I Am King Of India

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

Never Stop Me Now In This World

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

Programming Master Mind Coder

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

Pages

Master Coder

Hacking News , Cyber Crime , Ethical Hacking , CCNA, Seo , Google Adsense , Web Development ,

Showing posts with label LEARN HACKING – FOR BEGINNERS. Show all posts
Showing posts with label LEARN HACKING – FOR BEGINNERS. Show all posts

What is Botnet and What it can do - Detailed Analysis


What is Botnet and What it can do - Detailed Analysis

botnet hacking
I will give you a detailed tutorial on Botnet. That what is the purpose of creating a botnet and also i will tell you that what a botnet is. Thinking like a hacker i will show you what else hackers try to do using these botnet. Often you might have listened that a website is under Ddos attack and also that the server of the website at which it was hosted suddenly crashed. All such things are done majorly using botnet.

Lets! Start the tutorial.....

What is botnet?

Botnet came from Robot Network, Means an organized automated army of zombies. Which can be used for creating a Ddos attack as well as spammy actions of flooding any inbox or spreading the viruses. Actually this army consists of large number of compromised computers. These computers are compromised using a trojan that often opens IRC (Internet Relay Chat) channel that is waiting for the commands of the person who is actually controlling the botnet as botnet is "Zombie Army".

In basic language bots are program which are automated or you can say robotic. In simple context bots refer to those computers which can be controlled from the external source which may be programmed in them. Now the attacker gains access to the computers by virus or any miscellaneous code. Most of the times computer are operating normally but they were found as the part of the botnet.

Explaining A zombie Network:

A zombie computer (often shortened as zombie) is a computer connected to the Internet that has been compromised by a cracker, computer virus or trojan horse and can be used to perform malicious tasks of one sort or another under remote direction. Botnets of zombie computers are often used to spread e-mail spam and launch denial-of-service attacks. Most owners of zombie computers are unaware that their system is being used in this way. Because the owner tends to be unaware, these computers are metaphorically compared to zombies. Such computers combine together to form a Zombie Network. And thus attacker can compromise large servers of the corporations.

A ‘bot’ is a type of malware which allows an attacker to gain complete control over the affected computer. There are literally tens of thousands of computers on the Internet which are infected with some type of ‘bot’ and don’t even realize it.

History of botnet:

Zombies have been used extensively to send e-mail spam; as of 2005, an estimated 50–80% of all spam worldwide was sent by zombie computers.This allows spammers to avoid detection and presumably reduces their bandwidth costs, since the owners of zombies pay for their own bandwidth. This spam also greatly furthers the spread of Trojan horses; as Trojans, they are not self-replicating. They rely on the movement of e-mails or spam to grow, whereas worms can spread by other means also.
botnet scheme
So, here is the benefit of this scheme that attacked launches ddos attack and can host phishings but when any cyber security department wants to investigate they merely find out those attackers who don't know that they are involved in it i mean zombies. Since, zombies are being controlled by third party.

botnet attacking anonymously
So, I thought after seeing the scheme in the picture which i have made you might have the basic idea now.

Now, the cracker or the hacker just wants to execute the file in the victim computer he can make this possible by using any social engineering trick, i-e he can send them through emails, can upload it to torrents by renaming the name to some latest movie which isn't available at net for free or software we can say and many others tricks, he just wants that the victim must double click his program so that his computer may become part of botnet. Also the program is programmed in such a way that it attached it self to that startup of the windows so that it may get activated every time. We can make this possible by using some simple scripting. or even command prompt i-e batch files.

So, the use of botnets consists of four major components:

a). Infection of a machine with malicious botnet code.

b). Connection to the command and control channel set up by the attacker.

c). Downloading of secondary payload on command of the attacker.

d). Performing an attack or additional scanning, gathering information.

Well, in this way mobiles can also be vulnerable to such attacks, as often we synchronize mobiles with computers or else we update there OS also. I think its possible to harm mobiles also and to steal confidential information as described above in points. Therefore the users of the mobiles must be conscious enough to check those anonymous applications which they are installing.

What can a hacker make a botnet do?

Yes, its important question lets go in deep, as i have also told you above that what he can so, but lets describe here deeply! Well a botnet can do anything which you can imagine by the use of many computers connected in network.

1- Distributed Denial-of-Service Attacks (DDoS)
2- Spamming
3- Sniffing Traffic & Keylogging
4- Infecting New Hosts
5- Identity Theft
6- Attacking IRC Chat Networks
7- Hosting of Illegal Software
8- Google AdSense Abuse & Advertisement Addons
9- Manipulating online polls
10- Remote use of computers
11- Attacking bank computers (Atm or any others since they are also networked)

Yes, Ofcourse these are of vast uses. Often hacker embeds the .exe file under the image or the popup, announcing that you have won 1lac million dollars but this is fake actually they are enticing you to click on the image so that .exe may install in your computer to make you computer part of botnet.

Distributed Denial-of-Service Attacks (DDoS):
Botnets are frequently used for Distributed Denial of Service attacks. An attacker can control a large number of compromised hosts and servers from a remote workstation, exploiting their bandwidth and sending connection requests to the target host. Many networks suffered from such attacks, and in some cases the culprits were found amongst competition. Twitter was also once under ddos attack. Read about Ddos here (Flood A Website by Ddos: Denial Of Service Attack), as i have covered it already. Also Torrents can be used to achieve this goal read here (Bitorrent as Ddos) to get more information.

Spamming:
What will you do if you come to know about spamming source or a phishing? Yeah, you will ban the ip of the attacker but will it make you safe? No, Because today botnet are hot favourite of spammers, Loosing (Blocking) one zombie won't greatly effect there attack. Single spam message could be sent to the botnet and then distributed across bots by use of controllers, which send the spam. The spammer stays anonymous and all the blame goes to infected computers. Now these spam messages may contain some other trojans and programs which will make you computer zombie also. Yes, So in other way we can say that its a chain if we are smart enough we can recognize it thats the reason i am making this post.

Keylogging and Sniffing Data Exchange i-e Traffic:
Bots can be used to sniff all the data which the machine is exchanging, it means that hacker can get your passorods and bank accounts pin codes without letting you know that what is going on. Therefore sniffing the traffic can let the hacker know a lot about you that what yu browse over internet and what are your habits, Well about keyloggers it is obvious that they will keylog your all keyboard strokes and will send it to hacker.
Read my Posts on RATs!

Identity Theft:
Yes, After getting alot of information about the victim now the hacker can make fake id,s of him or her to harm or to black mail victim. Using it the hacker can do something bad by using his/her id and the blame comes at victim he or she has to pay for it.

Attacking IRC Chat Networks:
Botnets are also used for attacks against Internet Relay Chat IRC networks, also called clone attack. In attack, the controller orders each bot to connect a large number of clones to the victim IRC network. The victim is flooded by service request from thousands of bots or thousands of channel-joins by these cloned bots. In this way, the victim IRC network is brought down similar to a DDoS attack.

Hosting of Illegal softwares and Movies:
Since a hacker can control a large number of hosts using bots therefore these bots can be used to host softwares and illegal movies i-e such movies whose copyrights are not purchased and is camrip, or else is illegal or banned in a country, So that the hacker may bot be caught and all the blame comes to the server os hosting owners. Since these hostings are controlled under one controller therefore its much easier to host such things.

Doing Google Adsense, Chitika, Infolinks or similar click frauds:
As the botnet consists of large number of zombies (Infected computers) which are connected to the internet as shown in the figure with different ip address. Now, as we know that chitika, google adsense and infolinks pay per click, Therefore the hacker will use very zombie to click on the adds after a short time regularly and thus this will be great source of income as the same ip,s are not clicking ads rather they are from different locations or different countries.

Manipulating Online Polls:
Online polls are getting more and more attention and it is rather easy to manipulate them with botnets. Since every bot has a distinct IP address, therefore every casted vote means that a real person has voted from his laptop or personal computer.

What is Botnet and What it can do - Detailed Analysis


What is Botnet and What it can do - Detailed Analysis

botnet hacking
I will give you a detailed tutorial on Botnet. That what is the purpose of creating a botnet and also i will tell you that what a botnet is. Thinking like a hacker i will show you what else hackers try to do using these botnet. Often you might have listened that a website is under Ddos attack and also that the server of the website at which it was hosted suddenly crashed. All such things are done majorly using botnet.

Lets! Start the tutorial.....

What is botnet?

Botnet came from Robot Network, Means an organized automated army of zombies. Which can be used for creating a Ddos attack as well as spammy actions of flooding any inbox or spreading the viruses. Actually this army consists of large number of compromised computers. These computers are compromised using a trojan that often opens IRC (Internet Relay Chat) channel that is waiting for the commands of the person who is actually controlling the botnet as botnet is "Zombie Army".

In basic language bots are program which are automated or you can say robotic. In simple context bots refer to those computers which can be controlled from the external source which may be programmed in them. Now the attacker gains access to the computers by virus or any miscellaneous code. Most of the times computer are operating normally but they were found as the part of the botnet.

Explaining A zombie Network:

A zombie computer (often shortened as zombie) is a computer connected to the Internet that has been compromised by a cracker, computer virus or trojan horse and can be used to perform malicious tasks of one sort or another under remote direction. Botnets of zombie computers are often used to spread e-mail spam and launch denial-of-service attacks. Most owners of zombie computers are unaware that their system is being used in this way. Because the owner tends to be unaware, these computers are metaphorically compared to zombies. Such computers combine together to form a Zombie Network. And thus attacker can compromise large servers of the corporations.

A ‘bot’ is a type of malware which allows an attacker to gain complete control over the affected computer. There are literally tens of thousands of computers on the Internet which are infected with some type of ‘bot’ and don’t even realize it.

History of botnet:

Zombies have been used extensively to send e-mail spam; as of 2005, an estimated 50–80% of all spam worldwide was sent by zombie computers.This allows spammers to avoid detection and presumably reduces their bandwidth costs, since the owners of zombies pay for their own bandwidth. This spam also greatly furthers the spread of Trojan horses; as Trojans, they are not self-replicating. They rely on the movement of e-mails or spam to grow, whereas worms can spread by other means also.
botnet scheme
So, here is the benefit of this scheme that attacked launches ddos attack and can host phishings but when any cyber security department wants to investigate they merely find out those attackers who don't know that they are involved in it i mean zombies. Since, zombies are being controlled by third party.

botnet attacking anonymously
So, I thought after seeing the scheme in the picture which i have made you might have the basic idea now.

Now, the cracker or the hacker just wants to execute the file in the victim computer he can make this possible by using any social engineering trick, i-e he can send them through emails, can upload it to torrents by renaming the name to some latest movie which isn't available at net for free or software we can say and many others tricks, he just wants that the victim must double click his program so that his computer may become part of botnet. Also the program is programmed in such a way that it attached it self to that startup of the windows so that it may get activated every time. We can make this possible by using some simple scripting. or even command prompt i-e batch files.

So, the use of botnets consists of four major components:

a). Infection of a machine with malicious botnet code.

b). Connection to the command and control channel set up by the attacker.

c). Downloading of secondary payload on command of the attacker.

d). Performing an attack or additional scanning, gathering information.

Well, in this way mobiles can also be vulnerable to such attacks, as often we synchronize mobiles with computers or else we update there OS also. I think its possible to harm mobiles also and to steal confidential information as described above in points. Therefore the users of the mobiles must be conscious enough to check those anonymous applications which they are installing.

What can a hacker make a botnet do?

Yes, its important question lets go in deep, as i have also told you above that what he can so, but lets describe here deeply! Well a botnet can do anything which you can imagine by the use of many computers connected in network.

1- Distributed Denial-of-Service Attacks (DDoS)
2- Spamming
3- Sniffing Traffic & Keylogging
4- Infecting New Hosts
5- Identity Theft
6- Attacking IRC Chat Networks
7- Hosting of Illegal Software
8- Google AdSense Abuse & Advertisement Addons
9- Manipulating online polls
10- Remote use of computers
11- Attacking bank computers (Atm or any others since they are also networked)

Yes, Ofcourse these are of vast uses. Often hacker embeds the .exe file under the image or the popup, announcing that you have won 1lac million dollars but this is fake actually they are enticing you to click on the image so that .exe may install in your computer to make you computer part of botnet.

Distributed Denial-of-Service Attacks (DDoS):
Botnets are frequently used for Distributed Denial of Service attacks. An attacker can control a large number of compromised hosts and servers from a remote workstation, exploiting their bandwidth and sending connection requests to the target host. Many networks suffered from such attacks, and in some cases the culprits were found amongst competition. Twitter was also once under ddos attack. Read about Ddos here (Flood A Website by Ddos: Denial Of Service Attack), as i have covered it already. Also Torrents can be used to achieve this goal read here (Bitorrent as Ddos) to get more information.

Spamming:
What will you do if you come to know about spamming source or a phishing? Yeah, you will ban the ip of the attacker but will it make you safe? No, Because today botnet are hot favourite of spammers, Loosing (Blocking) one zombie won't greatly effect there attack. Single spam message could be sent to the botnet and then distributed across bots by use of controllers, which send the spam. The spammer stays anonymous and all the blame goes to infected computers. Now these spam messages may contain some other trojans and programs which will make you computer zombie also. Yes, So in other way we can say that its a chain if we are smart enough we can recognize it thats the reason i am making this post.

Keylogging and Sniffing Data Exchange i-e Traffic:
Bots can be used to sniff all the data which the machine is exchanging, it means that hacker can get your passorods and bank accounts pin codes without letting you know that what is going on. Therefore sniffing the traffic can let the hacker know a lot about you that what yu browse over internet and what are your habits, Well about keyloggers it is obvious that they will keylog your all keyboard strokes and will send it to hacker.
Read my Posts on RATs!

Identity Theft:
Yes, After getting alot of information about the victim now the hacker can make fake id,s of him or her to harm or to black mail victim. Using it the hacker can do something bad by using his/her id and the blame comes at victim he or she has to pay for it.

Attacking IRC Chat Networks:
Botnets are also used for attacks against Internet Relay Chat IRC networks, also called clone attack. In attack, the controller orders each bot to connect a large number of clones to the victim IRC network. The victim is flooded by service request from thousands of bots or thousands of channel-joins by these cloned bots. In this way, the victim IRC network is brought down similar to a DDoS attack.

Hosting of Illegal softwares and Movies:
Since a hacker can control a large number of hosts using bots therefore these bots can be used to host softwares and illegal movies i-e such movies whose copyrights are not purchased and is camrip, or else is illegal or banned in a country, So that the hacker may bot be caught and all the blame comes to the server os hosting owners. Since these hostings are controlled under one controller therefore its much easier to host such things.

Doing Google Adsense, Chitika, Infolinks or similar click frauds:
As the botnet consists of large number of zombies (Infected computers) which are connected to the internet as shown in the figure with different ip address. Now, as we know that chitika, google adsense and infolinks pay per click, Therefore the hacker will use very zombie to click on the adds after a short time regularly and thus this will be great source of income as the same ip,s are not clicking ads rather they are from different locations or different countries.

Manipulating Online Polls:
Online polls are getting more and more attention and it is rather easy to manipulate them with botnets. Since every bot has a distinct IP address, therefore every casted vote means that a real person has voted from his laptop or personal computer.

What is Botnet and What it can do - Detailed Analysis


What is Botnet and What it can do - Detailed Analysis

botnet hacking
I will give you a detailed tutorial on Botnet. That what is the purpose of creating a botnet and also i will tell you that what a botnet is. Thinking like a hacker i will show you what else hackers try to do using these botnet. Often you might have listened that a website is under Ddos attack and also that the server of the website at which it was hosted suddenly crashed. All such things are done majorly using botnet.

Lets! Start the tutorial.....

What is botnet?

Botnet came from Robot Network, Means an organized automated army of zombies. Which can be used for creating a Ddos attack as well as spammy actions of flooding any inbox or spreading the viruses. Actually this army consists of large number of compromised computers. These computers are compromised using a trojan that often opens IRC (Internet Relay Chat) channel that is waiting for the commands of the person who is actually controlling the botnet as botnet is "Zombie Army".

In basic language bots are program which are automated or you can say robotic. In simple context bots refer to those computers which can be controlled from the external source which may be programmed in them. Now the attacker gains access to the computers by virus or any miscellaneous code. Most of the times computer are operating normally but they were found as the part of the botnet.

Explaining A zombie Network:

A zombie computer (often shortened as zombie) is a computer connected to the Internet that has been compromised by a cracker, computer virus or trojan horse and can be used to perform malicious tasks of one sort or another under remote direction. Botnets of zombie computers are often used to spread e-mail spam and launch denial-of-service attacks. Most owners of zombie computers are unaware that their system is being used in this way. Because the owner tends to be unaware, these computers are metaphorically compared to zombies. Such computers combine together to form a Zombie Network. And thus attacker can compromise large servers of the corporations.

A ‘bot’ is a type of malware which allows an attacker to gain complete control over the affected computer. There are literally tens of thousands of computers on the Internet which are infected with some type of ‘bot’ and don’t even realize it.

History of botnet:

Zombies have been used extensively to send e-mail spam; as of 2005, an estimated 50–80% of all spam worldwide was sent by zombie computers.This allows spammers to avoid detection and presumably reduces their bandwidth costs, since the owners of zombies pay for their own bandwidth. This spam also greatly furthers the spread of Trojan horses; as Trojans, they are not self-replicating. They rely on the movement of e-mails or spam to grow, whereas worms can spread by other means also.
botnet scheme
So, here is the benefit of this scheme that attacked launches ddos attack and can host phishings but when any cyber security department wants to investigate they merely find out those attackers who don't know that they are involved in it i mean zombies. Since, zombies are being controlled by third party.

botnet attacking anonymously
So, I thought after seeing the scheme in the picture which i have made you might have the basic idea now.

Now, the cracker or the hacker just wants to execute the file in the victim computer he can make this possible by using any social engineering trick, i-e he can send them through emails, can upload it to torrents by renaming the name to some latest movie which isn't available at net for free or software we can say and many others tricks, he just wants that the victim must double click his program so that his computer may become part of botnet. Also the program is programmed in such a way that it attached it self to that startup of the windows so that it may get activated every time. We can make this possible by using some simple scripting. or even command prompt i-e batch files.

So, the use of botnets consists of four major components:

a). Infection of a machine with malicious botnet code.

b). Connection to the command and control channel set up by the attacker.

c). Downloading of secondary payload on command of the attacker.

d). Performing an attack or additional scanning, gathering information.

Well, in this way mobiles can also be vulnerable to such attacks, as often we synchronize mobiles with computers or else we update there OS also. I think its possible to harm mobiles also and to steal confidential information as described above in points. Therefore the users of the mobiles must be conscious enough to check those anonymous applications which they are installing.

What can a hacker make a botnet do?

Yes, its important question lets go in deep, as i have also told you above that what he can so, but lets describe here deeply! Well a botnet can do anything which you can imagine by the use of many computers connected in network.

1- Distributed Denial-of-Service Attacks (DDoS)
2- Spamming
3- Sniffing Traffic & Keylogging
4- Infecting New Hosts
5- Identity Theft
6- Attacking IRC Chat Networks
7- Hosting of Illegal Software
8- Google AdSense Abuse & Advertisement Addons
9- Manipulating online polls
10- Remote use of computers
11- Attacking bank computers (Atm or any others since they are also networked)

Yes, Ofcourse these are of vast uses. Often hacker embeds the .exe file under the image or the popup, announcing that you have won 1lac million dollars but this is fake actually they are enticing you to click on the image so that .exe may install in your computer to make you computer part of botnet.

Distributed Denial-of-Service Attacks (DDoS):
Botnets are frequently used for Distributed Denial of Service attacks. An attacker can control a large number of compromised hosts and servers from a remote workstation, exploiting their bandwidth and sending connection requests to the target host. Many networks suffered from such attacks, and in some cases the culprits were found amongst competition. Twitter was also once under ddos attack. Read about Ddos here (Flood A Website by Ddos: Denial Of Service Attack), as i have covered it already. Also Torrents can be used to achieve this goal read here (Bitorrent as Ddos) to get more information.

Spamming:
What will you do if you come to know about spamming source or a phishing? Yeah, you will ban the ip of the attacker but will it make you safe? No, Because today botnet are hot favourite of spammers, Loosing (Blocking) one zombie won't greatly effect there attack. Single spam message could be sent to the botnet and then distributed across bots by use of controllers, which send the spam. The spammer stays anonymous and all the blame goes to infected computers. Now these spam messages may contain some other trojans and programs which will make you computer zombie also. Yes, So in other way we can say that its a chain if we are smart enough we can recognize it thats the reason i am making this post.

Keylogging and Sniffing Data Exchange i-e Traffic:
Bots can be used to sniff all the data which the machine is exchanging, it means that hacker can get your passorods and bank accounts pin codes without letting you know that what is going on. Therefore sniffing the traffic can let the hacker know a lot about you that what yu browse over internet and what are your habits, Well about keyloggers it is obvious that they will keylog your all keyboard strokes and will send it to hacker.
Read my Posts on RATs!

Identity Theft:
Yes, After getting alot of information about the victim now the hacker can make fake id,s of him or her to harm or to black mail victim. Using it the hacker can do something bad by using his/her id and the blame comes at victim he or she has to pay for it.

Attacking IRC Chat Networks:
Botnets are also used for attacks against Internet Relay Chat IRC networks, also called clone attack. In attack, the controller orders each bot to connect a large number of clones to the victim IRC network. The victim is flooded by service request from thousands of bots or thousands of channel-joins by these cloned bots. In this way, the victim IRC network is brought down similar to a DDoS attack.

Hosting of Illegal softwares and Movies:
Since a hacker can control a large number of hosts using bots therefore these bots can be used to host softwares and illegal movies i-e such movies whose copyrights are not purchased and is camrip, or else is illegal or banned in a country, So that the hacker may bot be caught and all the blame comes to the server os hosting owners. Since these hostings are controlled under one controller therefore its much easier to host such things.

Doing Google Adsense, Chitika, Infolinks or similar click frauds:
As the botnet consists of large number of zombies (Infected computers) which are connected to the internet as shown in the figure with different ip address. Now, as we know that chitika, google adsense and infolinks pay per click, Therefore the hacker will use very zombie to click on the adds after a short time regularly and thus this will be great source of income as the same ip,s are not clicking ads rather they are from different locations or different countries.

Manipulating Online Polls:
Online polls are getting more and more attention and it is rather easy to manipulate them with botnets. Since every bot has a distinct IP address, therefore every casted vote means that a real person has voted from his laptop or personal computer.

Common Email Hacking Methods

Gone are the days when email hacking was a sophisticated art. Today any body can access hacking tips through the Internet and start hacking your yahoo or hotmail account. All that is needed is doing a search on google with keywords like “how to hack yahoo”, “hack yahoo messenger”, “hotmail hack program” etc. The following article is not an effort to teach you email hacking, but it has more to do with raising awareness on some common email hacking methods.
Hackers can install keylogger programs in the victim’s computer. This program can spy on what the user types from the keyboard. If you think that you can just uninstall such programs, you are wrong as they are completely hidden. After installation, the hacker will use a password and hot keys to enable the keylogger. He can then use the hot keys and password to access your key entry details.
A keylogger program is widely available on the internet.some of them are listed below
Win-Spy Monitor
Realtime Spy
SpyAgent Stealth
Spy Anywhere
For more information on keyloggers and it’s usage refer my post Hacking an email account.
Even if direct access to your computer is not possible, hackers can still install a key logger from a remote place and access your computer using Remote Administration Tools (RATs).
Another way of getting your password is the use of fake login pages that look exactly like the real one. So, beware of the web pages you visit. Also if you find your computer behaving oddly, there is a chance that some spy program is running. On such occasions it is better to try and remove the malware or reformat the entire hard disk.A detailed Email Hacking tutorial is discussed in the post Hacking an email account.

Common Email Hacking Methods

Gone are the days when email hacking was a sophisticated art. Today any body can access hacking tips through the Internet and start hacking your yahoo or hotmail account. All that is needed is doing a search on google with keywords like “how to hack yahoo”, “hack yahoo messenger”, “hotmail hack program” etc. The following article is not an effort to teach you email hacking, but it has more to do with raising awareness on some common email hacking methods.
Hackers can install keylogger programs in the victim’s computer. This program can spy on what the user types from the keyboard. If you think that you can just uninstall such programs, you are wrong as they are completely hidden. After installation, the hacker will use a password and hot keys to enable the keylogger. He can then use the hot keys and password to access your key entry details.
A keylogger program is widely available on the internet.some of them are listed below
Win-Spy Monitor
Realtime Spy
SpyAgent Stealth
Spy Anywhere
For more information on keyloggers and it’s usage refer my post Hacking an email account.
Even if direct access to your computer is not possible, hackers can still install a key logger from a remote place and access your computer using Remote Administration Tools (RATs).
Another way of getting your password is the use of fake login pages that look exactly like the real one. So, beware of the web pages you visit. Also if you find your computer behaving oddly, there is a chance that some spy program is running. On such occasions it is better to try and remove the malware or reformat the entire hard disk.A detailed Email Hacking tutorial is discussed in the post Hacking an email account.

Common Email Hacking Methods

Gone are the days when email hacking was a sophisticated art. Today any body can access hacking tips through the Internet and start hacking your yahoo or hotmail account. All that is needed is doing a search on google with keywords like “how to hack yahoo”, “hack yahoo messenger”, “hotmail hack program” etc. The following article is not an effort to teach you email hacking, but it has more to do with raising awareness on some common email hacking methods.
Hackers can install keylogger programs in the victim’s computer. This program can spy on what the user types from the keyboard. If you think that you can just uninstall such programs, you are wrong as they are completely hidden. After installation, the hacker will use a password and hot keys to enable the keylogger. He can then use the hot keys and password to access your key entry details.
A keylogger program is widely available on the internet.some of them are listed below
Win-Spy Monitor
Realtime Spy
SpyAgent Stealth
Spy Anywhere
For more information on keyloggers and it’s usage refer my post Hacking an email account.
Even if direct access to your computer is not possible, hackers can still install a key logger from a remote place and access your computer using Remote Administration Tools (RATs).
Another way of getting your password is the use of fake login pages that look exactly like the real one. So, beware of the web pages you visit. Also if you find your computer behaving oddly, there is a chance that some spy program is running. On such occasions it is better to try and remove the malware or reformat the entire hard disk.A detailed Email Hacking tutorial is discussed in the post Hacking an email account.

Track Email Delivery

Track Email Delivery

Reading this post for the only reason you read the title, track email delivery, isn't it. Whenever you send something important as mail you are always worried about whether it got read or not so here I 'll tell you about two services that will help you track your email messages.
 
Read Notify:
www.ReadNotify.com is professional e-mail tracking service. Service is paid and hence when you'll register they will offer you only 25 credits for demo. Service is damn good and complete information about your e-mail is traced out. It not only returns information about your mail got read or not but also brings information about IP address, time, location, web browser used and OS used to read sent email. It will also send you information about the mail has been forwarded or not or how many times it got read by recipient. Read Notify is most trusted email tracking service and hence used by many companies and even spammers.
To check out how a receipt appears click here.

Get Notify:
www.GetNotify.com is free counter part to www.ReadNotify.com. It also tracks emails but details are not as detailed as Read Notify. I have heard from many people that its service is not good but believe me they are not as detailed as Read Notify but their service isn't that crap. I am using it since one year and I don't have any complaints just because it never gave me any chance, so if someone has defamed Get Notify in front of you, try it before you accept his/her words, I guarantee you'll find the defamer wrong.

As a personal judgment I don't deny Read Notify is better than Get Notify but its not that bad either and don't forget it's 100% free, you have to compromise a little on free stuff. As a final verdict I 'll say Read Notify is best email tracking service whereas Get Notify is best free email tracking service.

How They Work:
Both use a same kind of strategy they ask you to embed email with a mini image provided by them while sending e-mail(Please note that this image is so small to get detected). When email is opened, this image sends all information about email to the person asked for receipt. No matter images are enabled or disabled this image will surely send information.

Don't bother about how you gonna use service because after registration both provide a cool video that demonstrates how to use their service and get most of it.

Thanks for visiting. Have a nice time and please don't forget to tell me about what you feel about above information about tracking email delivery.
 

Track Email Delivery

Track Email Delivery

Reading this post for the only reason you read the title, track email delivery, isn't it. Whenever you send something important as mail you are always worried about whether it got read or not so here I 'll tell you about two services that will help you track your email messages.
 
Read Notify:
www.ReadNotify.com is professional e-mail tracking service. Service is paid and hence when you'll register they will offer you only 25 credits for demo. Service is damn good and complete information about your e-mail is traced out. It not only returns information about your mail got read or not but also brings information about IP address, time, location, web browser used and OS used to read sent email. It will also send you information about the mail has been forwarded or not or how many times it got read by recipient. Read Notify is most trusted email tracking service and hence used by many companies and even spammers.
To check out how a receipt appears click here.

Get Notify:
www.GetNotify.com is free counter part to www.ReadNotify.com. It also tracks emails but details are not as detailed as Read Notify. I have heard from many people that its service is not good but believe me they are not as detailed as Read Notify but their service isn't that crap. I am using it since one year and I don't have any complaints just because it never gave me any chance, so if someone has defamed Get Notify in front of you, try it before you accept his/her words, I guarantee you'll find the defamer wrong.

As a personal judgment I don't deny Read Notify is better than Get Notify but its not that bad either and don't forget it's 100% free, you have to compromise a little on free stuff. As a final verdict I 'll say Read Notify is best email tracking service whereas Get Notify is best free email tracking service.

How They Work:
Both use a same kind of strategy they ask you to embed email with a mini image provided by them while sending e-mail(Please note that this image is so small to get detected). When email is opened, this image sends all information about email to the person asked for receipt. No matter images are enabled or disabled this image will surely send information.

Don't bother about how you gonna use service because after registration both provide a cool video that demonstrates how to use their service and get most of it.

Thanks for visiting. Have a nice time and please don't forget to tell me about what you feel about above information about tracking email delivery.
 

Track Email Delivery

Track Email Delivery

Reading this post for the only reason you read the title, track email delivery, isn't it. Whenever you send something important as mail you are always worried about whether it got read or not so here I 'll tell you about two services that will help you track your email messages.
 
Read Notify:
www.ReadNotify.com is professional e-mail tracking service. Service is paid and hence when you'll register they will offer you only 25 credits for demo. Service is damn good and complete information about your e-mail is traced out. It not only returns information about your mail got read or not but also brings information about IP address, time, location, web browser used and OS used to read sent email. It will also send you information about the mail has been forwarded or not or how many times it got read by recipient. Read Notify is most trusted email tracking service and hence used by many companies and even spammers.
To check out how a receipt appears click here.

Get Notify:
www.GetNotify.com is free counter part to www.ReadNotify.com. It also tracks emails but details are not as detailed as Read Notify. I have heard from many people that its service is not good but believe me they are not as detailed as Read Notify but their service isn't that crap. I am using it since one year and I don't have any complaints just because it never gave me any chance, so if someone has defamed Get Notify in front of you, try it before you accept his/her words, I guarantee you'll find the defamer wrong.

As a personal judgment I don't deny Read Notify is better than Get Notify but its not that bad either and don't forget it's 100% free, you have to compromise a little on free stuff. As a final verdict I 'll say Read Notify is best email tracking service whereas Get Notify is best free email tracking service.

How They Work:
Both use a same kind of strategy they ask you to embed email with a mini image provided by them while sending e-mail(Please note that this image is so small to get detected). When email is opened, this image sends all information about email to the person asked for receipt. No matter images are enabled or disabled this image will surely send information.

Don't bother about how you gonna use service because after registration both provide a cool video that demonstrates how to use their service and get most of it.

Thanks for visiting. Have a nice time and please don't forget to tell me about what you feel about above information about tracking email delivery.
 

Step By Step Hacking Tutorials

Dear visitor I have tried my best to place every article as easy as I can but anyhow if you think there is something on which an explanation is required or you felt something was more difficult to understand then please feel free to ask, your questions are most welcome and will surely be answered. While posting I may post randomly on any topic but at last you'll find them arranged in proper order and categories here. If you loved reading us then please don't forget to recommend us to your friends by your favorite social bookmarking sites and social networks, please don't use offensive words while commenting or asking questions. Thanks for visiting, enjoy learning.

Introduction

What Is Hacking And Type OF Hackers  


Hackers Laws And Crimes Rules

Reconnaissance


Enumeration


Tools Tutorials
Netcat
Network Scanner Nmap
How To Use SuperScan 4
Nessus On Windows
Nessus On Linux
DarkComet RAT:Tutorial
L0phtCrack(All Chapters)
John The Ripper(All Chapters)
Wireshark Tutorial (All Chapters)

Other 

Google Hacking

Step By Step Hacking Tutorials

Dear visitor I have tried my best to place every article as easy as I can but anyhow if you think there is something on which an explanation is required or you felt something was more difficult to understand then please feel free to ask, your questions are most welcome and will surely be answered. While posting I may post randomly on any topic but at last you'll find them arranged in proper order and categories here. If you loved reading us then please don't forget to recommend us to your friends by your favorite social bookmarking sites and social networks, please don't use offensive words while commenting or asking questions. Thanks for visiting, enjoy learning.

Introduction

What Is Hacking And Type OF Hackers  


Hackers Laws And Crimes Rules

Reconnaissance


Enumeration


Tools Tutorials
Netcat
Network Scanner Nmap
How To Use SuperScan 4
Nessus On Windows
Nessus On Linux
DarkComet RAT:Tutorial
L0phtCrack(All Chapters)
John The Ripper(All Chapters)
Wireshark Tutorial (All Chapters)

Other 

Google Hacking

Step By Step Hacking Tutorials

Dear visitor I have tried my best to place every article as easy as I can but anyhow if you think there is something on which an explanation is required or you felt something was more difficult to understand then please feel free to ask, your questions are most welcome and will surely be answered. While posting I may post randomly on any topic but at last you'll find them arranged in proper order and categories here. If you loved reading us then please don't forget to recommend us to your friends by your favorite social bookmarking sites and social networks, please don't use offensive words while commenting or asking questions. Thanks for visiting, enjoy learning.

Introduction

What Is Hacking And Type OF Hackers  


Hackers Laws And Crimes Rules

Reconnaissance


Enumeration


Tools Tutorials
Netcat
Network Scanner Nmap
How To Use SuperScan 4
Nessus On Windows
Nessus On Linux
DarkComet RAT:Tutorial
L0phtCrack(All Chapters)
John The Ripper(All Chapters)
Wireshark Tutorial (All Chapters)

Other 

Google Hacking

What is CAPTCHA and How it Works?

CAPTCHA or Captcha (pronounced as cap-ch-uh) which stands for “Completely Automated Public Turing test to tell Computers and Humans Apart” is a type of challenge-response test to ensure that the response is only generated by humans and not by a computer. In simple words, CAPTCHA is the word verification test that you will come across the end of a sign-up form while signing up for Gmail or Yahoo account. The following image shows the typical samples of CAPTCHA.


Captcha
Almost every Internet user will have an experience of CAPTCHA in their daily Internet usage, but only a few are aware of what it is and why they are used. So in this post you will find a detailed information on how CAPTCHA works and why they are used.
 

What Purpose does CAPTCHA Exactly Serve?

CAPTCPA is mainly used to prevent automated software (bots) from performing actions on behalf of actual humans. For example while signing up for a new email account, you will come across a CAPTCHA at the end of the sign-up form so as to ensure that the form is filled out only by a legitimate human and not by any of the automated software or a computer bot. The main goal of CAPTCHA is to put forth a test which is simple and straight forward for any human to answer but for a computer, it is almost impossible to solve.
 

What is the Need to Create a Test that Can Tell Computers and Humans Apart?

For many the CAPTCHA may seem to be silly and annoying, but in fact it has the ability to protect systems from malicious attacks where people try to game the system. Attackers can make use of automated softwares to generate a huge quantity of requests thereby causing a high load on the target server which would degrade the quality of service of a given system, whether due to abuse or resource expenditure. This can affect millions of legitimate users and their requests. CAPTCHAs can be deployed to protect systems that are vulnerable to email spam, such as the services from Gmail, Yahoo and Hotmail.
 

Who Uses CAPTCHA?

CAPTCHAs are mainly used by websites that offer services like online polls and registration forms. For example, Web-based email services like Gmail, Yahoo and Hotmail offer free email accounts for their users. However upon each sign-up process, CAPTCHAs are used to prevent spammers from using a bot to generate hundreds of spam mail accounts.

Designing a CAPTCHA System

CAPTCHAs are designed on the fact that computers lack the ability that human beings have when it comes to processing visual data. It is more easily possible for humans to look at an image and pick out the patterns than a computer. This is because computers lack the real intelligence that humans have by default. CAPTCHAs are implemented by presenting users with an image which contains distorted or randomly stretched characters which only humans should be able to identify. Sometimes characters are striked out or presented with a noisy background to make it even more harder for computers to figure out the patterns.
Most, but not all, CAPTCHAs rely on a visual test. Some Websites implement a totally different CAPTCHA system to tell humans and computers apart. For example, a user is presented with 4 images in which 3 contains picture of animals and one contain a flower. The user is asked to select only those images which contain animals in them. This Turing test can easily be solved by any human, but almost impossible for a computer. 
 

Breaking the CAPTCHA

The challenge in breaking the CAPTCHA lies in real hard task of teaching a computer how to process information in a way similar to how humans think. Algorithms with artificial intelligence (AI) will have to be designed in order to make the computer think like humans when it comes to recognizing the patterns in images. However there is no universal algorithm that could pass through and break any CAPTCHA system and hence each CAPTCHA algorithm must have to be tackled individually. It might not work 100 percent of the time, but it can work often enough to be worthwhile to spammers.