Tuesday, February 20, 2018

Link shortner for bypass phishing detection bitly

Recently there was a huge video link scam based on facebook users for hack their fb accounts. It is a phishing attack which is prompting for user name and password for fb login.

Message actually comes as a video which claims that victim was there. As its comes from user's friend and he/she was in the video most of victims open the link with the panic situation. Then it will goes to fb login page which user needs to put there user name and password. Finally the hacker will take the control of victim's fb account. Then hacker will send the same message to victim's friends also.

Important thing in here it has used bitly for short and mask phishing site's url.as it is shorten fb phishing site detection could be bypassed by the hacker. Therefore bitly.com is a good site for short your phishing site's link and bypass the phishing site detection

Friday, February 16, 2018

Wiper malware steps



  1. Steal credentials from browser and system.
  2. Spread to other systems using psexec and WMI tools.
  3. First delete all shadow copies of files and windows backup catalogs.
  4. Turn off recovery mode.
  5. Delete system logs.


This will cover tracks and making difficult to recover

Sunday, November 5, 2017

Facebook search people by number

Facebook has a good database of phone numbers of people who has been signed up. Any person who is going to create an FB account should have a phone number. Facebook allows to search people through this number. Normally if you typed phone number on the find friend bar on facebook it normally search for the person with that number. But it wont works sometimes. Following is a trick for getting around this.

http://m.facebook.com/search/?query=123456789

Here is the magic link for check a person from his number. In this link instead of 123456789 put the phone number with area code.

Thursday, October 5, 2017

9 books for ethical hackers


The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography [Kindle Edition]

Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker [Kindle Edition]

Rtfm: Red Team Field Manual

CISSP All-in-One Exam Guide, 6th Edition

Wednesday, August 2, 2017

Softether VPN

VPN or Virtual Private Networks are leading technology in networking for purposes from connecting to office PC in home to connecting two or more WANs for secure communication. Companies and organizations use VPNs for secure their communication while some computer users use VPNs for easy to connect to a remote networks. Hackers use VPNs for get annonymous. So VPNs are used for different purposes in different ways.

Tuesday, June 20, 2017

Windows cmd tools and PS tools

There are lots of hacks we can do using Microsoft windows command line tools. If you are an administrator of a network these tools are very helpfull. There's a ineteresting site to learn most of these tools with examples.

https://ss64.com/nt/

This site provides lots of windows nt command line tools and show how to use them with examples.
PS tools is a very important tool pack from microsoft. Here is an abstract of PSexec tool in PS tools.

Monday, June 5, 2017

Web Proxy for youtube

https://www.proxysite.com

This web proxy is better for watch youtube videos smoothly if your administrator has blocked youtube and other social media sites.