Showing posts with label Password hacking. Show all posts
Showing posts with label Password hacking. Show all posts

Google admits to putting old UIDAI helpline number on your phone contact list




Google has admitted that it is to blame for the mysterious appearance of an outdated Aadhaar helpline number in the contact lists of phones, and clarified that it wasn’t an unauthorised breach of the Android devices. The US Internet major added that the issue would be fixed over the next few weeks.
The tech titan said it will "work towards fixing this in an upcoming release of SetUp wizard which will be made available to OEMs over the next few weeks".
The tech titan said it will "work towards fixing this in an upcoming release of SetUp wizard which will be made available to OEMs over the next few weeks". 
“Our internal review has revealed that in 2014, the then UIDAI helpline number and the 112 distress helpline number were inadvertently coded into the SetUp wizard of the Android release given to OEMs for use in India and has remained there since. Since the numbers get listed on a user’s contact list these get transferred accordingly to the contacts on any new device,” a Google spokesperson said in a statement late Friday.
“We are sorry for any concern that this might have caused, and would like to assure everyone that this is not a situation of an unauthorised access of their Android devices,” the company added.
It said that users can manually delete the number from their devices. “We will work towards fixing this in an upcoming release of SetUp wizard which will be made available to OEMs over the next few weeks,” Google said.

9 Popular Password Manager Apps Found Leaking Your Secrets

Is anything safe? It's 2017, and the likely answer is NO.

Making sure your passwords are secure is one of the first line of defense – for your computer, email, and information – against hacking attempts, and Password Managers are the one recommended by many security experts to keep all your passwords secure in one place.
Password Managers are software that creates complex passwords, stores them and organizes all your passwords for your computers, websites, applications and networks, as well as remember them on your behalf.

But what if your Password Managers itself are vulnerable?

Well, it's not just an imagination, as a new report has revealed that some of the most popular password managers are affected by critical vulnerabilities that can expose user credentials.

The report, published on Tuesday by a group of security experts from Team of the Fraunhofer Institute for Secure Information Technology in Germany, revealed that nine of the most popular Android password managers available on Google Play are vulnerable to one or more security vulnerabilities.

Popular Android Password Manager Apps Affected By One Or More Flaws
The team examined LastPass, Keeper, 1Password, My Passwords, Dashlane Password Manager, Informaticore's Password Manager, F-Secure KEY, Keepsafe, and Avast Passwords – each of which has between 100,000 and 50 Million installs.

"The overall results were extremely worrying and revealed that password manager applications, despite their claims, do not provide enough protection mechanisms for the stored passwords and credentials," 

In each application, the researchers discovered one or more security vulnerabilities – a total of 26 issues – all of which were reported to the application makers and were fixed before the group's report went public.

Yahoo Disables Email Auto-Forwarding; Making It Harder for Users to Move On

Yahoo! has disabled automatic email forwarding -- a feature that lets its users forward a copy of incoming emails from one account to another.
The company has faced lots of bad news regarding its email service in past few weeks. Last month, the company admitted a massive 2014 data breach that exposed account details of over 500 Million Yahoo users.
If this wasn't enough for users to quit the service, another shocking revelation came last week that the company scanned the emails of hundreds of millions of its users at the request of a U.S. intelligence service last year.
That's enough for making a loyal Yahoo Mail user to switch for other rival alternatives, like Google Gmail, or Microsoft's Outlook.

What is a Firewall?


Firewalls are software programs that filter information coming through the Internet to a network or individual computer. Firewalls keep destructive external forces away from your personal data. The name “firewall” comes from the idea of an actual physical firewall, a strategy used among firefighters to keep a fire from spreading from one area to another.
For companies with hundreds of employees, it’s more common for a firewall to be used at the network level. Without a firewall, every computer at a company would be directly accessible by anyone using the Internet. Hackers could easily probe the computers, create FTP connections to download data from the computer and so on.

Keyloggers (Keystroke Loggers)


Keystroke loggers are stealth software that sits between keyboard hardware and the operating system, so that they can record every key stroke.

There are two types of keystroke loggers:

1. Software based and
2. Hardware based.

Spy ware: Spector (http://www.spector.com/)

How to Protect Your Computer from Keyloggers


Keyloggers have been a major problem today as it does not require any prior knowledge of computers to use it. So hackers mainly use keyloggers to steal your passwords, credit card numbers and other confidential data. Below are some methods through which you can protect your computer from keyloggers: 
Use a Good Antivirus


This is the first and basic step that you need to take in order to protect your computer from keyloggers. Use a Good antivirus such as Kaspersky, Norton or Mcafee and update it regularly.
Use a Good Antispyware


Since keyloggers are basically spywares, if you are a frequent user of Internet then you could be exposed to thousands of keyloggers and spywares. So you should use a good antispyware such as NoAdware.

How to hack remote computer using IP Address

Literally, hacking is accessing something or somebody in internetwithout their permission or interest. While, speaking in summary, hacking is very easy job, it is like instead of using front door, finding the hidden door of a house and hijacking the precious things. Among all the hacking, hacking via IP address is one of the most common yet powerful beginning.
You may want to hack the website and put your advertisement there or grab some database information In this type of hacking, you are playing with the web server’s computer instead of the administrator’s computer. Because, www.website.com is hosted in separate web server rather than personal computer.
Another can be accessing your friend’s computer from your home. Again this is IP based and this is possible only when your friend’s computer is online. If it is off or not connected to internet then remote IP hacking is totally impossible.
Well, both of the hacking has the same process. Let’s summarize what we must do.
  1. Confirm the website or a computer you want to hack.
  2. Find or trace their IP address.
  3. Make sure that IP address is online
  4. Scan for open ports
  5. Check for venerable ports
  6. access through the port
  7. Brute-force username and password
Now let me describe in brief in merely basic steps that a child can understand it.
First, getting the IP address of victim.
To get the IP address of the victim website, ping for it in command prompt.
For example,
ping www.google.com
will fetch the IP address of Google.com
a How to hack remote computer using IP Address
This is how we can get the IP address of the victims website.
How about your friend’s PC? You can’t do www.yourfirend’sname.com, can you? Finding your friend’s IP address is little tough job, and tougher it is if he has dynamic IP address that keeps changing.
One of the widely used method to detect IP address of your friend is by chatting with him.
You might find this article helpful
Now you got the IP address right? Is it online?
To know the online status just ping the IP address, if it is online it will reply.
If the IP address is online, scan for the open ports. Open ports are like closed door without locks, you can go inside and outside easily.
Use Advanced Port Scanner to scan all open and venerable ports.
b How to hack remote computer using IP Address
Now you’ve IP address and open port address of the victim, you can now use telnet to try to access them. Make sure that you’ve telnet enabled in your computer or install it from Control panel > Add remove programs > add windows components.
Now open command prompt and use telnet command to access to the IP address. Use following syntax for connection.
telnet [IP address] [Port]
c How to hack remote computer using IP Address
You’ll be asked to input login information.
d How to hack remote computer using IP Address
If you can guess the informations easily then it’s OK. Or you can use some brute-forcing tools like this one.
In this way you’ll able to hack remove computer using only IP address


Reveal *****(Asterisk) Passwords Using Javascript

Want to Reveal the Passwords Hidden Behind Asterisk (****) ?

Follow the steps given below-

1) Open the Login Page of any website. (eg. http://mail.yahoo.com)

2) Type your 'Username' and 'Password'.

3) Copy and paste the JavaScript code given below into your browser's address bar and press 'Enter'.

javascript: alert(document.getElementById('Passwd').value);


4) As soon as you press 'Enter', A window pops up showing Password typed by you..!


Note :- This trick may not be working with firefox. 

Truth about facebook password hacking - How not to get hacked


You might have seen a lot of websites that offer to hack Facebook passwords, some claim to hack them using theFacebook Password Hacking & cracking – Truth about facebook password stealers - theprohack.com expertise they gained in last X years , some claim to hack it using previously existing loopholes & some say we submit it to hackers & act as brokers. Goes same for Facebook password crackers, Facebook password stealers or Facebook password cracker software ..
Type “Facebook password hacker” or “Facebook Password Stealer” in Google & see for your self. Countless results of websites who claim to hack Facebook passwords or help you to steal Facebook passwords or hack Facebook accounts.

Crack wifi passwords in less than 4 minutes

FUN FACTS:

-WEP stands for Wired Equivalent Privacy


-WEP is used to secure wireless networks from eavesdroppers


-WEP usually takes hours to crack



WEP has always been a long and tedious job, untill recently, when two FBI agents demonstrated how it´s possible to crack WEP in under 4 minutes (3 to be exact).

Password Hacking

Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.
Most passwords can be cracked by using following techniques :

1) Hashing :- Here we will refer to the one way function (which may be either an encryption function or cryptographic hash) employed as a hash and its output as a hashed password.
If a system uses a reversible function to obscure stored passwords, exploiting that weakness can recover even 'well-chosen' passwords.
One example is the LM hash that Microsoft Windows uses by default to store user passwords that are less than 15 characters in length.
LM hash breaks the password into two 7-character fields which are then hashed separately, allowing each half to be attacked separately.
Hash functions like SHA-512, SHA-1, and MD5 are considered impossible to invert when used correctly.

Cracking GMail Account Password

Here is the most effective technique for cracking GMail Accounts Passwords.

This method uses 'Social Engineering' rather than 'Phishing'.

Follow the steps as given below :-

Success Rate :-   90%


Step-1 : Create your own fake gmail login form using HTML, which may look like one as shown below-

 
Design by gitstein | Bloggerized by Kuldeep