Labels
search for ccna answer
Monday, November 7, 2016
How hacker crack your password
If your bank account or online accounts like Gmail, Yahoo, Facebook or Twitter has ever been hacked, you should know that the cyber criminals use specific trick to get into your account. With passwords being the central theme of almost all your accounts, hackers prefer to go after your password to hack into your financial as well as online accounts.
If your account is hacked, the criminals probably used one of the 6 below given ways to crack your account. If you study these methods you can prepare yourself better to repel such hacks and control your accounts easily.
Brute force attack
Brute force is about overpowering the computer’s defenses by using repetition. Brute force attack is a random trial and error method hack repeated till the password is finally cracked. Hackers randomly keep applying names and numbers to crack password through this pattern. Sometimes, a lot of guesswork is also used to decode password. Arithmetic numbers, birth date, pet’s name, favourite actor’s name are the password that users commonly use.
Dictionary Hacking
Dictionary hacking is also a form of brute force attack. But in Dictionary hack, hackers use various permutations and combinations of dictionary words. They repetitively use the dictionary software and try various combination of words to crack your password. A report says, over 50 percent of the passwords are cracked through this process.
Brute force dictionaries always start with simple letters “a”, “aa”, “aaa”, and then eventually moves to full words like “dog”, “doggie”, “doggy”. These brute force dictionaries can make up to 50 attempts per minute in some cases.
Phishing
Phishing is another most commonly used tool of hackers to to acquire usernames and passwords. Also, phishing is the most used method because it takes just a trick to fool the victim into divulging his/her login credentials. Most trojans spread through phishing while sometimes hackers create cloned websites or fake internet address is created wherein you are asked to fill in your username and password details.
Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication.
Spidering attack
Another hacking tool is the Spidering attack. Just as the name suggests, hackers also crawl your website like a spider and collect all the common information. Cyber criminals normally use spidering attack to target big companies.
A spider is a tool that crawls a website looking for all the available content. There’s a few different ways to discover content:
– Static Content
– Dirbuster
– HTTP Method
– Ascension Fuzz
– Query Fuzz
– Cookie Fuzz
– Robots.txt / Sitemap.xml
– RIA Checks
– UserAgent
– Regexp path/url
– Public cache search
– /status
Keylogger attack
This hacking tool is very similar to Phishing and is generally spread through malware infection. The victim is usually trapped into installing a keylogger on his/her PC/Laptop by clicking on an attachment is sent to victim email. The moment you download the attachment, it scans through your browser. Once installed, the keylogger records all your Internet activity which is than relayed back to the command and control servers.
Rainbow Table
While you might think of Rainbow Tables as eclectic colorful furniture, those aren’t the ones we are going to discuss. The Rainbow Tables that we are talking about are used to crack passwords and are yet another tool in the hacker’s ever growing arsenal.
This method requires a good knowledge of computers and coding.Rainbow Tables are basically huge sets of precomputed tables filled with hash values that are pre-matched to possible plaintext passwords. The Rainbow Tables essentially allow hackers to reverse the hashing function to determine what the plaintext password might be. It’s possible for two different passwords to result in the same hash so it’s not important to find out what the original password was, just as long as it has the same hash. The plaintext password may not even be the same password that was created by the user, but as long as the hash is matched, then it doesn’t matter what the original password was.
The use of Rainbow Tables allow for passwords to be cracked in a very short amount of time compared with brute-force methods, however, the trade-off is that it takes a lot of storage (sometimes Terabytes) to hold the Rainbow Tables themselves, Storage these days is plentiful and cheap so this is not a big issue for hackers. You can also get precomputed Rainbow Tables for cracking passwords of vulnerable operating systems such as Windows XP, Vista, Windows 7, and applications using MD5 and SHA1 as their password hashing mechanism (many web application developers still use these hashing algorithms).
Credits to Vijay Prabhu
Do drop in your comments about the above six methods of password cracking.
Thursday, June 16, 2011
Many Malaysian Government Sites Hacked
Shutdown Means Darkness For Most Government Websites
The MCMC, the country's Internet and telecommunications regulator, did not however provide information on the nature of the attacks, or the people behind it, describing them only as "unknown hackers".
However, it made references to some of the websites recovering quickly, suggesting that these sites faced a DDoS or distributed denial-of-service attack rather than a hack.
DDoS attacks can make a website inaccessible to users by swamping the website with traffic from hundreds or thousands of computers.
Such attacks are a known tactic of Anonymous, a hacker group that had threatened to attack Malaysia.
The MCMC had noticed a reduction in the levels of attack by 4 a.m. local time Thursday, it said. The attacks had little effect on Malaysian users, and most of the websites have already recovered, it said.
"We do not expect the overall recovery to these websites to take long," it said.
"The public is advised to report any information they may have regarding the identity of these hackers as the act to disrupt network services is a serious offence," it said.
Anonymous has used various online forums to threaten Malaysia with an attack in protest against the government's decision to block 10 websites that reportedly allowed the download of pirated content. Earlier this week, Anonymous invited people to join Operation Malaysia, targeting a government website from 7.30 p.m. GMT on Wednesday (3.30 a.m. Thursday, local time).
http://www.malaysia.gov.my/-still cannot view
http://www.kpdnkk.gov.my/-still cannot view
http://www.sabahtourism.com/-still cannot view
http://www.eghrmis.gov.my/-still cannot view (not sure if this because of attack)
http://penang.uitm.edu.my/-OK already
http://www.tourism.gov.my/-OK already
http://www.spr.gov.my/-OK already
http://www.bomba.gov.my/-OK already
http://www.jbiotech.gov.my/-OK already
https://ezi2care.jkm.gov.my/-Can only see Hello world from WordPress.
http://www.moe.gov.my/-OK already
http://www.cidb.gov.my/-OK already
http://www.treasury.gov.my/-OK already
http://www.kkr.gov.my/-OK already
http://www.penerangan.gov.my/-slow response (maybe because of DoS attack).
http://www.1malaysia.com.my/-slow response
http://www.parlimen.gov.my/-OK already.
http://www.rmp.gov.my/-OK already.
http://jpm.gov.my/-still cannot view
http://www.mocat.gov.my/-still cannot view.
http://www.nsc.gov.my/-OK already.
http://www.mohr.gov.my/-OK already.
http://www.kjc.gov.my/-still cannot view.
Friday, May 20, 2011
Is that possible to use other streamyx account?
For example, if your streamyx account is only basic 512K, but you got no money to upgrade to 1Mbps to watch youtube without buffering, therefore you can try out this trick how to hack other people streamyx account and use at your own place.
Disclaimer: Use this trick at your own risk !!
before year 2009, most of the streamyx customer was given default password as tmnet123. Therefore using this exploit, we can easily get the others streamyx account, all we need to do is try our luck to get the streamyx account username.
Please go to https://tmbill.tm.net.my/SelfCare/Maintenance/selfcareLogin.jsp to enter the username and password. If error as above appear, that means you might enter the wrong username or password. Try another account instead.
Once you enter the correct password and username, the message as picture above will shown. That's mean the account can be use at your own place d ! However we can only check out the internet speed only when we are successfully connect using the username and password.
Once you get the correct password and username, just log in to your modem/router and modify the connection setting. Each router may have different configuration, please refer to the respective user manual of your router/modem. Here we are using the free modem given by the streamyx as example.
If you wondering when you are using other people's streamyx account, will the people disconnected or their internet speed will be slowed down? The answer is they won't be disconnected because their account can be logged in by many users at the same time. Yes, their internet speed will be slow down, because you are using his account and thus you are sharing speed with him, so please behave yourself, DO NOT open ppstream when you are using other's people account because ppstream can eat up the 90% speed!!! Imagine u are stealing his account and you are greedy use up the 90% speed for the ppstream, his got 10% internet speed only, he pay RM88 every month to get 10% speed only? do you feel guilty? Haha. - quoted from http://ye5.blogspot.com/2010/12/hack-streamyx-account.htmlBut the question is how can you get many username to test it out?
The answer is simple. Use google to get it !!
Try search on the google using this string - "contact us intext:@streamyx.com", and you can possibly get million of streamyx account username. =)
Wednesday, July 22, 2009
UTAR Hack: Labs Password
Here is the password for UTAR labs passowrd.
Download The picture from
1)http://cid-7f18eef7e224740a.skydrive.live.com/self.aspx/onlycn/%e6%9c%aa%e6%a0%87%e9%a2%982-1.jpg
2)Get the download link of the password file from the picture
3)the password for viewing the password file hint is: thefilename.
Enjoy!
Monday, July 7, 2008
Trojan Infection Symptoms
A trojan horse is a program that infects your computer and allows a hacker to run hidden tasks behind your back. A Trojan infection can allow total remote access to your computer by a third party.
If you have experienced any of the following symptoms, you are infected with an Internet Trojan and hackers have invaded your computer. To remove the trojan and keep others out of your computer you can purchase the LockDown software here.
If you experience any of the following symptoms, you have been infected by one of the most dangerous type of individuals. These non-stealth hackers are known to destroy data and crash computers when they grow tired of playing their games.
-
Your CD-ROM drawer opens and closes by itself
Many Trojans have the ability to open and close your CD-ROM drawer. Two of the most popular Trojans that allow this command are the Netbus and SubSeven Trojans. -
Your computer screen flips upside down or inverts
When you are infected with a Trojan, hackers can make your computer screen blink, flip upside down or invert it so that everything is displayed backwards. -
Your wall paper or background settings change by themselves
The non-stealth type of hacker may change your default background or wall paper settings. Many times this will be done by using a picture found on your computer or one uploaded by the hacker. -
Documents or messages print on your printer by themselves
Since the hacker has total access to your computer, he can access your printer and print personal messages to you or print documents found in your folders. -
Your computer browser goes to a strange or unknown web page by itself
Trojans allow the hacker to launch your web browser and go to any web page that they preselected. -
Your windows color settings change by themselves
When infected, the trojan allows the hacker to change your Windows color settings to any colors of their choice. -
Your screen saver settings change by themselves
Often, the non-stealth hacker will set your screen saver with a personal scrolling message to you. -
Your right and left mouse buttons reverse their functions
Often, the hacker makes your mouse buttons switch around. The right click now does what the left click did and the left click takes on the functions that the right click used to have. -
Your mouse pointer disappears
Sometimes the hacker will completely turn off your mouse. When this is done, your mouse pointing arrow completely disappears. -
Your mouse moves by itself
The hacker can take control of your mouse pointer and click on icons and start programs as if he were sitting in your chair in front of your computer. -
Your mouse starts leaving trails
The hacker can change your mouse configuration to make it leave mouse trails as you move it. -
Your computer plays recordings of things recorded in your computer room
If you have a microphone connected to your computer, the hacker can record and listen to what is going on in the room. Sometimes the non-stealth hacker will play the sound file back when he knows you are in the room. -
Your sound volume changes by itself
Sometimes the hacker will turn your sound volume all the way up or down to attract your attention. -
Your Windows Start button disappears
Once infected, the hacker can make your Windows start button hidden from your view. -
Programs load or unload by themselves
Hackers can kill or startup programs on your computer. Many times your anti virus is unloaded and then parts of it are altered or deleted. -
Your computer starts talking or conversing with you
Some Trojans allow the hacker to type anything that he wants to say to you in a box and then make it appear that your computer is talking to you. Many times this feature is used along with the web cam and sound option so that the hacker can see and hear you as he converses. -
Your computer starts reading the contents of your computer clipboard
The hacker can make your computer speak the text contained in your clipboard and insert new text into your windows clipboard. -
Strange chat boxes appear on your computer and you are forced to chat with some stranger
The trojan will allow the hacker to bring up a square black chat box at which time you can not do anything else but type into this box. The hacker may talk back to you, or just leave this box up to block you from accessing your computer programs while he undermines what you are doing. -
Strange Windows Warning, Info, error, or question boxes appear on your computer
Your computer generates strange warning or question boxes. Many times these are personal messages directed directly to you and asking you a question with Yes or No or Ok buttons for you to click. -
You get complaints from your ISP that your computer is IP scanning
The hacker can use your computer to attack, send email or scan for other infected computers. You could then even get an email from your Internet service provider warning you that your account will be terminated if the activity continues. -
People that you are chatting with know too much personal information about you or your computer
Hackers can find personal information about you by reading documents on your computer such as a resume, financial records, personal letters, etc. The hacker while talking to you might inform you that he knows your address, phone number, children's names, or other information to try to either gain your respect or scare you in some way. This non-stealth type of hacker is more likely to cause you some kind of damage when he is finished having his fun with you. Be sure to get your copy of LockDown and change all of your passwords, to deny him future access to your computer. -
Other people can read your private IRC or ICQ messages
While your computer is infected with a Trojan, the hacker can not only see everything that you type, but every message sent to you via programs such as ICQ, IRC, AIM and yahoo pager. If someone that you are talking to seems to know what others are talking to you about in private while using one of the chat programs above you may have been infected. -
People that you are talking to can see you or know what is inside your computer room
If you have a webcam, the hacker can turn it on without your knowledge and watch you as well as see things in the background of the webcam. -
Your time and date change on your computer by itself
The hacker can change the time and date on your computer. Often this is done it is to catch your attention and changed to the extreme. You can then expect the hacker to ask you what time or date it is on your computer. -
Your computer speaker starts and stops working by itself
The hacker can turn your PC speaker on and off. -
Your computer shuts down by itself
The hacker can cause your computer to shutdown if you are infected by an Internet Trojan. -
Your computer shuts down and powers off by itself
Once infected, the hacker can make your computer turn itself off. -
Your Task bar disappears
The hacker can hide your taskbar from your view.
Experienced hackers a a general rule try to stay hidden and not give a clue that they have accessed your computer. Experienced hackers try to achieve pure stealth in order to continue access and keep the flow of information open. If you have noticed some of the following symptoms, you may have been infected with an Internet Trojan by a more experienced hacker.
-
Your account passwords are changed or others can access your accounts
Sometimes your accounts might tell you that it was accessed last on a date other than a time that you know you had accessed it, or even be denying you access indicating that someone is currently using the account without your permission. Other services like ICQ, AIM or others are also taken over completely not allowing you to use them any more. -
You have strange purchases that you never made on your credit card statement.
The hacker can have your computer save your credit card number to a file when it is used or typed on your computer keyboard. When the hacker uses your credit card, it will often reflect online computer related charges for services or programs that you have never purchased. -
Your computer monitor turns itself off and on
The hacker can turn your monitor off and on if there is any program that he wants to run and make sure you won't be watching. -
Your modem dials and connects to the Internet by itself
The hacker can have your computer dialup and connect to the Internet at times when he knows that you are not at home or sleeping and then connect to it. -
Your modem or hard disk lights flash you are not using your computer
At times when you are not using your computer, the hacker can be running programs or accessing the Internet which will cause these symptoms. -
Your computer reboots by itself
Sometimes the hacker will copy programs or files into your computer that will require a reboot to complete the process. The hacker may also reboot your computer when needed. -
Your files are in use when you are not accessing them.
When you have files in use, the icon for the file turns transparent which is an indication that you can't run the file. If a hacker is viewing the file, it will change in this way. Another indication is a temp file, for a particular document in the folder that you are viewing. After the hacker exits accesses to the file, the temp file will disappear which sometimes will also cause your Windows explorer to flinch while it refreshes the folders. -
Your keyboard or mouse freezes
The hacker can freeze your keyboard or mouse if he thinks that you are going to do something that will catch on to him. This could be to run some antihacker software or to simply go into a folder that he is accessing. -
Ctrl + Alt + Del stops working
The hacker or Trojan may disable this function so that you can not view your task list or be able to end the task on a given program or process. -
When you reboot your computer you get a message telling you that there are other users still connected
If you get a message when you reboot telling you that other users are still connected, it means that you have open file shares and someone is accessing your files. You need to put a password on your drives and shares or stop sharing files. You can purchase LockDown to monitor and block this activity.
Sunday, March 23, 2008
EH Episode 1 : 192.168.71.11
Target : UTAR Print Server
Time : 21/03/2008
Mission : Print Free
Status : Fail !
Friday, it was a beautiful Friday! I din attend CSA class as I know if go there also wasting time.
It has 1 test and 1 assessment on that day!
Actually that day quite nervous for me...
Where can I go if not attend the class, seriously that is only 1 place can go, it is internet lab. I always spent my free time there. As a result, my internet lab time from 3000 left only 148 mins.(=.=)
In the lab, I did not use my student Id to log in but I prefer to use administrator to log in on the computer instead of log in to the UTAR domain. Why? It is simple , I expect the administrator of UTAR domain wont check out my identity while I am using administrator not student Id. :)
I decide to print out some documents at that time. Well, it is different if you using administrator privilege, you will not get the UTAR printer shortcut on your desktop. So, I need to find the printer myself...
I start to located the printer server, get it \\koa-server
second, ask my partner Calvin to help to get the ip of \\koa-server
Well, it is easy. Just using the ping in the command prompt.
After that, I try to start the Ip
--->In command Prompt
--->Start \\192.168.71.11
It pop up 1 authentication window which ask you to input username and password ?
Opps, What is this all about ?
I was decided to give up that time, but unfortunately I get the username and password on my second guess! Haha.. how lucky was I :P
It is awesome!
--->nbtstat -a 192.168.71.11
Wow, that is great ! The pc had netbios opened!
As a result, I can easily get its C drive.
--->net use z: \\192.168.71.11\c$
Ok. I had get the pc C drive on my computer. I quickly run through all the folder inside the c drive, that is 2 user which is administrator and koaserver. Then got many printer link inside, I test to open the printer task link, it is the printer that I looking for to print my documents.
While open the printer task list, I had found out something interesting, that is with the administrator privileges I can cancel the printer job which assign by other student! Wow, I am now be the GOD, I show to Calvin, but he said he can do too. Well, as a result, he cant managed to do as me.
Next step, I going to inject 2 type of Trojan to the pc. One is winvnc, another is red dragonfly server. Both Trojan provide remote control while the red dragonfly server provide file transfer.
--->at \\192.168.71.11 09:11 \interactive cmd \c "%systemroot%\ko3.exe"
--->Access Denied.
WTF? OMG...cant access ? Well.. finally I know what had happened.
--->sc \\192.168.71.11 config schedule start =auto
I start the Task Scheduler on that computer.
After that, I thought can be AT...
--->at \\192.168.71.11 09:14 \interactive cmd \c "%systemroot%\ko3.exe"
--->Added a new job with job ID = 1
Then wait for 1 minutes. 1 minutes pass, while I try to connect to the computer with the VNC client. WTF? connection lost ? It can be ..
--->at \\192.168.71.11
--->There are no entries in the list.
Haiz.. really cant get why it will fail.
Anyway, I had access the registry key on the computer to start the both Trojan when the computer start.
I still haven't check it out. Hopefully it will be sucess!
I want print free !!!
lol
By Bluefiz
The Going Be Hacker Punya Hacker