13 Sep 2017

What Are The Basic Steps For Becoming Hacker ?

Hacking is a type of computer skill that can use to gain access personal computer and files without admin permission. Most of teenager wants to make a career in Hacking. Likewise, they want to become a cyber security expert. Today we are going to share some point's that are very useful to become cyber security expert.

How to Become a Haker

Yes, hacking is a crime, but it’s depending on you why do you want to do, for good work or bad. Our openion for you, choose always good work. And if you want to go through wrong side then it’s your choice. How big hacker you’re one-day cyber security expert will definitely track you. So, do always good job not bad. In cyber world, there are three types of hackers.

1. White Hat (Ethical Hackers):- These are those people who did their job for a government organization. They're using their computer skill for doing a good work. Like protecting user data from cyber criminals, finding the bug in security system etc. They always did a good job. 

2. Grey Hat:- These types of hackers do good and bad things. In simple meaning, these are those people who not in the side of white hat hacker or not inside of black hat hackers. 

3. Black Hat:- These are the bad guys you can call them cyber criminals who always want to do illegal things.

These are the main category of hackers. Now it’s your choice where you want to go. Want to do well, or want to mix bad and good or only want to bad. 

Coming to the main point, hacking is not easy in today time. Most of the websites and device are encrypted by 128-bit and 256-bit encryption. In past, encryption is used but not in a way like this. Now maximum device and websites are protected by high-end encryption. For a normal computer, doesn’t possible to break that encryption. That doesn’t mean you can’t hack anything. Below are the basics steps for starting a career in cyber security. 

Kali Linux 2017 Logo

1. You have to start with basics network concepts like cryptography, networks protocols, and data layers. 

2. Gain knowledge about spy, worms, key logger how all these Trojan works.

3. You also have to aware about proxy, online proxy, VPN how these tools hide your online identity. 

4. If you want to start hacking, privacy is very important. Start using Tor onion root browser and learn about it. This is the securest browser in the world. 

5. Start learning programming language Python, C, C++. These are very important language when you want to run a command or want to make any type of software. 


6. The main concept in hacking is Kali Linux. It is one of the best-operating systems design for hacking. It offers offensive security that use to protect your system from online threat. It has more than 600 inbuilt tools that are useful in hacking. Some of most popular tools are penetration testing stress testing, air cracks hydra etc. Python language is used in  Kali Linux command shell. Learn this language if you want to know more about Kali.


These are some basics step for start learning about hacking. If you want to go deeper in hacking choose networking course. In our next article, we will give you a deep introduction about Kali Linux. 

9 Jul 2017

How to Become Member of Anonymous Group ?

Today time everyone wants to become like anonymous. Many of people want to join this organization because they think anonymous solves every problem. Most of them don’t know what Anonymous actually is, they also don’t know who operates this organization, where is headquarter of this organization. We are going to share that identity, who operate this group worldwide. 

Anonymous Flag

This is an online community where all member from worldwide connects together. It was founded in 2003. You can only recognize these people by guy fox mask. There is no another way left to identification. No one knows how many people associated with them worldwide. It is one of the mysterious Cyber group from past decade. They also involve hacking  ISIS social media accounts & websites. Below is the most famous line use by every anonymous.

"We are Anonymous. We are Legion. We do not forgive. We do not forget. Expect us"

Now come to the main point, how to become a part of this community. So you want to join Anonymous group. You can’t join because it doesn't exist. No any centralized infrastructure where all operation controlled by one person. We don’t have any official website or social network page. Some person mentions on their website that they are from official HQ. But There is no any headquarter exists.   


It means no option available for becoming a member. No, you can join but through another way. Call yourself anonymous, No one sitting inside the office said, come join our company. No need any kind of computer skills or qualification required for becoming a member. Become your own guru. Everyone has a different kind of skill. Use that skill to help people. Then you become a real anonymous.

15 May 2017

How to Protect Windows System from Ransomware Wanna Cry

Ransomware Wanna Cry

Is a type of Trojan (malware) or software program that design to harm windows system. When your system affects with this malware, it will automatically encrypt your windows system data. Your desktop automatically locked and it will display a message like this “your important file encryption produced on this computer". Alert on the window desktop of this Trojan shows that you have to pay first amount in Bitcoin to decrypt your files. It will also give you instruction if you won’t decrypt your file before time; you're unless to recover files anymore. 

Ransomware Affect System

 

How Ransomware Works?


It basically works on two encryption algorithm called as AES and RSA.

RSA (Ron Rivest, Adi Shamir) It is called asymmetric cryptographic algorithm. Asymmetric mean two different key uses by this algorithm. It is also called public key cryptography. One key available for everyone publically and a second one called private key kept by the user.

AES (Advanced Encryption Standard) also known as Rijndael, is a 128-bit block cipher algorithm. This encryption standard used by the U.S National Institute of Standards and Technology (NIST). But now hackers use this secure encryption in Trojan for harm windows system. This algorithm uses symmetric keys, which uses the same key to encrypt and decrypt information.


This Trojan used AES key to encrypt files. The AES key for decryption is written in the files encrypted by the malware. Yet, this key is encrypted with an RSA public key implanted in the malware, which means that a private key is needed to decrypt it. It means attacker only knows private key for decryption. So there is no chance for crack this encryption. The only way you can decrypt your file you need a key for decryption.

How to prevent your system from This Malware?

 

Don’t download anything from the malicious site. Always download any software from official or trusted website. Don’t open and click attached spam mail. Most of the report told that this virus comes from spam emails. You can use antivirus program in your system. It blocks that kind of malware who harms your computer. Update your antivirus security update regularly for remove any new threat. Regular make backup of your system data. If your system harm with this worm, you can get backup data which you have stored somewhere.

22 Apr 2017

Teenage Hacker Earn £400,000 By Computer Virus

A teenage hacker Adom Mudd from Kings Langley (UK) made a £400,000 pounds by his own hacking program.


Teen Hacker Earn £400,000 By Computer Virus 

Adam creates this malware when he was 16 living with his family. He creates this harmful trojan "Titanium Stresser" which carry out 1.7 million attacks on websites after that website database flooded with data. This trojan work like a DDOS (Denial Of Distributed Service Attack).

Adams sell his trojan to cyber criminals and earn total pounds  $307,298.35 and 259.81 bitcoins worth an overall £400,000.  He also test this trojan and carried out 594 attacks by himself. When arrested in March 2015, Adom was on his computer, which he refused to unlock before his father intervened. Adom tried to hide his identity, but his IP address captured by cyber cell police. Court judgment told that he also transferred some amount to his father account. 

Old Bailey also mentions in their statement, that Adom admits two computer hacking charges and one charge of concealing criminal property at a previous hearing.

7 Feb 2017

Anonymous Hackers Shut Down Dark Web Websites

Anonymous hackers group "Motherboard" hack dark web hosting website "Freedom Hosting" which associated with child pornography.


Anonymous Hack Dark Web

According to The Verge, anonymous group says "Hello, Freedom Hosting II, you have been hacked," the message read. More than 10000 websites have been affected by anonymous group.

Anonymous member told that more than half of their hosting data store with child pornography. Anonymous group also told that they also offer  data back to Freedom Hosting II for 0.1 bitcoin, or about $100, however The Verge said "it is unclear whether the offer is in earnest."

Freedom hosting is one of the largest hosting provider on the dark web.Most of onion website purchase their hosting form Freedom hosting.


Dark web is the world biggest platform, bigger then surface web, it's use for selling weapons, drugs, credit card details and other illicit goods,

18 Jan 2017

Anonymous expose Donald Trump

Anonymous hackers international "hacktivist group" gave a message to president-elect Donald Trump on twitter, he will regret the next four years.


Anonymous expose Donald Trump

Anonymous hacker "hacktivist group," told that Donald trump has a personal relation with Russian mobsters child traffickers and money launderers. The Russian Mafia currently specializes in the import and export of cars, weapons, nd drugs from Russia to the US and illegal arms dealing.

This Tweet came after Donald Trump targeted outgoing CIA(Central Intelligence Agency) chief John Brennan with a Tweet saying, ‘Was this the leaker of fake news?’