10 Dec 2017

What is Tor And How to Use This Browser For Hide Online Identity

Today we are discussing the major topic of anonymity. Tor, this is one of the secret or you can call it as the safest browser on the internet. We’re going to share with all of our readers, how this browser works and how you can use this browser to hide online identity.
It is an internet browser that use to hide IP address. It looks like onion, when you cutting onion you can see layer and layer and another layer. Tor works same like this. It uses multiple encrypted proxy chains together that hide your actual system address. It's also used for surfing dark web

Tor Logo

Privacy is very important today time, while you surfing the internet. If someone gets to access your IP(Internet Protocol) address, he can do everything with your personal computer. We also want freedom on the internet. But most of the websites send cookies to your web browser and access your personal  IP, browsing behavior and other things which is related to you. These websites include Facebook, Google and other. For these type of online threat, Tor was created. 


History of Onion Router 

For preventing online threat this browser was designed by United State Naval official Paul Syverson, Michael G. Reed, and David Goldschlag in mid-1990. These three people are the inventor of this web browser. This is open source software freely available on its official website.

Process for Tor Installation:

Download onion router from its official website torprojects.org It's available for all type of Operating Systems. You can choose your OS version and download it. Now you can install it on your personal computer. It requires minimum 80MB space. After installation, it makes a shortcut icon on your desktop where you can get easily access this browser. 

How Tor Works: 

Below are some point, how this browser works and how it protects your actual IP address.
Tor using relay's(node) while you connected to this browser. Relay basically look like proxies. Below is the example. If Alice wants to send mail to Bob, Tor makes relays circuit for Alice


Tor Working Process. Source:- torprojects.org

Alice system IP connects to the first relay, and this relay sends Alice to another relay to continue. The same process continues work and Tor send Alice to the final relay. These all relay are encrypted. None of the relays can actually know your IP address. If you connect to the first relay, this relay knows other relay IP address, not your's. None of these relay knows how traffic routed overall networks. When connection established it send to you final relay which is same for every user who is using Tor network.

Tor Working Process. Source:- torprojects.org

To protect your identity it change your relay path automatically after 10 minutes and sends to you through another path. Final relay not encrypted, so you need to be aware of that.

Tor Working Process. torprojects.org

Instructions Before Access:-
You need to remind some point before accessing tor.
  1. Tor doesn't fully protect your online activity. This browser only works while you're using internet only with this browser. If you're using other software for surfing the internet it won't protect your identity. Because it's not like a VPN who create a bridge.  
  2. Some of people's  blame that attacker can easy track final node. Because Tor final node is decrypted. For this problem, we suggest you connect VPN before accessing this browser. While you combine both of this software there no chances left for the attacker to get your system address.
  3. Make a sure, while you're using Tor, don't try to maximize window size. Because chances increase high for the attacker to get your final node address.
  4. Don't use the extra extension in this browser. 
  5. Don't use torrent while surfing Tor. Because it can easily reveal your identity.  
  6. Don't download anything while you're using this browser.
  7. You need to use high-speed internet connection when you want to connect with this browser. Because it needs to connect multiple relays in a single time. Before you want to access, choose high-speed Internet connection.
These are some important points you need to remember before using this web browser. While you follow this process, you can easily hide your IP address.

13 Sep 2017

What Are The Basic Steps For Becoming Hacker ?

Hacking is a type of computer skill that can use to gain access personal computer and files without admin permission. Most of teenager wants to make a career in Hacking. Likewise, they want to become a cyber security expert. Today we are going to share some point's that are very useful to become cyber security expert.

How to Become a Haker

Yes, hacking is a crime, but it’s depending on you why do you want to do, for good work or bad. Our openion for you, choose always good work. And if you want to go through wrong side then it’s your choice. How big hacker you’re one-day cyber security expert will definitely track you. So, do always good job not bad. In cyber world, there are three types of hackers.

1. White Hat (Ethical Hackers):- These are those people who did their job for a government organization. They're using their computer skill for doing a good work. Like protecting user data from cyber criminals, finding the bug in security system etc. They always did a good job. 

2. Grey Hat:- These types of hackers do good and bad things. In simple meaning, these are those people who not in the side of white hat hacker or not inside of black hat hackers. 

3. Black Hat:- These are the bad guys you can call them cyber criminals who always want to do illegal things.

These are the main category of hackers. Now it’s your choice where you want to go. Want to do well, or want to mix bad and good or only want to bad. 

Coming to the main point, hacking is not easy in today time. Most of the websites and device are encrypted by 128-bit and 256-bit encryption. In past, encryption is used but not in a way like this. Now maximum device and websites are protected by high-end encryption. For a normal computer, doesn’t possible to break that encryption. That doesn’t mean you can’t hack anything. Below are the basics steps for starting a career in cyber security. 

Kali Linux 2017 Logo

1. You have to start with basics network concepts like cryptography, networks protocols, and data layers. 

2. Gain knowledge about spy, worms, key logger how all these Trojan works.

3. You also have to aware about proxy, online proxy, VPN how these tools hide your online identity. 

4. If you want to start hacking, privacy is very important. Start using Tor onion root browser and learn about it. This is the securest browser in the world. 

5. Start learning programming language Python, C, C++. These are very important language when you want to run a command or want to make any type of software. 


6. The main concept in hacking is Kali Linux. It is one of the best-operating systems design for hacking. It offers offensive security that use to protect your system from online threat. It has more than 600 inbuilt tools that are useful in hacking. Some of most popular tools are penetration testing stress testing, air cracks hydra etc. Python language is used in  Kali Linux command shell. Learn this language if you want to know more about Kali.


These are some basics step for start learning about hacking. If you want to go deeper in hacking choose networking course. In our next article, we will give you a deep introduction about Kali Linux. 

9 Jul 2017

How to Become Member of Anonymous Group ?

Today time everyone wants to become like anonymous. Many of people want to join this organization because they think anonymous solves every problem. Most of them don’t know what Anonymous actually is, they also don’t know who operates this organization, where is headquarter of this organization. We are going to share that identity, who operate this group worldwide. 

Anonymous Flag

This is an online community where all member from worldwide connects together. It was founded in 2003. You can only recognize these people by guy fox mask. There is no another way left to identification. No one knows how many people associated with them worldwide. It is one of the mysterious Cyber group from past decade. They also involve hacking  ISIS social media accounts & websites. Below is the most famous line use by every anonymous.

"We are Anonymous. We are Legion. We do not forgive. We do not forget. Expect us"

Now come to the main point, how to become a part of this community. So you want to join Anonymous group. You can’t join because it doesn't exist. No any centralized infrastructure where all operation controlled by one person. We don’t have any official website or social network page. Some person mentions on their website that they are from official HQ. But There is no any headquarter exists.   


It means no option available for becoming a member. No, you can join but through another way. Call yourself anonymous, No one sitting inside the office said, come join our company. No need any kind of computer skills or qualification required for becoming a member. Become your own guru. Everyone has a different kind of skill. Use that skill to help people. Then you become a real anonymous.

15 May 2017

How to Protect Windows System from Ransomware Wanna Cry

Ransomware Wanna Cry

Is a type of Trojan (malware) or software program that design to harm windows system. When your system affects with this malware, it will automatically encrypt your windows system data. Your desktop automatically locked and it will display a message like this “your important file encryption produced on this computer". Alert on the window desktop of this Trojan shows that you have to pay first amount in Bitcoin to decrypt your files. It will also give you instruction if you won’t decrypt your file before time; you're unless to recover files anymore. 

Ransomware Affect System

 

How Ransomware Works?


It basically works on two encryption algorithm called as AES and RSA.

RSA (Ron Rivest, Adi Shamir) It is called asymmetric cryptographic algorithm. Asymmetric mean two different key uses by this algorithm. It is also called public key cryptography. One key available for everyone publically and a second one called private key kept by the user.

AES (Advanced Encryption Standard) also known as Rijndael, is a 128-bit block cipher algorithm. This encryption standard used by the U.S National Institute of Standards and Technology (NIST). But now hackers use this secure encryption in Trojan for harm windows system. This algorithm uses symmetric keys, which uses the same key to encrypt and decrypt information.


This Trojan used AES key to encrypt files. The AES key for decryption is written in the files encrypted by the malware. Yet, this key is encrypted with an RSA public key implanted in the malware, which means that a private key is needed to decrypt it. It means attacker only knows private key for decryption. So there is no chance for crack this encryption. The only way you can decrypt your file you need a key for decryption.

How to prevent your system from This Malware?

 

Don’t download anything from the malicious site. Always download any software from official or trusted website. Don’t open and click attached spam mail. Most of the report told that this virus comes from spam emails. You can use antivirus program in your system. It blocks that kind of malware who harms your computer. Update your antivirus security update regularly for remove any new threat. Regular make backup of your system data. If your system harm with this worm, you can get backup data which you have stored somewhere.

22 Apr 2017

Teenage Hacker Earn £400,000 By Computer Virus

A teenage hacker Adom Mudd from Kings Langley (UK) made a £400,000 pounds by his own hacking program.


Teen Hacker Earn £400,000 By Computer Virus 

Adam creates this malware when he was 16 living with his family. He creates this harmful trojan "Titanium Stresser" which carry out 1.7 million attacks on websites after that website database flooded with data. This trojan work like a DDOS (Denial Of Distributed Service Attack).

Adams sell his trojan to cyber criminals and earn total pounds  $307,298.35 and 259.81 bitcoins worth an overall £400,000.  He also test this trojan and carried out 594 attacks by himself. When arrested in March 2015, Adom was on his computer, which he refused to unlock before his father intervened. Adom tried to hide his identity, but his IP address captured by cyber cell police. Court judgment told that he also transferred some amount to his father account. 

Old Bailey also mentions in their statement, that Adom admits two computer hacking charges and one charge of concealing criminal property at a previous hearing.

7 Feb 2017

Anonymous Hackers Shut Down Dark Web Websites

Anonymous hackers group "Motherboard" hack dark web hosting website "Freedom Hosting" which associated with child pornography.


Anonymous Hack Dark Web

According to The Verge, anonymous group says "Hello, Freedom Hosting II, you have been hacked," the message read. More than 10000 websites have been affected by anonymous group.

Anonymous member told that more than half of their hosting data store with child pornography. Anonymous group also told that they also offer  data back to Freedom Hosting II for 0.1 bitcoin, or about $100, however The Verge said "it is unclear whether the offer is in earnest."

Freedom hosting is one of the largest hosting provider on the dark web.Most of onion website purchase their hosting form Freedom hosting.


Dark web is the world biggest platform, bigger then surface web, it's use for selling weapons, drugs, credit card details and other illicit goods,