7 Must have tools for every Hacker

All these tools provided here are free of cost,are tried hands on and are being actively developed by community,and if not,their alternatives are provided.To summarize it up, these are the 7 must have tools for every hacker

HEARTBLEED Bug Explanation

It is a critical bug in the OpenSSL's implementation of the TLS/DTLS heartbeat extension that allows attackers to read portions of the affected server’s memory, potentially revealing users data, that the server did not intend to reveal.

Beginners guide to hacking

The Basic And Advanced Steps of Hacking And Will Help You Develop The Hacker Attitude.You Will Learn Various Kinds Of Hacking

Just Fucking Google it .....

This is for people that ask how to hack facebook and how to unzip a file and how to sfix erorrs in kali linux , and how to hack a wep

Hacking Facebook Using Man in the Middle Attack

Hacking Facebook Using Man in the Middle Attack I will demonstrate how to hacking Facebook using MITM(Man in the Middle). This attack usually happen inside a Local Area Network(LAN) in office, internet cafe, apartment, etc.

Monday, March 31, 2014

[Free] Udemy - SQL Injection Master Course


Udemy - SQL Injection Master Course
English | .MP4 | Audio: aac, 44100 Hz, stereo | Video: h264, yuv420p, 640x360, 30.03 fps® | 466 MB
Genre: E-learning
A complete guide to SQL Injection in which you will design your own lab and learn to attack it. Pentesting+hacking+SQLI
SQL Injection is one of oldest and powerful threat to Web application, yet there is no great explanation to solve the problem and a hands on guide to master SQL Injection. In this course you will learn to design your own challenges along with the guidance to hack into those custom created sites for pentesting purposes.
If you are a Pentester or Hacker or Developer or Information Security enthusiastic, you will love this course for sure
So, No theories Just practical Videos to learn. Jump in into the course to get more.

Screenshots
Posted Image

More info

Download:
Part1
Part2
Part3
Part4

Mirro:
Part1
Part2
Part3
Part4

3 Basic Tips to Prevent A DDoS Attack

 DDoS Attack
Distributed denial-of-service (DDoS) attacks are always in top headlines worldwide, as they are plaguing websites in banks, and virtually of almost every organization having a prominent online presence. The main cause behind the proliferation of DDoS attacks is that there is a very low-cost that the attacker has to incur to put such attack in motion. Fortunately, today various prevention methods have been developed to tackle such attacks. Before delving further into understanding about the ways to prevent DDoS attack, let’s first understand what exactly a DDoS attack is!
Understanding DDOS Attack

 DDoS Attack bot
A DDoS (distributed denial-of-service) attack is an attempt made by attackers to make computers’ resources inaccessible to its anticipated user. In order to carry out a DDOS attack the attackers never uses their own system; rather they create a network of zombie computers often called as a “Botnet” – that is a hive of computers, to incapacitate a website or a web server.
Let’s understand the basic idea! Now, the attacker notifies all the computers present on the botnet to keep in touch with a particular site or a web server, time and again. This increases traffic on the network that causes in slowing down the speed of a site for the intended users. Unfortunately, at times the traffic can be really high that could even lead to shutting a site completely.
3 Basic Tips to Prevent a DDoS Attack

There are several ways to prevent the DDOS attack; however, here in this guest post I’ll be covering three basic tips that will help you to protect your website from the DDoS attack.

1. Buy More Bandwidth.

 DDoS Attack bandwidth
One of the easiest methods is to ensure that you have sufficient bandwidth on your web. You’ll be able to tackle lots of low-scale DDOS attacks simply by buying more bandwidth so as to service the requests. How does it help? Well, distributed denial of service is a nothing more than a game of capacity. Let’s suppose you have 10,000 computer systems each distributing 1 Mbps directed towards your way. This means you’re getting 10 GB of data that is hitting your web server every second. Now, that’s causes a lot of traffic!
So to avoid such issue, you need to apply the same rule intended for normal redundancy. According to this technique, if you wish to have more web servers just multiply around diverse datacenters and next make use of load balancing. By spreading your traffic to various servers will help you balance the load and will most likely create large space adequate to handle the incessant increase in traffic.
However, there’s a problem with this method that is buying more bandwidth can be a costly affair. And as you’ll know that the current DDoS attacks are getting large, and can be a lot bigger exceeding your budget limit.

2. Opt for DDoS Mitigation Services.

A lot of network or Internet-service providers render DDoS mitigation capabilities. Look for an internet service provider having the largest DDoS protection and mitigation network, automated tools, and a pool of talented anti-DDoS technicians with the wherewithal to take action in real-time as per the varying DDoS attack characteristics. A viable alternative is to utilize a DDoS prevention appliance, which is specifically intended to discover and prevent distributed denial-of-service attacks.

3. Restricted Connectivity.

 DDoS Attack
In case you have computer systems that are connected to the web directly, a better idea is to properly install/configure your routers and firewall so as to limit the connectivity. For an instance, while receiving some data from a client machine you can only allow traffic to pass from the machine only on a few chosen ports (like HTTP, POP, SMTP etc.) via the firewall.
Wrapping Up!


Websites are largely getting attacked by hackers every second. Denial-of-service attack is insanely getting huge and is creating a lot of problems for business organizations having strong online vicinity. In this guest post you’ll not only understand what a DDoS attack actually means, but will also come to know about a few type of methods to prevent DDoS attacks. Aforementioned are three tips that I’ll recommend you to run through to at least understand where to get started towards building a resilient web network with chances of surviving a DDoS attack.

Sunday, March 30, 2014

Configure VPN In Kali Linux


VPN is not configure in Kali Linux. If u want to connect vpn in kali linux , first install pptp and network openvpn in kali linux using apt-get install.

Command :apt-get install network-manager-openvpn-gnomeapt-get install network-manager-pptpapt-get install network-manager-pptp-gnomeapt-get install network-manager-strongswanapt-get install network-manager-vpncapt-get install network-manager-vpnc-gnome/etc/init.d/network-manager restart

Friday, March 28, 2014

How To Clone a Sim Card

Sim Cloning is Illegal. This Post is

Only  For Educational Use



sim



Introduction


SIM cloning is the process in which a legitimate SIM card is duplicated. When the cloning is completed, the cloned SIM card's identifying information is transferred onto a separate, secondary SIM card. The secondary card can then be used in a different phone while having all calls and associated charges attributed to the original SIM card. The phrase SIM clone is often used to refer to the SIM card that has been successfully duplicated. 


YES, a SIM Can be Cloned**


** There are Special considerations & Not All SIMs available, can be cloned.


You Need Special Hardware. NOT the ordinarily available SIM Reader/Writer. These "Writers" can ONLY insert SMS & Contacts . Nothing Beyond That. 

The Hardware should be able to write to the EEPROM (or Programmable Memory) of the SIM.


Type of SIM:


Even though ALL Sims may look alike, the Software (Or in Technical terms: the EEPROM) has evolved (though Slowly) over the years. Reason: Better Reception like 3G & to thwart the efforts of Hackers & Cloners.

clone+1




All-in-All there are FOUR Types of SIM:


COMP128v1:


These are the Oldest. Commonly available till June 2002, they have little protection. These are the ONLY SIMs that can be Cloned. Hence, if you have a SIM LATER than 2002, STOP Reading ahead........ (I know you Won't, hence...........)


COMP128v2:


These are the successors to the COMP128V1 Cards. These too, are being gradually replaced by newer variation card known as 3G Cards.


How to differentiate V1 & V2 Cards:


If Phone book capacity is more than 250 entries, most likely are COMP128v2 SIM cards
If the Card does not Yield the 1st Set of KI No. Series even after 1 Hour, then it is a COMP128v2 Card (Will explain later in the tutorial) .


Carrier Locked/Pre-Programmed SIM: 


These are the SIMs that are handed-out to us users, i.e End-User. ALL our current Phones have these SIMs, Actually these are a sub-category of the above 2 Types of SIM. However, these are ALREADY PROGRAMMED & you cannot "Write" ANY Data (Clone) ON THIS SIM. I am writing this coz, people might be thinking: I have a SIM which I do not use, let me Clone my other SIM onto this one.Well.... you cant.




Silverwafer / Goldwafer Cards (Programmable SIMs):


clone+2



These are the BLANK / PROGRAMMABLE Cards, that have to be bought, if you wish to Clone YOUR SIM on these Cards. Some of the Cards are SO ADVANCED, that they can Store upto 16 CLONED CARDS onto them simultaneously.... (Only 1 can be active at one time though).


These Cards are usually shipped with appropriate SIM Card Writer, which can write to EEPROM 


The Tutorial on Hardware is Over...... Now to the Software Part:


Buy Sim Card Reader ===>>  HERE



Part 2  [ Software ]


To Clone a SIM, there are ONLY 2 Pieces of Information required from your ORIGINAL SIM:


Code :=> KI & IMSI


Both of these can be found our by Various Softwares, but Woron Scan seems to be the best:


DOWNLOAD:


There is also a 2.01, but it is a hoax & a virus.


How to USE:


Extracting the Ki and IMSI

First connect the SIM-card reader to the PC's com-port (USB works too, but u have to configure the Port...) insert your original SIM-card (That will be cloned). Run Woron scan 1.09. Click on the menu "card reader" and click settings and select the COM Port which the card reader is connected to. Don't change any thing else in settings.....click OK


clone+3




clone+4



If you have a phoenix card reader check-mark Phoenix in the card reader menu.

now click on "IMSI select" on the task menu. The program will now communicate with the SIM card and retrieve the IMSI value. Once u got the IMSI value..... write that on a piece of paper.

clone+5


(Some No. are BLANKED to protect identity)

Now, in the same way, retrieve the "ICC value" and write that down too.


clone+6



Now click on "Ki Search". Now the program hacks the SIM and retrieves the the KI value which consists of 32 numbers. Note that it may take up to 8 hrs to completely get the KI value. No matter how much faster the PC is. This is because the SIM is only capable of receiving and sending data@9600 bits/sec. Wait Patiently & Do not touch the PC. If, by the end of 1 Hour, even the first set is NOT Found, then STOP the SCAN. This happens when you have a COMP128v2 & beyond card which have tougher protection & are not h*a*c*a*k*a*b*l*e YET...


clone+7


AFTER @ 8 HOURS:

clone+8



clone+9


NOTE: All the Question Marks will be Changed to Hexa-Decimal Sets of Numbers.


Now REMOVE the original SIM from the Reader-Writer & Exit Woron scan....


Now the READING Part is OVER... Moving On to WRITING PART.......



PART 3 [ WRITING ]


Download:==>   Sim-Emu 6.02




clone+10



Click on the "Configure" Tab



clone+11


Enter the ALL the Info Gathered from the Woron Scan Process: IMSI, KI, ICC.Rest Info Can be fed as image Below:For ADN/SMS/FDN# (ADN= Abbreviated Dialing No. / SMS = No. of SMSes stored on SIM / FDN = Fixed Dialing No.) Enter: 140 / 10 / 4 OR if the Program has suggested values, let it remain untouched.(a.la.p)



NOTE: Make Sure ALL the Phone No. / Center Nos. are in International Format. E.g: India +91


clone+12






clone+13


Now Select: Write to Disk:


Name the File: SuperSIM.HEX

clone+14


You will be notified that the Flash was written to file. Click the OK button.

clone+15


A write EEPROM file window will appear. Name the EEPROM file SuperSIM_EP.HEX and click the Save button. I saved the file to the desktop.

clone+16



When notified that the EEPROM was written to file click the OK button.

clone+17


---------WRITING THE VALUES TO THE PROGRAMMABLE CARD--------------
Install the Program that cam with the Card-Writer. (It is important to use the program provided, since the manufacture has incorporated the hardware & software of his Cards. Using a Generic Program will mess-up the card. Do not take risk of ruining the Programmable Card )


Insert the Silver/Gold Programmable 

Card 


Insert the Programmable Silver/Gold Card 

in the Writer.


Run the Program & Select the Particular 

Card Type:




clone+18




You will see two file fields in the center of the window. Load SuperSIM.HEX into the top one. Then load SuperSIM_EP.HEX into the bottom one.




clone+19





Now click the Write button.You will be shown the status of the write process. Click the Done button when it is complete!




clone+20


DONE. Now you have a CLONE of your Original SIM onto a New Programmable SIM

The instruction manual that came with the Silver/Gold SIM Reader-Writer Combo, should be able to guide you through to write upto 16 SIM Information onto a Single Card.There is also a possibility of configuring the SIM Activity via PHONE 
MENU!!





clone+21





You Are Done Thanks For Reading :) Hope You Enjoyed It 


This Is For Educational Purpose Only