Tuesday 6 August 2013

Open blocked websites using proxy

Access restricted or blocked websites in your school and college using web proxy. Your activity will be hidden.

Using Hidemyass Web Proxy Service.
  1. Open website : http://www.hidemyass.com/
  2. Form Web Proxy section, turn SSL Security on.
  3. Enter the website you want to access and hit Hide my ass button.
Using Proxy Servers
  1. You can also open website without open hidemyass.com every time
  2. Open link: http://www.hidemyass.com/proxy-list/
  3. Uncheck the anonymity level:None, Low Medium
  4. Uncheck the Speed :Slow, Medium.
  5. Uncheck the Connection Time : Slow , Medium
  6. Now click on update results
  7. It will now list fast and anonymous proxy servers.
  8. Now open your web browser like Mozilla Firefox, Chrome, IE, etc
  9. And set Manual Proxy as from the list you got from hidemyass.com and apply
Now you will be able to access blocked websites.

If you want to learn, how to set manual proxy in Web browsers check my blog again.

How to find IP address of another user on network(WAN/LAN)

This post will show you how to get the IP address of remote computer.

The basic information we require to launch an attack on computer on network is, knowing the IP address of that particular computer. Using IP address we can find more information which help us during attack phase.

We can achieve our goal in several ways:

Finding IP of remote host using email service:
  1. Register for free account on readnotify.com from here.
  2. Now login to your mailing account like Gmail, Yahoo Mail, etc.
  3. Compose a new mail
  4. In the Receivers email type victim@gmail.com.readnotify.com instead of victim@gmail.com.
  5. Now give attractive subject to your mail and send it.

Saturday 3 August 2013

Make Bootable USB drive of Kali Linux, RedHat, Backtrack, Ubuntu, others

There are some operating systems in Linux that are easy to use with better GUI, and some of them don't require installation on hard drive, that means some OS in Linux/Unix can be used Directly from CD/DVD's and USB sticks without installing it. These OS are called Live OS.

To use the Live OS or to install Linux/Unix from USB sticks (pendrives) can be done only if the USB drive is made bootable for that OS.

Here's the method for making Linux Bootable.

1. We can use either Unetbootin or Linux Live USB Creator to create bootable pendrives.
2. Download Unetbootin from here.

3. Download Linux Live USB Creator From here
4. Install Linux Live USB creator on your system.

Friday 2 August 2013

Protect your system from Hackers by closing open ports and remote connections on your computer

Is your system being monitored or controlled by somebody else in your absence?
 Here you can find the answer.

If I want to enter in your house mutely, i need to find out open doors or windows in your house which you left open because you were unaware of the existence of that door or forgot to close that door.
In the same way our computers also has doors called PORT which it uses to connect to other computer to access service like websites, torrents download,software update services, remote connection, etc. If we are accessing any kind of service or application that uses network connection, a PORT is used for every service and application.

Here is the list of common ports and associated services:
  • 20/21: File Transfer Protocol(FTP)
  • 22: Secure Shell(SSH)
  • 23:Telnet
  • 25: Simple Mail Transfer Protocol(SMTP)
  • 53: Domain Name System(DNS)
  • 80: Hyper Text Transfer Protocol(HTTP)
  • 110: Post Office Protocol(POP)
  • 143: Internet Message Access Protocol(IMAP)
  • 169: Simple Network Management Protocol(SNMP)
  • 443: Hyper Text Transfer Protocol Secure(HTTPS)

Create Hidden account or Hide existing account in Windows, a Backdoor to System Access

This post is to show you, how we can create an invisible or hidden account in any Windows OS, so that it is not visible at the log on screen.

Here we go>>>
  1. Open command prompt as administrator.
  2. Create an account using command: net user hacker /add
  3. Set password to this account using command: net user hacker *
  4. Type password for your account twice.
  5. Now, add this account to administrators group so that we can have full rights on system using command: net localgroup administrators hacker /add
  6. Now Open Registry Editor by typing regedit in Run window
  7. Go to HKEY_LOCAL_MACHINE/SOFTWARE/Microsoft/Windows NT/Current Version/Winlogon
  8. Now create new subkey SpecialAccounts to Winlogon by right click on Winlogon, select New, then select Key.

Access Facebook account, Google account of your friends, without knowing their passwords......

Here I'm sharing one trick or hack to access Facebook accounts, Gmail Accounts, or any other website, without actually knowing their passwords.

This is done by attack called cookie stealing, where we steal the cookie which holds the details on any website like session id, etc, and are saved in our computers.We steal them and later use them to access that website using victims indentity.

Lets begin...
  1. Install the Cookie Manager+ plugin in Mozilla Firefox, you can download it form here.
  2. Now restart Firefox after installation is complete.
  3. Now ask your friend to open his Facebook account on that browser having Cookie Manger+
  4. Now click on Firefox button and then Cookie Manager+ from Web Developer option.
  5. Now click on File in Cookie Manager Window then Backup/Restore and then click Backup all.
  6. It will ask for location to save the cookies.
  7. Now you can use these cookies at same time in different computer.
  8. Now Open Cookie manager + in different computer.
  9. Now you have to select Restore all and provide the loaction of the cookie file.
  10. Now open the Facebook or refresh the Facebook tab, you will be logged into your friends Facebook account.
You can do every activities like chating, sharing, changing accounts and privacy settings, change mobile number, recovery email address, etc for taking complete control over that account.

Thursday 1 August 2013

Monitor & Protect your children online from anywhere, block sites, gaming sites, unwanted application, restrict computer and internet use

In this post, I'll  show you how to protect our children from bad things over internet, game addiction, social networking addiction and unwanted applications.

How you can monitor the activities performed on your system anytime and from anywhere?
How to put timing and various restrictions on computer system?

There are large number of applications and spywares on internet, also some Security vendors has implemented parental control like Avast Internet Security, Quick Heal Total Security,etc. I recommend you Microsoft Windows Parental Control or Family safety as it allows to view the activity online, get detailed report any time, manage settings remotely, and many more features that are not provided by other vendors.


Follow steps to use Windows Family Safety/Parental Control in Windows 8 Offline
  1. Create a new user account in your system and select standard user account when asked for type of account. This account is for your children or account to be monitored or protected.
  2. Now go to User Accounts from Control Panel, and select manage another account.
  3. Select the Family safety at the bottom in blue font.
  4. Now select the account created or to be monitored.