Formatting finally comes to WhatsApp Messenger. You can now type your replies in bolditalic or even strikethrough your replies to friends. If you have updated to the latest WhatsApp version, you probably can see something like this

To bold your material, use asterisks like so *This is bold.* and use underscore for italic _this is italic_ and for strikethrough use tilde like ~this is strikethrough~
2
6×03 Oathbreaker–VideoMega (HD)–OpenLoadiDoWatchStreaminNowvideoWStreamFlashX
4

Want to become Hacker, I will make you expert

You want to become Hacker! I will make you the one. Not actually the one, Expert one and its all free. Because teaching should be free as said in holy books. I can give you 100% assurance that if you are willing to become hacker, i will make you the best one. I will teach you whatever i know, whatever i don’t know ( i will learn and then i will share with you). Because none can be perfect but experts always exist. Most people have aspirations to become a hacker but they don’t know from where to start and what is good and what is bad. Being Hacker as per media is bad but when you go inside you will know the truth. I will help you to explore the same. We are born hackers and started hacking ever since birth but never able to realized the hackers inside ourselves. But you will now, because i will act as catalyst.
Note: Catalyst, everything is in you, i will just guide you.

Disclaimer : Its up to individual which path he chooses, my motto is to provide knowledge and ethics and i will not leave a single stone unturned.
Want to become hacker
Want to become hacker, Good Professional Hacker
Many users daily ask me the one same question again and again. Sir, how to become hacker, please teach me. Its really embarrassing at first but then i realized about the positiveness and peoples willingness to learn about cyber security and ethical hacking and most of you will not believe i decided that i will start my campaign again as i don’t wanna hurt feeling of learners. Its being a great time when i first started the campaign under the name ISOFTDL cybercops and then under Hackingloops under CHECKMATE program. Because of personal reasons and hectic schedule, i need to turn down the programs but now i have time for my friends, users and learners. I am starting my Campaign again under Hackingloops under program name “Born Hackers Club” (BHC). 
You might be interested in reading about:

Born Hackers Club – Join if you want to become hacker:

Want to become hacker, Hackingloops is starting Born Hackers Club group to teach people Hacking and Cyber security. This time i will be starting from very basics and we will be more practical time than theoretical but focus will always remain at concepts.
Few Key features of Born Hackers Club Campaign :
1. Every week we learn two topics and will have one practical session to test our learnt skills.
2. I have created a website and created an virtual environment(both Linux and windows) where we all can practice hacking techniques.
3. I will share all my articles in easy to download PDF documents.
4. All practicals will be made available to all learners in form of videos.
5. I will introduce easy to contact feature, where you can ask any query live.
6. We will cover each and every tool of Backtrack and Matruix Operating system and all other hack tools in our classes.
7. All Hacking tools tutorials will be demonstrated with the help of video lectures.
8. Will teach both offensive and defensive hacking techniques.
9. Will conduct Hacking Exams Online both theoretical and Practical ( all exams will be having prizes for winners).
10.  Most Important, Everything is free and open to all. So feel free to join and learn Hacking with HackingLoops.
The inauguration of Born Hackers Club is Planned on 1 Dec, 2012. You all will receive updates regarding the Hacking Club on regular basis.
Because when i said I will make you Hacker ! then my duty will end when you will become a Hacker i.e. When you become good enough that you can say in front of 1000 people in seminar, i can Hack you now because i am Hacker.
All the ideas are heartily welcomed and we will try our best to incorporate all the ideas suggested regarding the group and knowledge sharing, infrastructure or any thing related.
Guys i am starting this campaign to help you to find a hacker hidden inside you, so be extrovert enough to be a part of this campaign.
I am also inviting all experts to be a part of this campaign because it knowledge and it only grows when you share.
This is just a introduction what i am up to and what i am going to start. So we are 31 days away from our start. Don’t worry we will not disappoint you during these 31 days, you will regularly get updates on Born Hackers Club(Join us if you want to become hacker) and will continually get latest Hacking articles other than our campaign. So be a part of our Family ” Family of Hackers : Because I want to listen that we are Hackers, we are born Hackers”.

2

3 Necessary things to become Expert Certified Hacker

3 Necessary things to become Expert Certified Hacker : Being on road of Born Hackers club, i wish to share my thoughts which you might find useful in your journey tobecome Expert Certified Hacker. Hacking is always a fun, its something like playing pranks using your brain. Most of us always think that Hacking is just related to cracking someone’s email or Facebook and then embarrassing the victim by doing childish pranks with his email or Facebook accounts. But if i share the truth, its absolutely not at all what we call word Hacking. I am not here redefining that word Hacking but its necessary fornewbies/ignorant to know what actually is Hacking? So i hope you all are looking forward to become an expert hacker.
How-to-become-a-Professional-hacker
How to become a Professional Hacker

And before telling newbies/ignorant what Hacking actually is? I want to share what comes in category of newbies/ignorant. Below are some points which explains lot about newbies/ignorant :

1. Media/News : They always manipulate the word Hacking and always portray it as bad thing. Just for making their news spicy they portray the complete Hackers community as Criminals.
2. Parents/Elders(specially relatives who loves to gives advice’s) : I keep them in ignorant list because they never had hands on Hacking and what they listen from Media/News, they impose on their children and force their children to quit Hacking.
3. New Comers/ Newbies in Hacking : Most peoples are attracted toward hacking for one the following reasons. First to play pranks with their friends by hacking their emails or Facebook accounts. Second, the persons who want to take revenge and few times wanna hack girlfriends account.

Now what actually is Hacking? Ahh.. you might have read that in several books or online. Actually it varies from portal to portal, book to book etc. According to me :


Hacking is art of exploring the hidden things that are being hidden from general usage and finding loop holes in the security and use them to benefit the others.

Few days back i was going through some article on Times of India, and i was really shocked by seeing their definition of Hacking and more shocking was they have given references of Wikipedia, so i browsed Wikipedia and was totally shocked by seeing their definition. I am sure you all feel the same:

“Hacking is unauthorized use of computer and network resources. (The term “hacker” originally meant a very gifted programmer. In recent years though, with easier access to multiple systems, it now has negative implications.)”
I hope now you all understand why i said first learn about ignorants and newbies. They completely forgot about the security aspect before defining above definition. For every good there is bad and what i thinks people enjoys bad stuff.

Now lets discuss what are 3 Necessary Things to become an Expert Certified Hacker. We all know man is a born hacker. He keeps on exploring new things and new ways of doing things smartly and this curiosity ends with his life.

But do you really think all persons are that much smart. If you ask me then its Yes. Its the society and the environment around them which makes them stagnant. Is you life become stagnant or poised at some point. If yes, then i am your motivation. Below are the 3 necessary points which i feel are the necessities to become an Expert Certified Hacker:
1.  Different Mindset i.e.Thinking stuff in different manners (Think differently ) : There are several ways of doing things. Say i want to send a email, some people will use GMail to send mail, some will use yahoo and some like us(Hackers) will use telnet or self set up mailers. 

2. Curiosity (What new you have learned today?) : You must be curious in how things work rather on i have to use this. For example: you want to send email, so you must be curious in what is going inside like how mail is sent, what process is going in background. The day you get this ability none can stop you in becoming a great hacker.

3. Learning is the Key : The day you stop doing this you will again become a noob or novice. Continuous learning is the key. Never limit your scope of learning things and languages, more you learn more differently you can think, more you discover and more you enjoy.

That’s all from my end for today. We all know we are born Hackers but we are lost in somewhere middle. May be i can act as torch for you to show you correct path.
2

How to become a Professional Hacker | Hackingloops

How to become a Professional Hacker? Whenever i listens the word Hacker from anybody’s mouth, it starts tickling my brain and my blood starts flowing fast through my nerves. Do you want to know why? Because i am Hacker. Lets be precise Professional Hacker. Believe it or not when somebody novice starts talking about Hacking in front of a Hacker, i am damn sure hacker can never hold back for long. May be some can but i won’t. Almost everyday we hear at least 1 negative news about hackers like Mark Zukerberg’s profile hacked by some hacker or particular organization or website is hacked by some Hacker or particular site’s database is leaked. Have you ever heard any media or news channel reporting particular Hacker highlighted the bug or loophole in Facebook or twitter or any organizations website etc ?? Ever?? Off course not! Because media only portrays negative aspect of the Hackers. They misinterprets the scope of Hacker word. Everything in this world is like a Coin having two aspects Head or Tail i.e. Good or Bad. But its still a coin, you cannot call that its a tail coin or head coin, you will always call it a coin. Similarly Hackers have two aspects good or bad. Good who highlights loopholes or bugs and fixes them and Bad who misuses them for their own good or to harm others. But which is good and which is bad? Who defines it? But here we are not discussing types of hackers. We are discussing how to become a hacker i.e. good and bad both.

How to become a Professional Hacker
How to become a Professional Hacker

How i got an inspiration to become an Hacker? 

I was in my computer Engineering first year, where i met my very first mentor Mr Abdul Kadir Sir (Lecturer @ AMU). He shown me some amazing things in his class related to IP address and Networking and told me few good links to study more. I found that so much interesting and unique that it became my passion and i started learning things quickly. But suddenly a incident happened, my email account was hacked and that incident of hacking my email account boosted my Hacking journey to next level. Now my motive has become to learn how to hack email accounts, for searching this i visited at least 100+ Hacking websites but result is all same. All websites same novice methods like phishing, password guessing etc and none of them worked :D Phishing worked sometimes for me but its ration was 10:4. Once day doing so i thought why don’t develop my own method to hack emails but how to start???? So i started from very beginning How email works?? What all channels it go through?? and much more. And it worked, i have written my own scripts and tools to hack emails and much more.  But believe me in that’s not even the 1 percent of Hacking. My interest keep on growing and parallely my skills. 
That’s the only reason i never say no to people who come to me for Hacking emails and Facebook kind of things because i see a new hacker evolving.  Now you all guys think this is not so called hacker, but its cracker. So my answer is quite simple ” To become a good Cop, you have to think like a criminal or sometimes become a criminal to enter their territory”.

So that about me, how i became a hacker. Now lets learn what things are necessary to become a professional Hacker.

How to become a Professional Hacker?

10 fundamental Steps to become a Professional Hacker:

1. Understand the concept of 5 W’s ( What, Who, Where, When, Why) and 1 H (How).
Everything you work on or try to explore must have 5W’s and 1 H concept in mind. What i am doing? Why i am doing? For Whom i am doing? Where it will take me? When i will reach destination and How i will expand further?
2. Always be curious like a new born baby i.e. never miss anything, learn everything from very beginning. A new born baby symbolizes for its curiosity, he wants to know how everything is going its around, why its going around? Become like new born baby. Listen to everyone carefully, read everything conceptually. Understand what that thing does and how it does?
3. Be innovative : Always be innovative with your thoughts and never satisfy from past success. If i do this what will happen? How it will respond? This is the major step to avoid boredom and stagnancy.
4. Must have an Urge for getting better and better: The day you stopped progressing you are a dead men in technology. Technology is growing at 100 folds, everyday we have something new in market. So cope with it to remain alive.
5. Read as much as content related to computers, subscribe Computer or internet geeks blogs, read manuals, articles, tutorials whatever you get. Everything teaches something unique.
6. Understanding for code’s logic or semantics is compulsory.  Pick random codes and try to analyze them what they for? How they work?? What will be their output?? If you change something what will be its impact??
7. Adopt the Mindset of Hacker : As i have already explained above, to become a good hacker you have to think like one. That’s why its a must to learn both aspects of Hacking Negative and Positive. If you don’t think like other hackers you will not able to focus how other one gonna break into your system.
8. Learn like handicaps : Now this point comprises or several things for example : Say you don’t have mouse how you will navigate? think otherwise you don’t have keyboard how you will write. Similarly you don’t have direct command or so called icon for any software, how will you use it? Use it using command prompt or best is practice on Linux Operating system preferred non GUI version.

9. 
Learn how to Program: I will not focus on one programming language but must master at least one syntactically and others fundamentally. Rest Google is there for syntax.

10. Must have a Motive : Why you want to learn hacking, why you want to become a professional hacker and how you are going to achieve it.


I hope this helps all of you and motivates you to become a Professional hacker. I opted for it because i found it unique and interesting. It’s upto you how you want to become, i can only teach you tricks, techniques, concepts etc etc. But its you who have to be faithful with yourself to become a Professional Hacker. We all know we are Born Hackers but we just needs an spark to opt it as profession.

Hope this article develops a spark in you! Have fun. Keep Learning as its the key to success.
3

DNSMAP Video Tutorial on Kali Linux – DNS Information Gathering

DNSMAP Video Tutorial on Kali Linux : In this video tutorial, we will learn how to gather DNS information about all the subdomains of a web application or website using DNSMAP network mapper tool. DNSMAP is basically an sub domain mapping tool which gives all the subdomains, their corresponding IPv4 IP address and IPv6 IP address as output. Unlike other tools, where we use brute force technology to gather all sub domains we don’t have a feature to abort the brute forcing if domain uses wildcards technically you can say it producing false positives while enumerating sub domain data. So friends lets first discuss the key features of DNSMAP and what all we can gather using it.
DNSMAP Video Tutorial on Kali Linux by Hackingloops
DNSMAP Video Tutorial on Kali Linux by Hackingloops

How to open DNSMAP tool on Kali Linux ?

Go to Applications –> Information Gathering –> DNS Analysis –> DNSMAP
Important Options or Switches in DNSMAP Tool on Kali Linux :
-w : This option is used to provide the word list file which you wish to use for brute forcing. If you don’t provide this option, DNSMAP will use the default file.
-r : This option is used to store results into a text file. Here we can provide a result file path where we wish to store the results. If we don’t provide this option it will show results only on screen.
-c : This obtain is same as -r option, it just stores file in CSV format.
-d : This option is used if you wish to provide delay between 2 DNS lookups. If we don’t provide this option, it will use system default 10ms delay.
-i : This option is used for false positive i.e. if you wish to ignore any IP from lookups.
Sample DNSMAP command for DNS Network Mapping :
In case you want to provide custom wordlist file :
 dnsmap anytargetwebsite.com -w ~/Desktop/Hackingloops/wordlist.txt -r ~/Desktop/Hackingloops/results.txt
If you wish to use default or inbuilt wordlist file :
dnsmap anytargetwebsite.com -r ~/Desktop/Hackingloops/results1.txt

DNSMAP Video tutorial on Kali Linux by Hackingloops :



If you have any queries feel free to ask and don’t forget to say thanks if you like our DNSMAP Video Tutorial.
1

DNSTRACER Video Tutorial on Kali Linux – DNS Analysis Tool

DNSTRACER Video Tutorial on Kali Linux : DNSTRACER is an DNS Information gathering tool which extract unique DNS information which none other DNS tool does. It actually shows how the DNS request is processed. We can query about different types of records like NS, MX, A, AAAA, SOA, NSEC etc using DNSTRACER tool. In this tutorial we will learn how to use DNSTRACER to capture very important information about our target hosts. So friends lets see how to use DNS tracer tool on Kali linux.
DNSTRACER Video Tutorial on Kali Linux
DNSTRACER Video Tutorial on Kali Linux

How to open a DNSTRACER tool on Kali Linux ?

Go to Applications –> Information Gathering –> DNS Analysis –> dnstracer

Important Options of DNSTRACER tool on Kali Linux :

-o : This option is to display the overview of response we got through dns query.
-q <type> : This option is used to specify the query type means which type of DNS record you wish to query about. If you don’t provide the type then by default A record will be processed. We can provide type as soa, ns, mx, aaaa etc..
-s <server> : This option is used to specify the server which will be used to process the initial DNS request. If we don’t specify server then default localhost will be used for dns request processing. We can also specify root server as dns server by giving “.” in place of server address.
-v : Show results into more structured format i.e. verbose mode.
-4 : This option is used to filter out all IPv6 records from the result. If we don’t specify this option all records i.e. IPv4 and IPv6 records will be shown.

Sample Usage of DNSTRACER TOOL :

Simple Verbose mode :
dnstracer -v anytargetwebsite.com
Overview mode :
dnstracer -o -4 anytargetwebsite.com
Query type mode say soa records :
dnstracer -o -4 -q soa anytargetwebsite.com

 DNSTRACER Video Tutorial on Kali Linux :


That’s it friends. I hope you have enjoyed the DNSTracer video tutorial. Keep Learning !! Keep Connected !!
3

Apple users are Vulnerable to the Sandbox Vulnerability ! Penetration Testing Smartphones !

Well Sandbox Vulnerability is not new and has been here for a while . So this is no news .This artical is for the security enthusiasts who want to know more about IOS hacking . Apple Devices have been known to be more secure and stable than any other Smartphone OS including Android .
Mobile Security Experts have found out that the sandbox vulnerability affects all apps that are using themanaged app configuration setting in devices that run older versions of iOS.Though Apple has fixed the bug now but you might still find many older version devices out there that may be vulnerable to Sandbox Vulnerability during penetration Tests .
Apple Users with the iOS version older than iOS 8.4.1 are affected by the sandbox vulnerability, CVE-2015-3269. The flaw affects all apps that use the managed app configuration settings, meaning that Apple is storing enterprise credentials in a directory that can be read by everyone.

Impact of Sandbox Vulnerability on Apple IOS Users :

sandbox-vulnerability

Sandbox Vulnerability basically affects Apple iOS users with an iOS version older than iOS 8.4.1 . The vulnerability will commonly send the credential and authentication information along with the managed app binary for installation on corporate mobile devices which often included access to the corporate data security jewels, including server URLs, and credentials with plaintext passwords. Hence this makes the penetration testing of Organization more needed as Apple I phones are Common among the cooperates and used for accessing organization sensitiv
e data .

Digging Deeper Into Sandbox Vulnerability !

The underlying issue with our critical sandbox violation discovery is that anyone can also see the credential information on the mobile device as it is stored world readable. Not even encrypted or Hashed .

Impact on Enterprises of Apple Sandbox Vulnerability

Hackers can target as many organizations as  it can get into using the iTunes store to spread an app designed to read and share the configuration files . The specific targets can be exploited for the Sandbox Vulnerability using spear-phishing attack by using targeted e-mails. In either case, they would develop an app that has a high chance of being installed in the enterprise, such as a productivity app. Once the app gets downloaded and installed on the devices, it would continuously monitor the directory for configuration settings being written to the world readable directory, harvesting and sending them to the attacker. Because all apps have access to the directory, it could hide in plain sight and operate as one of the many legitimate apps that have access to the directory in question.
The attacker with access to an MDM managed device can read all managed configuration settings for an unpatched device. Managed configuration is used to make the provisioning of apps easier and enterprise apps may use this mechanism to provision credentials or details about internal infrastructure this way. Those can be used by the attacker to gain access to those services.
Corporate app data are more exposed, the expert highlighted the risk of a cyber attack that canallow hackers to steal information stored in an open directory including mobile device management .
Hence this comes as a treat for Corporate Espionage . We suggest that you update the iOS versions to the latest . Also a penetration testing of the Enterprise is very good in this case as it will help identify the loopholes .
1
Previous PostOlder Posts Home

Kategori

Kategori

MY BLOGGER. Powered by Blogger.

Recent Comments

Formulir Kontak

Name

Email *

Message *

Followers

love hacker triks

love hacker triks

Flickr

Featured Post

Popular