Thursday, 22 March 2018

5 of the Most Dangerous Android Viruses and How to Get Rid of Them

5 of the Most Dangerous Android Viruses and How to Get Rid of Them

5 Most Dangerous Android Viruses and how to get rid of them....? 

Android

Have you ever heard of the virus in devices? Yes, you might be familiar with the keyword and if you are a regular android user then you might also understand it more properly. So have a look on 5 of the Most Dangerous Android Viruses and How to Get Rid of Them.

he virus is such kind of infectious or malware content in the system of any computing device or smart device that can turn out the whole behavior of the system go in the wrong way. This can also harm up to the hardware of the device too but only if the type of virus is extremely dangerous, and this is possible although it happens very rarely. Android is one of the most stable OS which is said to be the safest configuration from the virus attacks and most probably the users of Android does not pay any chance for Antivirus software as they never get any contact with any form of virus related issues. Although rare still there are some very dangerous viruses that can harm up to the Android extensively, so to describe somewhat about those viruses we have written in this article 5 of the most dangerous Android viruses.

Below is the list of a dangerous virus that can harm your android a lot and you must be aware of all these viruses.

 Godless

This one is the most dangerous virus that can be actually found patched even with the apps from the Google Play store, this means that you cannot be sure that how you can prevent from it as you will be finding up no such place more secure than Google Play Store. This one roots up the device silently and then cause various troubles to the functioning of the device. Removing it is also very much difficult, to tell you this virus is just the god of all another virus in case of harming up the device.

 Schedun

A well known android malware that can cause your Android to root itself automatically without the user being known of that and then it makes up the pathway for the live streaming of the Ads all here and there. You cannot find it alone but it comes patched with viral apps that you might install from the third party stores or websites. The main thing that disturbs the affected device user is that it cannot be removed easily and there is a need to reflash the whole OS so as to get rid of it.

 Gunpoder

This virus gets installed with the third-party emulators of Nintendo consoles found outside the Google Play Store. It means that this patched virus can just come on your device with the third party apps and can cause up the device and can hack up the games i.e most popular online games. To get rid of this virus you can reset your device but this isn’t proved to be fully effective all the time.
 Hummingbad

The device affected with this virus can download and install apps to the device by itself, steal up the information without your permission and hence left you to feel snubbed from inside as if you have lost up the control of your data as well as the device.
Cloned and Copied Apps


The apps related to some popular apps or any such clone of the app that you could download through the third party stores can push you in trouble as it can cause up your device to retrieve all the information and send it to the hackers or the spammers. To be secure always you should not use up the third party sources or install clone apps of any such popular apps which could be a planned idea of the hackers.
And after reading up to this article you have got up some idea about the most dangerous viruses that can attack Android devices and hence can harm up to the device. The main reason for writing this article is to just make you aware of the Viruses that could also be there on the Android devices and to make your device safe as you would be installing up the Antivirus apps. Just make your device safer by using up the Antivirus software!

How to Stop Wifi Stealing and Catch that Wifi Hacker

How to Stop Wifi Stealing and Catch that Wifi Hacker

How to Stop Wi-fi Stealing and Catch that Wi-fi H4ck3r

H4ck3r's who steals Wi-Fi

The best way to connect to the internet service is by using the Wi-fi connections that are usually wireless networks which anybody can access with permission when in range. This means that it requires some permissions which can be used to gain access to the internet service. Hence this can be hacked as hacking means to find or crack the credentials to login or gain access to some account etc. Mostly people are focused on hacking the wi-fi networks for gaining access to the internet service. Many persons have been targeted by hackers by breaking into their wi-fi network. You can stop them from breaking into your wi-fi network too.

How to Stop Wi-fi Stealing and Catch that Person

Go through the Steps that are given below to know how you can protect your wi-fi from H4ck3r's and also stop them from stealing your wi-fi.

Just follow the steps to stop wi-fi stealing and catch that person

First of all you have to login to your router. You can do this through going to the address “ 192.168.0.1 ” using search bar of your web browser or you can try the link “ routerlogin.com ”. This will take you to the router login panel where you have to login using your username and password that ISP has provided to you.
Login Page
Once you have successfully opened the admin account, you will then reach to the panel where you have to find for the option “Connected devices” or “Attached devices“. Press that options to know how many devices are connected to your wi-fi. This will also show you the IP address and device name of all the connected devices.

If you find any unknown device attached to your wi-fi then you can stop that person from using your wi-fi further by changing the password or block option from the panel. This will stop the person from using your network.
H4ck3r's could gain access to your wi-fi networks but you have to remember that are having full control on your device & network, so you can easily stop them from stealing your WiFi. Just follow the above method and you can easily know which device is being used to connect with your wi-fi and also how you can block it. Go and try this simple method to protect your wi-fi.

How to remove the hidden virus in your Pendrive

How to remove the hidden virus in your Pendrive

How to remove the hidden virus in your Pendrive


If your Pen Drive is infected with any
of the following viruses
* Autorun.inf
* new folder.exe
* Iexplorer.vbs
* Bha.vbs
* nfo.exe
* New_Folder.exe
* ravmon.exe
* RVHost.exe or any other files with extension.
Actually this viruses are hidden and can’t be seen even after you enable show hidden folders. Following simple dos command will change the attributes of these files ,there after you can remove it by pressing delete key.
# Follow these steps :
Step1:- :Type cmd in Run
Step2:- : Switch to the drive on which
pen drive is connected
(like C:\> h: enter)
Step3:- : type exactly as attrib -s -h
*.* /s /d and hit enter
(don’t forget spaces).
Now you can see the hidden virus files of your pendrive 
and you can delete them.

What is IP ( Internet Protocol )

What is IP ( Internet Protocol )

How you connect to the world....?

Internet Protocoling ( IP )

An IP address is a fascinating product of modern computer technology designed to allow one computer (or other digital device) to communicate with another via the Internet. IP addresses allow the location of literally billions of digital devices that are connected to the Internet to be pinpointed and differentiated from other devices. In the same sense that someone needs your mailing address to send you a letter, a remote computer needs your IP address to communicate with your computer.
"IP" stands for Internet Protocol, so an IP address is an Internet Protocol address. What does that mean? An Internet Protocol is a set of rules that govern Internet activity and facilitate completion of a variety of actions on the World Wide Web. Therefore an Internet Protocol address is part of the systematically laid out interconnected grid that governs online communication by identifying both initiating devices and various Internet destinations, thereby making two-way communication possible.
An IP address consists of four numbers, each of which contains one to three digits, with a single dot (.) separating each number or set of digits. Each of the four numbers can range from 0 to 255. Here's an example of what an IP address look as: 78.125.0.209. This innocuous-looking group of four numbers is the key that empowers you and me to send and retrieve data over our Internet connections, ensuring that our messages, as well as our requests for data and the data we've requested, will reach their correct Internet destinations. Without this numeric protocol, sending and receiving data over the World Wide Web would be impossible.

What is your IP's....?

There are 02 kind of IP's ( Internet Protocol )

  • Dynamic IP addresses
  • Static IP addresses

Dynamic IP addresses


Dynamic IP addresses


  • A dynamic IP address is an IP address that's automatically assigned to each connection, or node, of a network, like your smartphone, desktop PC, wireless tablet... whatever.
  • This automatic assignment of IP addresses is done by what's called a DHCP server.
  • A DHCP server assigned IP address is called dynamic because it will often be different on future connections to the network.
  • The "opposite" of a dynamic IP address is called a static IP address (one that was configured manually).
  • No doubt you've heard the term " IP address ". Unless you're a techie, though, you may not have more than a shadowy notion of what an IP address actually is or how it works. Let's explore the concept.

Static IP addresses

Static IP addresses

  • A static IP address is an IP address that was manually configured for a device, versus one that was assigned via a DHCP server.
  • A static IP address is called static because it doesn't change. This is the exact opposite of a dynamic IP address, which does change.
  • Static IP addresses are also sometimes referred to as fixed IP addresses or dedicated IP addresses.

" H4ck3r's focus on the weakest link in the security chains "

How to Find Vulnerabilities for Any Website Using Nikto

Welcome back!
Before attacking any website, it's critical to do good reconnaissance. A few minutes of recon can save you hours on a hack. Simply trying various attacks without first finding which attacks the site is vulnerable is pure foolishness.
There are a number of tools and applications to find vulnerabilities in websites, but one of the simplest (and one of my favorites) is nikto.
This small and simple tool examines a website and reports back to you the potential vulnerabilities that it found that you could use to exploit or hack the site. In addition, it's one of the most widely used website vulnerabilities tools in the industry and in many circles considered the industry standard.
Although this tool is extremely useful and effective, it is NOT stealthy. Any website with an IDS or other security measures in place will detect that you are scanning it. Originally designed for security testing, it was never meant to be stealthy.

Step 1 :- Fire Up Kali & Open Nikto

Let's fire up Kali and get started with nikto. Once we have Kali up and running, go to Kali Linux -> Vulnerability Analysis -> Misc Scanners -> nikto, like in the screenshot below.
Although there are many options in using nikto, we will limit ourselves here to the basic syntax, such as this:
  • nikto -h <IP or hostname>

Step 2 :- Scan the Web Server

  • Let's start with a safe web server on our own network. In this case, I have started the http service on another machine on my network. There is not a website hosted by this machine, just the web server. Let's scan it for vulnerabilities by typing:
    • nikto -h 192.168.1.104
    Nikto responds with a lot of information, as you can see below.
  • First, it tells us the server is Apache 2.2.14, probably on Ubuntu. It nailed this info and gives up more information on other potential vulnerabilities on this web server.
    Note near the bottom that it identifies some vulnerabilities with the OSVDB prefix. This is the Open Source Vulnerability Database. This is a database maintained of known vulnerabilities at www.osvdb.org, in addition to other databases I covered, such as SecurityFocus and Microsoft's Technet.
Step 3 :- Scan the Site

  • Let's try another site. In an earlier tutorial, we had hacked a web server named webscantest.com. Let's see what nikto can tell us about this site.
    • nikto -h webscantest.com
    Once again, it identifies the server (Apache) and then proceeds to identify numerous potential vulnerabilities pre-fixed with OSVDB. We can take a look at that website at www.osvdb.org to learn more about these vulnerabilities.

Now, let's use this site to find information on one of the vulnerabilities identified by nikto as OSVDB-877. We can put that reference number into the search function and it retrieves the following page.

Note, in lower half of this page there are cross-references to the various information sources about this vulnerability, as well as references to tools and filters such as Nikto, Nessus, and Snort.

Scan WonderHowTo

Let's scan a few more sites and see what it can tell us about these sites. Let's see what we can find out about our own website, www.wonderhowto.com.
  • nikto -h wonderhowto.com

As you can see, it tells us that WonderHowTo is using Microsoft's IIS 8.5 as a web server and then lists numerous potential vulnerabilities.
However, any attempt to exploit the vulnerabilities listed will reveal that they're all false-positives, as WonderHowTo simply returns a harmless 404 page. This is because WonderHowTo is not built on php or asp as the noted exploits expect.
False positives like this can appear because the scan does not actually execute each of the possible vulnerabilities, but rather scans to see if the server responds without error to known exploitable URLs.

Scan Facebook

Finally, lets point nikto at www.facebook.com.
  • nikto -h facebook.com
As you can see, Facebook is tightly secured with few vulnerabilities. As you can imagine, if Facebook weren't secure, every script-kiddie on the planet would be hacking it to see who his true love is chatting with online.

Tuesday, 20 March 2018

The Essential Skills to Becoming a Master Hacker

The Essential Skills to Becoming a Master Hacker

Many of my aspiring hackers have written to me asking the same thing. "What skills do I need to be a good hacker?"
As the hacker is among the most skilled information technology disciplines, it requires a wide knowledge of IT technologies and techniques. To truly be a great hacker, one must master many skills. Don't be discouraged if you don't have all the skills I list here, but rather use this list as a starting ground for what you need to study and master in the near future.

This is my overview list of required skills to enter the pantheon of this elite IT profession. I've broken the skills into three categories to help you go from one rung to the other more easily—fundamental, intermediate, and intangible skills—and have included links to related articles on Null Byte for you to get acquainted with.

The Fundamental Skills

These are the basics that every hacker should know before even trying to hack. Once you have a good grasp on everything in this section, you can move into the intermediary level.

Step 1 :- Basic Computer Skills

It probably goes without saying that to become a hacker you need some basic computer skills. These skills go beyond the ability to create a Word document or cruise the Internet. You need to be able to use the command line in Windows, edit the registry, and set up your networking parameters.
Many of these basic skills can be acquired in a basic computer skills course like A+

Step 2 :- Networking Skills

You need to understand the basics of networking, such as the following.
  • DHCP
  • NAT
  • Subnetting
  • IPv4
  • IPv6
  • Public v Private IP
  • DNS
  • Routers and switches
  • VLANs
  • OSI model
  • MAC addressing
  • ARP
As we are often exploiting these technologies, the better you understand how they work, the more successful you will be. Note that I did not write the two guides below, but they are very informative and cover some of the networking basics mentioned above.

Step 3 :- Linux Skills

It is extremely critical to develop Linux skills to become a hacker. Nearly all the tools we use as a hacker are developed for Linux and Linux gives us capabilities that we don't have using Windows.
Step 4 :- Wireshark or Tcpdump
Wireshark is the most widely used sniffer/protocol analyzer, while tcpdump is a command line sniffer/protocol analyzer. Both can be extraordinarily useful in analyzing TCP/IP traffic and attacks.

Step 5 :- Virtualization

You need to become proficient in using one of the virtualization software packages such as VirtualBox or VMWare Workstation. Ideally, you need a safe environment to practice your hacks before you take them out in real world. A virtual environment provides you a safe environment to test and refine your hacks before going live with them.

Step 6 :- Security Concepts & Technologies

A good hacker understands security concepts and technologies. The only way to overcome the roadblocks established by the security admins is to be familiar with them. The hacker must understand such things as PKI (public key infrastructure), SSL (secure sockets layer), IDS (intrusion detection system), firewalls, etc.
The beginner hacker can acquire many of these skills in a basic security course such as Security+.

Step 7 :- Wireless Technologies

In order to be able to hack wireless, you must first understand how it works. Things like the encryption algorithms (WEP, WPA, WPA2), the four-way handshake, and WPS. In addition, understanding such as things as the protocol for connection and authentication and the legal constraints on wireless technologies.

The Intermediate Skills
This is where things get interesting, and where you really start to get a feel for your capabilities as a hacker. Knowing all of these will allow you to advance to more intuitive hacks where you are calling all the shots—not some other hacker.

Step 8 :- Scripting

Without scripting skills, the hacker will be relegated to using other hackers' tools. This limits your effectiveness. Every day a new tool is in existence loses effectiveness as security admins come up with defenses.
To develop your own unique tools, you will need to become proficient at least in one of the scripting languages including the BASH shell. These should include one of Perl, Python, or Ruby.

Step 9 :- Database Skills

If you want to be able to proficiently hack databases, you will need to understand databases and how they work. This includes the SQL language. I would also recommend the mastery of one of the major DBMS's such SQL Server, Oracle, or MySQL.

Step 10 :- Web Applications

Web applications are probably the most fertile ground for hackers in recent years. The more you understand about how web applications work and the databases behind them, the more successful you will be. In addition, you will likely need to build your own website for phishing and other nefarious purposes.

Step 11 :- Forensics

To become good hacker, you must not be caught! You can't become a pro hacker sitting in a prison cell for 5 years. The more you know about digital forensics, the better you can become at avoiding and evading detection.

Step 12 :- Advanced TCP/IP

The beginner hacker must understand TCP/IP basics, but to rise to the intermediate level, you must understand in intimate details the TCP/IP protocol stack and fields. These include how each of the fields (flags, window, df, tos, seq, ack, etc.) in both the TCP and IP packet can be manipulated and used against the victim system to enable MitM attacks, among other things.

Step 13 :- Cryptography

Although one doesn't need to be a cryptographer to be a good hacker, the more you understand the strengths and weaknesses of each cryptographic algorithm, the better the chances of defeating it. In addition, cryptography can used by the hacker to hide their activities and evade detection.

Step 14 :- Reverse Engineering

Reverse engineering enables you to open a piece of malware and re-build it with additional features and capabilities. Just like in software engineering, no one builds a new application from scratch. Nearly every new exploit or malware uses components from other existing malware.
In addition, reverse engineering enables the hacker to take an existing exploit and change its signature so that it can fly past IDS and AV detection.

The Intangible Skills

Along with all these computer skills, the successful hacker must have some intangible skills. These include the following.

Step 15 :- Think Creatively

There is ALWAYS a way to hack a system and many ways to accomplish it. A good hacker can think creatively of multiple approaches to the same hack.

Step 16 :- Problem-Solving Skills

A hacker is always coming up against seemingly unsolvable problems. This requires that the hacker be accustomed to thinking analytically and solving problems. This often demands that the hacker diagnose accurately what is wrong and then break the problem down into separate components. This is one of those abilities that comes with many hours of practice.

Step 17 :- Persistence

A hacker must be persistent. If you fail at first, try again. If that fails, come up with a new approach and try again. It is only with a persistence that you will be able to hack the most secured systems.
  • So...You Want to Be a Hacker...?
I hope this gives you some guidelines as to what one needs to study and master to ascend to the intermediate level of hacking. In a future article, I'll discuss what you need to master to ascend into the advanced or master hacker level, so keep coming back, my novice hackers!
Vivaan Shrivastav