DEVIL'S BLOG ON SECURITY


A DEVIL'S BLOG ON COMPUTER AND INFORMATION SECURITY, ETHICAL HACKING AND COUNTERMEASURES


Learn Ethical Hacking | Learn Hacking Online | Learn How To Hack|Hack Counter Hack| Ethical Hacking Tutorials


Home   ||   See All Tutorials  ||   Products  ||   About This Blog   ||  Subscribe To RSS Feed



Join facebook group THE HACKER DEVIL


Head First HTML

Head First HTML


If you are novice hacker or even if you are new to programming and want to know from where to start your journey to programming then I must tell you most seasoned as well as new programmers will agree to start with HTML. HTML can not be really considered as programming language but still its always better to start with something that's easy and mostly used. As a first time programming student many people get horrified with variables, commands, symbols, scripts etc. Head First HTML is designed to tackle all those problems and make learning enjoyable

Create Telnet Trojan For Windows Xp

Create Telnet Trojan For Windows Xp


Following batch script will act as Telnet Trojan to any windows XP system, the best part of it is it's fully undetectable to all ant-virus programs. Copy following lines in notepad and save with any name with .bat extension for example Trojan.bat.

Packet Sniffers/Network Packet Sniffers

Packet Sniffers/Network Packet Sniffers


Packet sniffer, network packet sniffer or simply sniffers are programs or devices that can monitor data traveling over a network. They usually work by capturing packets from Data Link Layer(read OSI model for more information) and hence called as packet sniffers. They can be used for legitimate as well as illegitimate activities. Legitimate activities include network traffic monitoring and administration where as illegitimate activities may include stealing passwords,

Trojan Vectoring Using One EXE Maker

Trojan Vectoring Using One EXE Maker


One EXE maker is file wrapping software that can be used for Trojan vectoring. It binds two or more executable files together and also provides options for running program in hidden mode or visible mode.

Netcat Tutorial | All Parts

Netcat Tutorial | All Parts


Vectoring Trojan Using Extention Hiding | False Linking/Fake Shortcut

Vectoring Trojan Using Extention Hiding | False Linking/Fake Shortcut


This is another method of vectoring Trojan by extension hiding. In fact you can hide any file's extension using this method. This method is better known as False Linking or Fake Shortcut. To use this method while creating your Trojan server using RAT client bind it with file whose extension you want to use,

Wrap Trojan Using Iexpress Wizard

Wrap Trojan Using Iexpress Wizard


As discussed earlier in Trojan Software Vector windows iexpress wizard can be used as Trojan wrapping tool. In this following tutorial I ll explain how you can create your own Trojan wrapped file and then its countermeasures. Following are requirements for this demonstration,

How To Avoid Trojan Infections

How To Avoid Trojan Infections


A Trojan infection can be avoided by the following measures:
  • Do not download any file from unknown people or site without making sure that the file is genuine.
  • While opening file make sure what the file is, even if the file comes from a friend.

Trojan Software Vector

Trojan Software Vector



Trojan software vectors or simply Trojan vectors are files that are created for spreading Trojans. Some people also call them as Trojan backdoor and virus vectors. No matter how many names you give them the real motive of Trojan vector is spreading Trojans by means of files. Here we will have a theoretical view on some of the methods and then study them one by one in upcoming posts I.e how to create and counter them. Following are some methods by which a Trojan vector is created

How To Create A Computer Virus For Windows

How To Create A Computer Virus For Windows


In this following tutorial I will demonstrate how you can create simple but effective viruses using batch scripts in windows. This is for educational purpose only. Batch scripts are nothing but commands that you type in windows command prompt. You can arrange single or multiple commands in specific order to harm system.

Convert IDM To Full Version From Trail Version

Convert IDM To Full Version From Trail Version


IDM (Internet Download Manager)is today known as world's best download manager but unfortunately it is available as paid version only. In this post today I ll show you how to convert a trail version of IDM into full version without any patch or cracker. First of all download IDM from http://www.internetdownloadmanager.com and install it on your PC.

Win An Anti-Virus

Win An Anti-Virus


Hi there last day Devil's Blog On Security Completed 20,000 hits. So I thought I must take it to another level. So here's a deal I am placing a contest for all my readers to win a BitDefender Anti-Virus 2011 rated best Anti-Virus program for 2011 by http://www.toptenantivirus.net/ . Anti-Virus will be delivered at doorsteps

Virus And Worm

Virus And Worm


Welcome to Devil's Blog On Security. In this following post we will have a little look on what are virus and worm. As told earlier viruses are considered as very first form of computing threats its necessary for a hacker to know what is difference between a virus and worm and what are different

Anti Trojans List | Remove Trojans From Your PC

Anti Trojans List | Remove Trojans From Your PC


Anti-Trojans are software that are specially designed to help you detect and protect yourself from Trojans. They can also detect presence of virus and worms but are specially crafted to remove Trojans from your system. However no Trojan Remover is 100% effective. Therefore its good to regularly update your anti-Trojan software along with anti-virus and firewall

Netcat Tutorial | Using Netcat As Backdoor

Netcat Tutorial | Using Netcat As Backdoor


In previous tutorial to netcat we saw how scan and grab banner using netcat. In this following tutorial we will use netcat as Trojan, Backdoor and file transfer wizard. So let's see some other features of netcat.

Indications That Reflect You Are Infected By Trojan

Indications That Reflect You Are Infected By Trojan


Follows are some indications that are common symptoms of getting infected with Trojan horse.

Opening and closing of CD/DVD-ROM

Netcat Beginners Tutorial

Netcat Beginners Tutorial


Netcat is utility used to write data across TCP and UDP networks. Using netcat an attacker can place backdoor that will allow him/her to telnet DOS shell. In fact netcat can be used as port scanner, banner grabbing tool, Trojan and backdoor. The power of netcat can be calculated from the fact that it can act as both server and client and even doesn't get detected by Anti-Virus and even if it gets detected its source code is available add some unnecessary code that will change its signature thus allowing it by bypass Anti-Virus. This tutorial is aimed at complete beginner to netcat.

Free Ethical Hacking Training | Learn Ethical Hacking Online Free | Learn How To Hack | Hack Counter Hack | Ethical Hacking Tutorials | Devil's Blog On Security