#hackingtricks
Explore tagged Tumblr posts
hackinginhindi · 4 years ago
Text
Tumblr media
Who Is gray Hat Hacker ? ग्रे हॅट हॅकर कौन है ? Gray hat hackers come in between white hat hackers and black hat hackers. Gray hat hackers break the ethical hacking rules & violate laws but they do not have any harmful intention. They search for weaknesses in a system (website, App, Software, Network) without the permission of the system owner. If problems were found, they Report the owner and sometimes ask for a fee (Bounty) to fix the problem. Gray hat hacking is illegal, as the hacker doesn't have any permission from the system owner to break into their systems & networks.
1 note · View note
sterlingelud-blog · 8 years ago
Text
Hacking tips of 2018
Essential OF HACKING
Programmer implies somebody who discovers shortcomings in a PC or PC arrange, however the term can likewise allude to somebody with a propelled comprehension of PCs and PC networks.Hackers might be spurred by a large number of reasons, for example, benefit, dissent, or test. The subculture that has advanced around programmers is frequently alluded to as the PC underground however it is presently an open group. While different employments of the word programmer exist that are not identified with PC security, they are infrequently utilized as a part of standard setting.
Characterizations:-
A few subgroups of the PC underground with various dispositions utilize diverse terms to delineate themselves from each other, or endeavor to reject some particular gathering with which they don't concur. Eric S. Raymond (creator of The New Hacker's Dictionary) advocates that individuals from the PC underground ought to be called saltines. However, those individuals consider themselves to be programmers and even endeavor to incorporate the perspectives of Raymond in what they see as one more extensive programmer culture, a view brutally dismissed by Raymond himself. Rather than a programmer/wafer division, they give more accentuation to a range of various classifications, for example, white cap, dim cap, dark cap and content kiddie.
White Hat:-
A white cap programmer breaks security for non-vindictive reasons, maybe to test their own particular security framework or while working for a security organization which makes security programming. The expression "white cap" in Internet slang alludes to a moral programmer. This grouping likewise incorporates people who perform entrance tests and helplessness appraisals inside a legally binding assention. The EC-Council , otherwise called the International Council of Electronic Commerce Consultants has created affirmations, course product, classes, and web based preparing covering the various field of Ethical Hacking.
Dark Hat:-
A "dark cap" programmer is a programmer who "abuses PC security for little reason past vindictiveness or for individual pick up" (Moore, 2005). Dark cap programmers shape the cliché, unlawful hacking bunches regularly depicted in mainstream culture, and are "the encapsulation of all that general society fears in a PC criminal". Dark cap programmers break into secure systems to decimate information or make the system unusable for the individuals who are approved to utilize the system.
Section 1: Targeting
The programmer figures out what system to break into amid this stage. The objective might be specifically noteworthy to the programmer, either politically or by and by, or it might be picked indiscriminately. Next, they will port output a system to decide whether it is helpless against assaults, which is simply trying all ports on a host machine for a reaction. Open ports—those that do react—will enable a programmer to get to the framework.
Section 2: Research And Information Gathering
It is in this phase the programmer will visit or contact the objective somehow with expectations of discovering key data that will enable them to get to the framework. The primary way that programmers get wanted outcomes from this stage is from "social designing", which will be clarified underneath. Beside social building, programmers can likewise utilize a strategy called "dumpster jumping". Dumpster plunging is the point at which a programmer will truly seek through clients' trash with expectations of discovering archives that have been discarded, which may contain data a programmer can utilize straightforwardly or in a roundabout way, to enable them to access a system.
Section 3: Finishing The Attack
This is the phase when the programmer will attack the preparatory focus on that he/she was wanting to assault or take. Numerous "programmers" will be gotten after this point, baited in or snatched by any information otherwise called a honeypot (a trap set up by PC security staff).
Dark Hat:-
A dark cap programmer is a blend of a Black Hat and a White Hat Hacker. A Gray Hat Hacker may surf the web and hack into a PC framework for the sole reason for informing the director that their framework has been hacked, for instance. At that point they may offer to repair their framework for a little charge.
World class Hacker:-
A societal position among programmers, first class is utilized to depict the most talented. Newfound endeavors will flow among these programmers. Tip top gatherings, for example, Masters of Deception gave a sort of validity on their individuals.
Content Kiddi:-
A content kiddie (or skiddie) is a non-master who breaks into PC frameworks by utilizing pre-bundled computerized devices composed by others, as a rule with small comprehension of the hidden idea—henceforth the term content (i.e. a prearranged plan or set of exercises) kiddie (i.e. kid, youngster—an individual lacking information and experience, youthful).
Hamza Bendelladj used to perform this . In case you dont know about him , read here at
http://gadgetteacher.com/hamza-bendelladj-robin-hood/
Neophyt:-
A novice, "n00b", or "beginner" is somebody who is new to hacking or phreaking and has no learning or experience of the workings of innovation, and hacking.
Blue Hat:-
A blue cap programmer is somebody outside PC security counseling firms who is utilized to bug test a framework preceding its dispatch, searching for misuses so they can be shut. Microsoft additionally utilizes the term BlueHat to speak to a progression of security preparation occasions.
Hacktivis:-
A hacktivist is a programmer who uses innovation to declare a social, ideological, religious, or political message. As a rule, most hacktivism includes site disfigurement or foreswearing of-benefit assaults. Country state Intelligence offices and cyberwarfare agents of country states.
Assault:-
An average approach in an assault on Internet-associated framework is:
1. System list: Discovering data about the expected target.
2. Powerlessness investigation: Identifying potential methods for assault.
3. Abuse: Attempting to bargain the framework by utilizing the vulnerabilities found through the weakness investigation.
Keeping in mind the end goal to do as such, there are a few repeating apparatuses of the exchange and methods utilized by PC lawbreakers and security specialists.
Security Exploit:-
A security misuse is a readied application that exploits a known shortcoming. Normal cases of security misuses are SQL infusion, Cross Site Scripting and Cross Site Request Forgery which manhandle security gaps that may come about because of substandard programming practice. Different endeavors would have the capacity to be utilized through FTP, HTTP, PHP, SSH, Telnet and some site pages. These are exceptionally normal in site/area hacking.
Systems
Defenselessness Scanner:-
A defenselessness scanner is an apparatus used to rapidly check PCs on a system for known weaknesses.Hackers additionally usually utilize port scanners. These verify which ports on a predefined PC are "open" or accessible to get to the PC, and some of the time will identify what program or administration is tuning in on that port, and its adaptation number. (Note that firewalls safeguard PCs from gatecrashers by restricting access to ports/machines both inbound and outbound, yet can at present be dodged.)
Watchword Cracking:-
Watchword breaking is the way toward recouping passwords from information that has been put away in or transmitted by a PC framework. A typical approach is to more than once attempt surmises for the secret key.
Bundle Sniffer:-
A bundle sniffer is an application that catches information parcels, which can be utilized to catch passwords and other information in travel over the system.
Mocking Attack (Phishing):-
A mocking assault includes one program, framework, or site effectively taking on the appearance of another by misrepresenting information and in this way being dealt with as a put stock in framework by a client or another program. The motivation behind this is as a rule to trick projects, frameworks, or clients into uncovering classified data, for example, client names and passwords, to the aggressor.
Rootkit:-
A rootkit is intended to cover the trade off of a PC's security, and can speak to any of an arrangement of projects which work to subvert control of a working framework from its honest to goodness administrators. Ordinarily, a rootkit will cloud its establishment and endeavor to keep its expulsion through a subversion of standard framework security. Rootkits may incorporate swaps for framework doubles with the goal that it ends up noticeably outlandish for the true blue client to recognize the nearness of the gatecrasher on the framework by taking a gander at process tables.
Social Engineering:-
At the point when a Hacker, regularly a dark cap, is in the second phase of the focusing on process, he or she will normally utilize some social designing strategies to get enough data to get to the system. A typical practice for programmers who utilize this procedure, is to contact the framework director and assume the part of a client who can't access his or her framework.
Trojan Horses:-
A Trojan stallion is a program which is by all accounts doing a certain something, yet is really doing another. A trojan steed can be utilized to set up a secondary passage in a PC framework with the end goal that the interloper can obtain entrance later. (The name alludes to the steed from the Trojan War, with adroitly comparative capacity of deluding safeguards into bringing an interloper inside.)
Infections:-
An infection is a self-duplicating program that spreads by embeddings duplicates of itself into other executable code or archives. In this way, a PC infection acts in a path like a natural infection, which spreads by embeddings itself into living cells. While some are innocuous or simple deceptions most PC infections are viewed as vindictive.
Worm:-
Like an infection, a worm is additionally a self-imitating program. A worm contrasts from an infection in that it spreads through PC systems without client intercession. Not at all like an infection, it doesn't have to append itself to a current program. Many individuals conflate the expressions "infection" and "worm", utilizing them both to depict any self-proliferating program.
Key Loggers:-
A key lumberjack is an instrument intended to record ('log') each keystroke on an influenced machine for later recovery. Its motivation is for the most part to enable the client of this instrument to access secret data wrote on the influenced machine, for example, a client's watchword or other private information. Some key lumberjacks employments
1 note · View note
officialandmaza · 8 years ago
Text
Hack Facebook Account By Phone Number
Hacking Facebook Account one of the major queries on the Internet today. It's hard to find — how to hack Facebook account, but researchers have just proven by taking control of a Facebook account with only the target's phone number and some hacking skills.Yes, your Facebook account can be hacked, no matter how strong your password is or how much extra security measures you have taken. No joke!Hackers with skills to exploit the SS7 network can hack your Facebook account. All they need is your phone number.The weaknesses in the part of global telecom network SS7 not only let hackers and spy agencies listen to personal phone calls and intercept SMSes on a potentially massive scale but also let them hijack social media accounts to which you have provided your phone number. SS7 or Signalling System Number 7 is a telephony signaling protocol that is being used by more than 800 telecommunication operators worldwide to exchange information with one another, cross-carrier billing, enabling roaming, and other features.However, an issue with the SS7 network is that it trusts text messages sent over it regardless of their origin. So, malicious hackers could trick SS7 into diverting text messages as well as calls to their own devices.All they need is the target’s phone number and some details of the target’s device to initiate the silent snooping.The researchers from Positive Technologies, who recently showed how they could hijack WhatsApp and Telegram accounts, now gave the demonstration of the Facebook hack using similar tricks, Forbes reported.SS7 has long been known to be vulnerable, despite the most advanced encryption used by cellular networks. The designing flaws in SS7 have been in circulation since 2014 when the team of researchers at German Security Research Labs alerted the world to it.
Here’s How to Hack Any Facebook Account:
The attacker first needs to click on the "Forgot account?" link on the Facebook.com homepage. Now, when asked for a phone number or email address linked to the target account, the hacker needs to provide the legitimate phone number.The attacker then diverts the SMS containing a one-time passcode (OTP) to their own computer or phone, and can login to the target’s Facebook account. You can watch the video demonstration that shows the hack in action. The issue affects all Facebook users who have registered a phone number with Facebook and have authorized Facebook Texts.Besides Facebook, researchers’ work shows that any service, including Gmail and Twitter, that uses SMS to verify its user accounts has left open doors for hackers to target its customers.Although the network operators are unable to patch the hole sometime soon, there is little the smartphone users can do.
Do not link your phone number to social media sites, rather rely solely on emails to recover your Facebook or other social media accounts.
Use two-factor authentication that does not use SMS texts for receiving codes.
Use communication apps that offer "end-to-end encryption" to encrypt your data before it leaves your smartphone over your phone's standard calling feature.
Because this technique [SSL exploitation] requires significant technical and financial investment, it is a very low risk for most people," Facebook spokesperson told The Hacker News. 
As an added precaution, we recommend turning on two-factor authentication, called Login Approvals, in your Facebook security settings. Doing this will disable recovery via SMS on your account so even if someone has your phone number, they'll still need your password to access your account.
0 notes
hackinginhindi · 4 years ago
Text
Tumblr media
Who Is gray Hat Hacker ? ग्रे हॅट हॅकर कौन है ?
Gray hat hackers come in between white hat hackers and black hat hackers. Gray hat hackers break the ethical hacking rules & violate laws but they do not have any harmful intention. They search for weaknesses in a system (website, App, Software, Network) without the permission of the system owner. If problems were found, they Report the owner and sometimes ask for a fee (Bounty) to fix the problem. Gray hat hacking is illegal, as the hacker doesn't have any permission from the system owner to break into their systems & networks.
0 notes
hackinginhindi · 4 years ago
Text
Tumblr media
Who Is white Hat Hacker ? व्हाईट हॅट हॅकर कौन है ?
व्हाइट हॅट हॅकर को एथिकल हैकर भी कहा जाता है क्योंकि वह कानूनी तरीको का अनुसरण करता है, और हमलों से बचाने में मदद करने के लिए सिस्टम के मालिक की अनुमति से साइबर सुरक्षा जांच करता है. व्हाइट हॅट हॅकर के पास सिस्टम की सुरक्षा को तोड़ने की अनुमति होती है. व्हाइट हॅट हॅकर सुरक्षा कमजोरियों ( खामियों ) को खोजने के उद्देश्य से पेनेट्रेसन टेस्टिंग और वल्नरॅबीलिटी असेसमेंट करते है ताकी सिस्टम की सुरक्षा कमजोरीयों को ब्लॅक हॅट हॅकर के अटॅक करने से पहले सुधारा जा सके.
0 notes
hackinginhindi · 4 years ago
Text
Tumblr media
Who Is white Hat Hacker ? व्हाईट हॅट हॅकर कौन है ?
0 notes
hackinginhindi · 4 years ago
Text
Tumblr media
Who Is Black Hat Hacker ? ब्लॅक हॅट हॅकर कौन है ?
0 notes
hackinginhindi · 4 years ago
Text
Tumblr media
Who Is Black Hat Hacker?
A black hat hacker is a person who has advanced knowledge of computer systems and networking devices, but he uses his skills in an unlawful manner to spread malware, steal credentials and data, exploiting the security of the system, or to gain unauthorized access to someone else's system without permission to perform some cybercrime activities.
0 notes
hackinginhindi · 4 years ago
Text
Tumblr media
हॅकर के अन्य प्रकार / Other Types Of Hackers
1. स्क्रिप्ट किड्डीज / Script kiddies 2. ग्रीन हॅट हॅकर / Green Hat Hackers 3. ब्ल्यु हॅट हॅकर / Blue Hat Hackers 4. रेड हॅट हॅकर / Red Hat Hackers 5. हॅक्टिवीस्ट / hacktivist 6. सायबर टेररिस्ट / Cyber terrorist 7. सोशल इंजीनीरिंग हॅकर्स / Social Engineering Hackers 8. स्टेट / नेशन स्पॉन्सरड हॅकर्स / State / Nation Sponsered hackers 9. म्याॅलीसीअस इनसायडर / व्हीसल - बलोवर / malicious Insider / Whistle-blower 10. एलिट हॅकर्स / Elite Hackers
0 notes