Blogger Widgets

About Ash Hacker

My photo
I am a social-techno-learner which believes in its own efficiency first and then implements with the suggestions of my strong and enthusiastic Team which helps me takes everything into its perfection level.

Saturday 19 May 2012

Recover your deleted files...

If you have lost important files from your hard drive and if you are sure that they have been deleted, don’t panic! Uneraser is simple software that can help. In this tutorial, we will see how Uneraser works. On this link you can download Uneraser.
For example, I delete movie file on Local Disk (E:) , how to recover movie file?. It is simple

1. Run Uneraser , then select wizard , as shown below


2. When the wizard appears select “Do a lost files scan”, then click Next , as shown below


3. Select partition , where is deleted data, then click Next


4. Uneraser find my deleted movie


5. Now, just save your recover file, as shown below

Use Keyboard As Mouse

Looking cool computer tricks? Here is something that should pique your interest: Use Keyboard As Mouse, On Screen Keyboard and Transform your Windows XP in to Windows 7.

Use Keyboard As Mouse

When mouse isn’t working properly , this trick can be very helpful. To activate mouse keys all you do is press Alt+Left shift key + NumLock and click OK or press enter .

Use the Numerical pad for controlling the mouse pointer.
5 is for click.
+ is for double click
- for right click.

On Screen Keyboard

On screen keyboard is one of the coolest windows features that displays a virtual keyboard on the computer screen that allows people with mobility impairments to type data by using a pointing device or joystick..


To use it go to start-> run and type osk

Thursday 17 May 2012

how to shut down your computer using your cell phone

Hi, do you want to learn a trick about “how to shut down your computer using your cell phone”. Are you always hiring the best way? Then, today you learn this trick easily in a simple way as just need to look carefully this step to step tutorial about “how to shut down your computer using your cell phone”.
Note: you can complete this trick in every operating system but, here we are representing this tutorial in “Windows 7 Professional”.
So let’s start, first open notepad as go to-> Start- All Programs- Accessories- Notepad. You can also open it in other way as go to-> Start and click on run and there type- “notepad”. Then, you will get notepad (simple editor) in front of window screen. Then, type in notepad “shutdown –s” and save this file anywhere where you want but, save with file as named “shutdown.bat” in your operating system. Illustrated at below picture-


After above process, the second step is to create your “Gmail” account or other account like yahoo for email id but, here showing Gmail. If you already have a Gmail account means having email id then, forget this step and if not as for this just search on internet as type in URL box- “gmail.com” and hit enter button from your keyboard. Then you will get, see image below-

On this page, click on “Create an Account” as shown above. Then, you will get a form where you need to fill your details like first name, last name, birth date and many more as follow instructions carefully and you will get you unique email id through that page.
Now, the next step is to create an email for Microsoft outlook (MS-outlook) and also configure some settings. So, just open MS outlook as go to-> Start – All Programs – Microsoft Office and click on Microsoft Office Outlook (any version like 2003, 2007, 2010). If you don’t have MS outlook in your operating system then, you can purchase this software online. Here in this tutorial we are showing MS-outlook 2003.

After open, go to-> Tools – Email Accounts… Click on Email Accounts…

So you will get this window-

Click on check box- “Add a new e-mail account” as shown as above and click next. So you get-

Click on Check box- “POP3” and click on Next >
You will get-

So, enter your name and e-mail address “email id” as you get through Gmail as illustrated whole fact above. In server Information, enter in Incoming mail server (POP3): “pop.gmail.com” and in Outgoing (SMTP): “smtp.gmail.com”. Enter you username and password also as you can enter your desired username and password. After whole click on more settings as all things are shown above, visit carefully.
In more settings, you will get this screen-

Click on Outgoing Server as will get this-

So, click on Check box as mouse indicating in upper image.
After this, click on Advanced as visit below-

In Advanced, change the value as enter in Incoming server (POP3): 995 and enter in outgoing (SMTP): 25 and click on all checkboxes and finally click on Ok button as shown above. Just do copy of above.
Then, you will get back to previous screen as then, click on next as shown below-

And finally, click on finish,
Then, go to-> Tools – Send\Receive – Send\Receive Settings – Define Send\Receive Groups (Ctrl+Alt+S). Given below-

After Click, you will get this screen-

So check your screen as do copy of above picture. In this, especially check, checkbox- Schedule an automatic send\receive every (1) minutes. And finally click on close.
Now, the last step is to manipulate our computer (ms-outlook) with text message as for this, we have to set up of rules and alerts on outlook. So, again go to-> Tools – Rules and Alerts. See image below-


Then, you will get Rules and Alerts Screen as there click on New Rule as see below-

In New Rule, you will get Rule Wizard .So, just click on check box- “start from a blank rule” and click on next as visit image below-

Now, the next step is as click on check box- “with specific words in the subject or body” and click on specific words as shown below-

Through click, you will get Search Text wizard as write- shutdown and add and click on ok button and finally click on next

As you will on next, click on check box- start application and below click on application as though click you will get an open wizard as visit below

In open wizard, open your file- “shutdown.bat” as you created and saved firstly above on a particular location.
After this, you will get this wizard again as click on next.

Again, click on next-

Click on finish

And finally click on Apply and then, on OK as shown below

So, all above process is the complete whole process to shut down your computer via cell phone in less than a minute. Now, you can open your Gmail account in cell phone and just send a text message to your Gmail account saying “shutdown” w/o quotation and you will found that your computer will be shutdown in a minute. If you are out of your city as wants to shut down your computer using your Cell phone in a minute as this is the best way. Finally, are you still thinking as How to shut down your Computer using your Cell Phone? Then, just follow this tutorial now as you will get result within hour.
We hope you like this briefly described tutorial. Just does this now…


ASH-HACKER




How to hack?, This is the same question that is asked to me every single day. Infact it's one of the most searched and widely spoken topics on the internet. There are tons and tons of guides and how to's available on the internet related to hacking and pentration testing. However, the problem is that unless you can't learn how to hack unless you don't practice the stuff you learned.  Which brings us to the next question, Where do I practice what I learn?


Another problem with today's Ethical hacking and penetration testing courses is that they fail to offer real world attack scenario in order for the students to practice and learn in a much better way. Most of the courses you would find on the internet would commonly suggest you the following for the lab.

1. Backtrack (Attacker)
2. Windows Xp (Victim)

And you would end up practicing on a vulnerable target of your choice, However penetration testing in the real world is extremely difficult and require creative thinking and you are faced up against lot of different security mechanisms such as Firewalls, IDS, IPS etc.
Recently this week I came across a Penetration testing course that gravitated my attention in the first look. The name of the course is "Codename: Samurai Skills".

"Codename: Samurai Skills" by ninja sec team is a medium level penetration testing course which provides students with a good base of both theoretical and practical knowledge. The approach of this course is similar to elearnsecurity and offensive security.

The whole course is divided into eight different modules. Each of the modules contains a PDF material along with the videos related to the topic. The course starts by giving a solid introduction related to Penetration testing, different types of approaches and methodology. The next chapter directly dive into the practical demonstrations of various penetration testing tools on backtrack related to information gathering.

Module 3: Scanning and Assessment

the author does not only introduces you to different types of scanning tools and methodologies but also provides handy tips in order to bypass different types of protections such as firewalls, IDS etc.

Module 4: Network Attacking Techniques


 In this module author introduces the students to various types of different network attacking and exploitation techniques. Going beyond just using ms08_067_netapi exploits which is a common exploit used in almost every training.  The module also covers topics like network password cracking, man-in-the-middle, ARP spoofing, password sniffing and common targeted protocols.


Module 5: Windows & UNIX Attacking Techniques 

This module introduces the student to various types of vulnerabilities inside windows xp found inside windows Xp hashing mechanism. The module also talks about unix attacking techniques. However, I was expecting a bit more of material related to UNIX attacking techniques.

Module 6: Windows & UNIX Post-Exploitation Techniques 

This module covers Windows and Unix post exploitation techniques in depth introducing the student to various topics such as meterpreter, privilege escalation, local password cracking, impersonation, routing / pivoting and other topics, for both Windows and UNIX.

Module 7: Web Exploitation Techniques  


This module is the longest module of all with around 5 hours of practical demonstrations. The module starts by   explaining various scanning and application footprinting techniques. Right after the scanning part the author directly dives the students inside web application exploitation techniques such as SQL injection and Blind SQLi, File Upload and Remote File Include (RFI) vulnerabilities, Command Injection, Cross Site Scripting (XSS) (both reflected and stored), and Cross-Site Request Forgery (CSRF).

Module 8: Windows Exploit Development


This module was by far my favorite as the instructor has done tremendous job in explaining the windows exploit development process.  The module covers a step by step process of development of a buffer overflow exploit.  The instructor has made the complex exploit development process look so easy for the students that even script kiddies can learn it with a little bit of effort.

The ninja-sec team also offers a certificate for any one who completes the following lab challenges:



The end goal is to collect a key.txt file inside of impossible network.

.....ASH-HACKER(http://ash-hacker.blogspot.in/)

Hack Facebook Accounts With Reverting




Facebook pays millions of dollars to security experts and penetration tester to keep the privacy of their users as safe as possible. So therefore we cannot use direct methods such as bruteforcing, dictionary attacks in order to hack facebook account due to account lockout feature. However, Also i would like to clear one more doubt that there is no such software which will hack a facebook password for you by just entering your email address. There are also methods such as Phishing, keylogging etc, which can help you hack facebook account, which are also suggested ones.

However here in this tutorial we will be exploiting a bug inside facebook in order to hack a facebook account. The vulnerability exploits trusted friends feature inside facebook which could be used to reset some one's facebook password.

Note: If you would like to learn about more advanced methods to hack a facebook account, Kindly refer my post How To Hack Facebook Password.


1. The thing which we use is to trick the Three Friend Account Recovery Method of facebook

2. The homework i was talking about is that you will have to make three fake account and make sure that they are in the friend list of the person you want to hack.

3. Once you are done with the above two steps you can start the hacking business.

4. Go to Forgot Password area of facebook.

5. It will show victims e-mail address and may be mobile phone at which he can be reached,choose ''no longer access to these'' option.

6. Now you will be prompted to enter an alternate e-mail address, type your e-mail address or create a new one.

7. Now you will be asked the ''Security question". Make random guesses,if you know the victim you might just get the right answer,if you don't-no worries !

8. If you have not succeeded in getting the answer right you will get to our main aim ''The Trusted Friends" recovery option.

 
                                 
9. Here click on ''continue'',choose  3 trusted friends-The Three fake accounts you have created and they are friends with the victim.
   
 
                           
10. After you have chosen them,facebook will supply you with some codes on those fake accounts,follow the procedure and victims account is yours ! You've hacked them ! :)

 

Google Raises Bug Bounty - Great News For Hackers



A good news for the hacking community- The internet giant Google has raised the bounties from $3133 to $20,000.Most companies that are in the business of providing software or services are willing to pay industrious and benevolent hackers who find bugs in the code. Google has been making use of these folks for quite some time, but now Mountain View is increasing its rewards dramatically in an effort to encourage more people to join the bug hunt. Google previously handed out a maximum of $3133.70, but now will offer  up to $20,000 per bug.

WEL-COME

You Are Welcome Heartly.......
Blogger Widgets