Join facebook group THE HACKER DEVIL
In this following post we will have our look on hiding URL using different URL obfuscation methods. Depending upon how obfuscation is done they are classified as,
-Host Name URL Obfuscation
-Encoded URL Obfuscation
-Cross Site URL obfuscation
Labels: URL Obfuscation
Spyware Review | Sniper Spy
Product Name: Sniper Spy
Product Type: Spyware
Category: Remote Spy
Platform: Windows and Mac
Sniper Spy is one of the most loved spy-ware used all over the world. Unlike any other spy-ware Sniper Spy have a very unique feature of live broadcast of victim's screen that means you can watch live what is going on your victim's PC. Like any other spy-ware it have all features of a basic spy-ware along with Remote Log delivery by the way this feature might not appeal you since its already a remote spy spy-ware. You can install Sniper Spy remotely on your victim's system which means you don't need any physical access to your victim.
Book Review | C A Modern Approach by K.N. King
Since long I have joined mailing list of Alex Allain, if you don't know who is Alex then I must tell you Alex maintains one of the most popular and most loved C Programming forum and mailing list which have 16k plus subscribers. That number is not a joke, at regular intervals Alex sends me some real cool programming stuffs and challenges due to which even though I am not a regular coder since last year I have managed to keep my programming skills safe from becoming total crap. If you haven't joined any mailing list for programming Alex's list is damn good to join because they don't spam you by sending unwanted emails everyday. Once they recommeneded me a book on C programming via mailing list,
In our previous posts to phishing we covered basics, tutorials and vectors about phishing and phishers. So now let’s have a look at final part that is countermeasure. Phishers have lot of methods to vector a phished page so at practical level there can't be a single solution that can help counter phishing. A phishing attack can be avoided only by a combination of awareness and use of security technologies.
A user sitting at desktop must use a complete security suite along with at least personal firewall and avoid unnecessary sophisticated communication technologies. Next every email should be validated manually for its contents, use common sense to analyze whatever is written in message.
Phishing vectors are methods used by hackers to perform a successful phishing attack. There are several methods to trick user get fooled to input credentials in phished pages and they will also evolve with time. There’s no way you can stop anyone from being creative at his/her attack style but following three are some of the most used methods used by attackers as phishing vectors,
Man In The Middle Attack:
The attack that guarantees a hacker that his victim will fall prey to his/her trap is man-in-the-middle attack
Hack Yahoo Password | Phishing
This is our third tutorial to phishing in which we will cover how to hack yahoo password. In this following tutorial to phishing I’ll demonstrate how to phish mail.yahoo.com to hack yahoo account of victim. So as every other tutorial on phishing we start it by creating fake login page. To create fake login page open mail.yahoo.com from your web browser and save it on your desktop as “Web Page, Complete” with name Yahoomail. After above process you’ll have a file named Yahoomail.htm and a folder named Yahoomail_files in folder in which you’ll save web page. Now open Yahoomail.htm in notepad, find for action word and locate following string,
Hack Gmail Account | Phishing
In this following tutorial to phishing I‘ll demonstrate how to hack Gmail account password by phishing. Since we already covered how to hack Facebook account using phishing I consider this as second tutorial to phishing. First of all we will create a fake login page, to create it open www.gmail.com in your web browser, click on file then save as and select file name “Gmail” and save as type “Web page Complete”. After above process you’ll have a file named Gmail.htm and a folder named Gmail_files in folder in which you’ll save web page. Now open Gmail.htm in notepad, find for action word and locate following string,
What Is Phishing
Here in this post we will discus a little about what is phishing. Please note what we are covering here is just basics and not a phishing tutorial. In phishing attack, an attacker creates a fake login page of a legitimate website and lures victim to login using it. The site under attack is known as phished site and the fake login page used for capturing or stealing information is known as phished page. To perform phishing attack an attacker performs following steps,
First of all he gets a free web host and then selects a domain which somehow resembles the site he wants to phish. For example to hack Gmail password he/she may select domain like Gmial. Look carefully both words appear nearly similar when just overlooked and that is where an attacker makes a catch.
DNS Poisoning Countermeasures
In following tutorial we will discuss how to keep your self safe from DNS poisoning attacks. Up till now we have covered all four different types of DNS poisoning attacks on this blog, now we will have our look on countermeasures to all of them. First of them is Intranet DNS poisoning that is a DNS poisoning attack over LAN. Since Intranet DNS poisoning attack happens due to ARP poisoning man-in-the-middle attack, all countermeasures to packet sniffing applies to LAN DNS poisoning attack i.e use of switched LAN, use of static ARP and IP table, use SSH encryption, use sniffing detection tools and better use tunneled connection which supports IPSec.
Labels: DNS Poisoning