Techinfomator

Be your own Teacher if you don't have the best one.
Start self-learning today about I.T with us.
Welcome to the new Technology Informer.

Wednesday, February 10, 2016

Cain & Abel

In this Blog you learn about Cain & Abel and how to install it on Window 10.


What is Cain & Abel ?

Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols. The program does not exploit any software vulnerabilities or bugs that could not be fixed with little effort. It covers some security aspects/weakness present in protocol's standards, authentication methods and caching mechanisms; its main purpose is the simplified recovery of passwords and credentials from various sources, however it also ships some "non standard" utilities for Microsoft Windows users.

Cain & Abel has been developed in the hope that it will be useful for network administrators, teachers, security consultants/professionals, forensic staff, security software vendors, professional penetration tester and everyone else that plans to use it for ethical reasons. The author will not help or support any illegal activity done with this program. Be warned that there is the possibility that you will cause damages and/or loss of data using this software and that in no events shall the author be liable for such damages or loss of data. Please carefully read the License Agreement included in the program before using it.

The latest version is faster and contains a lot of new features like APR (Arp Poison Routing) which enables sniffing on switched LANs and Man-in-the-Middle attacks. The sniffer in this version can also analyze encrypted protocols such as SSH-1 and HTTPS, and contains filters to capture credentials from a wide range of authentication mechanisms. The new version also ships routing protocols authentication monitors and routes extractors, dictionary and brute-force crackers for all common hashing algorithms and for several specific authentications, password/hash calculators, cryptanalysis attacks, password decoders and  some not so common utilities related to network and system security.

download Cain & Abel

Please change your browser setting if you getting warring and it showing Back to safety. Do not worry the link is totally safe.

How to Install on Windows 10 :

 To Install Cain & Abel on Window 10  you need to perform a simple steps before installations :-

1. Open properties of setup you download.
2. Open compatibility.
3.Tick the box "Run this program in compatibility mode for:"
4. Click and Select Windows 7.


5. Now you are ready to install your Cain & Abel.
6. Now just double click the setup and install it.
7.Now run it and open "Configure" from tool bar you can see Cain & Abel is Working getting your ip's.




Thank You and keep Following us for more Interesting Post's. And leave a Comment if you found post helping or have any problems.

Tuesday, February 9, 2016

Learn Real Ethical Hacking

C|EH V9


This is the worlds most advanced ethical hacking course with 18 of the most current security domains any ethical hacker will ever want to know when they are planning to beef up the information security posture of their organization. In 18 comprehensive modules, the course covers 270 attack technologies, commonly used by hackers​.



REAL LIFE SCENARIO:-

The security experts have designed over 140 labs which mimic real time scenarios in the course to help you “live” through an attack as if it were real and provide you with access to over 2200 commonly used hacking tools to immerse you into the hacker world.


Download CEH v9 PDF’s


Download CEH v9 Tools

How to Transfer Files between two PCs using LAN/Ethernet Cable?

Sharing large amounts of data with your friends can really be a hassle if you don’t know of efficient and easy ways to do it. One way is you can use an external storage medium such as an external HDD, USB, etc. This way is convenient for most of us, best for the average users, regardless of the fact that it drains 50% of our precious time in the process. Think about it. first you’ve to copy files to the external media and then copy it again from there to another computer. Isn’t that a waste of time clearly? Here’s when you’ve to look for alternatives if you treasure your time. The best way would be the one which would consume the least time, and must be easy to get along with. This is only possible when you directly transfer file to the another Computer, eliminating the need of a third media.
Windows comes along with built-in File Sharing feature that can be used to share data throughout your network. Don’t worry if you don’t have a network, you can use this feature even by easily linking two computers via a LAN cable, or in other words, by networking two Computers.
This tutorial is really easy to follow and will help you in getting started with LAN file transfers in no time.
Things You Will Require
  • Ethernet/LAN cable (technical name: RJ45/8P8C)

 
Two Computers with Ethernet/LAN ports.
 
 
 
How to get things done?
  • Start up both the computers. You know you have to do this.
  • Network two of them with the LAN Cable. I mean to say, insert the jack of one end into one of the Computers, and obviously, the other goes into the second Computer.
 
 
 
 
  • You will see that both the Computers will recognize an unknown LAN network. Go to “Network & Sharing Center” and Enable File Sharing.
  • Go to “Network” (or “View Network Connections” on older versions of Windows).
 
  • You’d find the networked PC listed over there. Open it, and enter the Username and Password of the other Computer you’re trying to connect to.
For you to be able to connect to another PC, it is necessary that the User Account on the other PC has a password set.
 
Now you can view the Shared Folders of that Computer to which you’re connected.
How to share Folders over the network?
  • Right-click on the Folder and open “Properties”, browse over to the “Sharing” tab and click on the “Advanced Sharing” button.
 
  • In the “Advanced Sharing” dialogue box, Check the “Share this folder” option. Click “Apply” and then “Ok”. This may take some time  if you have a large number of files in that folder, just be patient
 
 
You now know how to share a Folder as well as how to connect two computers to a Network and enable sharing. This is how you can easily drag and drop files between two computers and save yourself from bugging data transfers. Hope you liked this tutorial, if you have any queries, don’t hesitate to drop comments below
 
 

 
 
 



 

Monday, February 8, 2016

TechInfomator





We are the Technology Informer. We believe that if you want to be a success full I.T engineer.You should not only get knowledge from Universities or Colleges. But you need to learn more and extra from your regular studies.And you need a right path for your I.T career.You just arrive the right place.Here we provide you the knowledge of whole new Technologies & things that you should know about them. We also meet you to the different I.T career paths by which you found the right career path best for you.

                  In this blog you got know about following things:-

                  1.TECHNOLOGY.
                  2.I.T CAREER. 
                  3.HACKING.             
                  4.PROGRAMMING.
                  5.NETWORKING.
                  6.SECURITY.
                  7.TOOLS.

Phases of HACKING

Today, we are going to discuss about the various phases of Hacking which a Hacker must follow to implement a successful attack.

The five phases of Hacking are as follow:

  1. Reconnaissance
  2. Scanning
  3. Gaining Access
  4. Maintaining Access
  5. Clearing Tracks



 Reconnaissance:- This is the primary phase where the Hacker tries to collect as much information as possible about the target. It includes Identifying the Target, finding out the target’s IP Address Range, Network, DNS records, etc.


Scanning:- It involves taking the information discovered during reconnaissance and using it to examine the network. Tools that a hacker may employ during the scanning phase can include dialers, port scanners, network mappers, sweepers, and vulnerability scanners. Hackers are seeking any information that can help them perpetrate attack such as computer names, IP addresses, and user accounts.


Gaining Access:- After scanning, the hacker designs the blueprint of the network of the target with the help of data collected during Phase 1 and Phase 2. This is the phase where the real hacking takes place. Vulnerabilities discovered during the reconnaissance and scanning phase are now exploited to gain access. The method of connection the hacker uses for an exploit can be a local area network (LAN, either wired or wireless), local access to a PC, the Internet, or offline. Examples include stack based buffer overflows, denial of service (DoS), and session hijacking. These topics will be discussed in later chapters. Gaining access is known in the hacker world as owning the system.



Maintaining Access:- Once a hacker has gained access, they want to keep that access for future exploitation and attacks. Sometimes, hackers harden the system from other hackers or security personnel by securing their exclusive access with backdoor, rootkits, and Trojans. Once the hacker owns the system, they can use it as a base to launch additional attacks. In this case, the owned system is sometimes referred to as a zombie system.


Covering Tracks:- Once hackers have been able to gain and maintain access, they cover their tracks to avoid detection by security personnel, to continue to use the owned system, to remove evidence of hacking, or to avoid legal action. Hackers try to remove all traces of the attack, such as log files or intrusion detection system (IDS) alarms. Examples of activities during this phase of the attack include stenography, the use of tunneling protocols, and altering log files.  

 

Hacking for Beginners





The first and the primary thing is that you have to learn “Programming“.
The reason behind learning programming is that each and everything that you see and use on the internet is nothing but programming.



Programming languages:


•Web-Design :/Developing:
•HTML5 (Somewhat Easy)
•CSS3 (Somewhat Easy)
•JavaScript (Somewhat Easy – Average)
•PHP (Somewhat Average – Hard)
•MySQL (Somewhat Average – Hard

Computer programming:

•Batch (Easy)
•C++ (Average)
•Python (Easy)
•Visual Basics (Easy with Visual Studio)

Most of us have a strong desire to become a hacker, but really don’t know where to start. If you are in a similar situation, this article will surely help you out. On a regular basis, I get a lot of emails from people loaded with questions like “How to Become a Hacker”, “What is the Best Way to Learn”, “Where to Start” and so on. Instead of answering every such question, I decided to come up with a detailed article on the topic so that it can help all those hacker enthusiasts who have similar kind of questions in their mind?


What Skills do I Need to Become a Hacker?


In simple words, there is no magic to becoming a Hacker. But, like anything else that is worthwhile, it takes dedication and willingness to learn. It is most important to have a basic knowledge of the topics such as operating system basics and its working, computer networks, network security and programming.

What is the Best Way to Become a Hacker?

As said earlier, the best way to turn yourself into a hacker is to start from the basics. You will have to master the basics to build a strong foundation. And once this is done, you’ll be in a position to explore new ideas and start thinking like a hacker. You can follow the below mentioned steps to start off your career as a hacker.



Let me throw some light on these Languages:

HTML5 is the newest version of HTML, every paragraph, sentence or images that you see on internet are made all in HTML, and the appearance or look, size, etc etc… are made in CSS.
So in short, HTML is the content and CSS is the layout (how it is designed).

JavaScript is another most powerful and popular scripting languages used on the web… and is the oldest as the web is. And you can do some cool things with it such as making a slideshows with it, or open hundreds of tabs at once, with a simple easy trick

PHP and MySQL are used for databases. Most of the chats/forums are based on PHP.
 It will be really good if you understand those languages, they plays very vital part in website security (especially MySQL).

If you get a small idea about computer programming it will be good for you. Although you can’t make websites with them, but of course you can make other nice things like apps, little programs, games and viruses.. too



Let’s discuss computer languages more:

Batch is a much common languages that is used worldwide, not for professional things, but for small fun and effective things.
 Batch enables you to create small viruses or can make PC crash, however this is not the primary purpose of Batch.
With C++ you can literally make anything and everything!
 The only disadvantage about it is that, you have to make a separate GUI for it, (Graphic User Interface)
Visual Basics is also a great language, but it’s not that much easy. Visual Basics enables you to make your own professional app, a lot of RATs are made in Visual Basics, and you can make your own small browsers with it!


Staying Anonymous is also Important(Thinking like hackers):



 The most important thing for a hacker is to remain “anonymous” i.e. when you will do any illegal activities or even any ethical stuff you won’t be caught by cops.
 As i have already told you about a tool to hide your IP, a VPN and Proxy as we have discussed above.
 A VPN like I already explained hides your IP by connecting you to another server, a proxy actually does the same!
 You only have to use a VPN or Proxy when you’re doing your activities, after them, you turn it off.
Let me explain it a bit. People will do everything to find you, so even a little mistake can lead you to cops or you can be found! You have to put people on a dead track.
Whenever planning to do some hacking stuff you start your PC on with a proxy, and then do you work and then turn off the proxy after completing the work and don’t use internet for 20-30 min

after that, you start it up without any proxy, and do your legal normal things.



How to DO Hacking:
You can hack with number of methods, I have listed some of them

•Wi-Fi hacking
•RAT-infecting
•Key-logging
•SQL-injection
•E-whoring
•Brute-Forcing


Begin with the Basics:

Step-1: For beginners who have little or no previous knowledge of hacking, it is always better to start off from the basics. Instead of directly learning how to hack, you can begin exploring more about topics such as computer networks, network ports, firewalls, common network protocols like IP address, HTTP, FTP, DNS, SMTP etc. along with how each of those stuffs work.
You can also begin to learn more about alternate operating systems Linux whose knowledge becomes very much essential in the field of hacking. The more you learn about the basics, the more easy it is to find vulnerabilities and device exploits. Once you develop a basic understanding of the fundamental concepts, you will be in a position to easily understand various hacking techniques that are in practice.

Find a Good Source to Start Learning:

To be a good professional hacker one think which you ought to imbibe is the spirit of a true hacker. It is practically impossible that you will imbibe this spirit on your own without any source of inspiration, therefore , for you it is advisable to read up some old pieces that might help you know what hacking is all about. Two examples of such old pieces include, ‘Jargon File’ as well as ‘Hackers Manifesto’ written by The Mentor, the technical issues addressed may be old but the essence surpasses the boundaries of time.

Learn Programming (Optional):


If you want to take your hacking skills one step ahead, programming is something that you can’t skip down. Although you can easily find a lot of ready made tools and programs that let you hack with ease, it is always better to have some basic knowledge of programming languages like HTML, PHP and JavaScript so that you will be in a position to develop your own tools and exploit codes. However, if you do not wish to learn programming you can skip this step and still be a good hacker.