erroneously, used to refer to other types of malware. "Malware" encompasses computer viruses along with many other forms of malicious software, such as computer "worms", ransomware, Trojan horses, key loggers, rootkits, spyware, adware, malicious Browser Helper Object and other malicious software.


Virus – A program that when run, has the ability to self-replicate by infecting other programs and files on your computer. These programs can have many effects ranging from wiping your hard drive, displaying a joke in a small box, or doing nothing at all except to replicate itself. These types of infections tend to be localized to your computer and not have the ability to spread to another computer on their own. The word virus has incorrectly become a general term that encompasses Trojans, worms, and viruses.

Types of viruses :-

  1. Boot Sector :-This type of virus affects the boot sector of a floppy or hard disk.this is a crucial part of a disk, in which information on the disk itself is stored together with a program that makes it possible to boot (start) the computer from the disk.boot sector viruses infect either the master boot record of the hard disk or the floppy drive.
  2. File or Program :- when executed, load the virus in the memory and perform predefined functions to infect the system. They infect program files with extensions like .exe, .com, .bin, .drv and .sys. and may more program.
  3. Stealth Viruses :- They sometimes remove themselves from the memory temporarily to avoid detection by antivirus. They are somewhat difficult to detect. When an antivirus program tries to detect the virus, the stealth virus feeds the antivirus program a clean image of the file or boot sector.
  4. Macro Viruses :- A macro virus is a computer virus that “infects” a Microsoft Word or similar application and causes a sequence of actions to be performed automatically when the application is started or something else triggers it. Macro viruses tend to be surprising but relatively harmless.A macro virus is often spread as an e-mail virus. Well-known examples are Concept Virus and Melissa Worm.
  5. Malware :- Malware is programming or files that are developed for the purpose of doing harm. Thus, malware includes computer viruses, worms, Trojan horses, spyware, hijackers, and certain type of adware Worm.
  6. Adware :– A program that generates popups on your computer or displays advertisements. It is important to note that not all adware programs are necessarily considered malware.
  7. Trojan :– A program that has been designed to appear innocent but has been intentionally designed to cause some malicious activity or to provide a backdoor to your system.
  8. Worm :– A program that when run, has the ability to spread to other computers on its own using either mass-mailing techniques to email addresses found on your computer or by using the Internet to infect a remote computer using known security holes.