Friday, 22 August 2014

Hack windows 7 with Metaspoit using kali linux



Exploiting a windows vulnerability to logging into the system without username and password using Metasploit.

Requirements:
1. MetaSploit Installed (Kali Linux Distribution)
2. Ruby Installed (Install all the package of Ruby to avoid any issues)
3. Two OS running either on same as virtual or physically different

Machine 1:  Host   Kali Linux Machine
Machine 2: Target Windows 7 Machine (32 bit).

To lounch metasploit, enter msfconsole at command line
#msfconsole



Now once you get the msf prompt type the below command  and look for the module exploit/windows/browser/ms10_046_shortcut_icon_dllloader.

Thursday, 31 July 2014

data hiding behind image (steganography)

Steganography is a method  of  hiding data in another message so that the very existence of  the data is concealed . Steganography is mainly used by hiding message in graphic images  .The least significant bit of each byte of the image  can be replaced with bits of the secret message .


lets see how  can  be hide message  behind the image.

required > one secret message txt file and  main image  file

* put the  secret.txt and  main.jpg on  the desktop
 this  is  secret  message  name as  secret.txt file  and  another  is  image  file  behind  which secret message are to hide in  my  case i  am using  the  image  file name  as  main.jpg


* open cmd (command prompt)
* type "cd Desktop"  (withot quetetion)
* type again  "copy /b main.jpg + secret.txt  steg.jpg

Tuesday, 15 July 2014

Hide data using NTFS stream.


NTFS file system in windows allows you to store data behind a file name with the use of a stream name it's not detectable browsing the file system  any where within windows . It can be access it with secret key which are name of the stream
NTFS file system stream contain the data that is written to a file .


Saturday, 14 June 2014

DNS HACKING

>> DNS HACKING <<
1 DNS BASICS
2 RESOURCE RECORDS AND THE ZONE FILE
3 DNS LOOKUP AND  REVERSE  DNS  LOOKUP
4 DNS ZONE TRANSFER                  
5 WHY SECURITY ISSUE OF ZONE TRANSFERING
6 CONCLUSION


1          Dns Basics:- DNS converts human readable domain names into IP-addresses. This is because domain names are much easier to remember than IP-addresses. This process may take place through a local cache or through a zone file that is present on the server. A zone file is a file on the server that contains entries for different Resource Records (RR).
This  process can be  understand by this  example let’s assume  that  you write in  URL  bar of  browser “www.google.com”  the  this  query first  goes to DNS  server  their  resolve  the site  name  in Ip address and  then  goes  to  query for   web  page   of  google com  to  web. server.
                                                                                  It’s not  easy  task  to  remember every IP  address  of various  web site. so  there  DNS  resolver  work  to  resolve  website  name into  IP  address .
Ex. (Generally all people stored  phone  no.  by particular  person’s  name  )   .
                                                                                                                     

Wednesday, 30 April 2014

Bypass Age Restrictions On YouTube Videos.


you  want  to  watch video ever on  youtube  but couldn't  becuase it is age  restricted  and  may  be  you  have no  account  . so  this  article  will  teach you how  to  bypass restriction on youtube.


here  url  is  http://www.youtube.com/watch?v=MlPH_ycy62s

from here replace   watch?v=  by  v/  and  press enter

you have done it 

enjoy yourself :)