December 31, 2015

Basic of Hacking

Posted by Unknown


Hacker means someone who finds weaknesses in a computer or computer network, though the term can also refer to someone with an advanced understanding of computers and computer networks.Hackers may be motivated by a multitude of reasons, such as profit, protest, or challenge. The subculture that has evolved around hackers is often referred to as the computer underground but it is now an open community. While other uses of the word hacker exist that are not related to computer security, they are rarely used in mainstream context.

Classifications

Several subgroups of the computer underground with different attitudes use different terms to demarcate themselves from each other, or try to exclude some specific group with which they do not agree. Eric S. Raymond (author of The New Hacker's Dictionary) advocates that members of the computer underground should be called crackers. Yet, those people see themselves as hackers and even try to include the views of Raymond in what they see as one wider hacker culture, a view harshly rejected by Raymond himself. Instead of a hacker/cracker dichotomy, they give more emphasis to a spectrum of different categories, such as white hat, grey hat, black hat and script kiddie.

White Hat :

A white hat hacker breaks security for non-malicious reasons, perhaps to test their own security system or while working for a security company which makes security software. The term "white hat" in Internet slang refers to an ethical hacker. This classification also includes individuals who perform penetration tests and vulnerability assessments within a contractual agreement. The EC-Council , also known as the International Council of Electronic Commerce Consultants has developed certifications, course ware, classes, and online training covering the diverse arena of Ethical Hacking.

Black Hat :

A "black hat" hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain" (Moore, 2005). Black hat hackers form the stereotypical, illegal hacking groups often portrayed in popular culture, and are "the epitome of all that the public fears in a computer criminal". Black hat hackers break into secure networks to destroy data or make the network unusable for those who are authorized to use the network.

Part 1: Targeting

The hacker determines what network to break into during this phase. The target may be of particular interest to the hacker, either politically or personally, or it may be picked at random. Next, they will port scan a network to determine if it is vulnerable to attacks, which is just testing all ports on a host machine for a response. Open ports—those that do respond—will allow a hacker to access the system. 

Part 2: Research And Information Gathering

It is in this stage that the hacker will visit or contact the target in some way in hopes of finding out vital information that will help them access the system. The main way that hackers get desired results from this stage is from "social engineering", which will be explained below. Aside from social engineering, hackers can also use a technique called "dumpster diving". Dumpster diving is when a hacker will literally search through users' garbage in hopes of finding documents that have been thrown away, which may contain information a hacker can use directly or indirectly, to help them gain access to a network.

Part 3: Finishing The Attack

This is the stage when the hacker will invade the preliminary target that he/she was planning to attack or steal. Many "hackers" will be caught after this point, lured in or grabbed by any data also known as a honeypot (a trap set up by computer security personnel).

Grey Hat :

A grey hat hacker is a combination of a Black Hat and a White Hat Hacker. A Grey Hat Hacker may surf the internet and hack into a computer system for the sole purpose of notifying the administrator that their system has been hacked, for example. Then they may offer to repair their system for a small fee.

Elite Hacker :

A social status among hackers, elite is used to describe the most skilled. Newly discovered exploits will circulate among these hackers. Elite groups such as Masters of Deception conferred a kind of credibility on their members.

Script Kiddi :

A script kiddie (or skiddie) is a non-expert who breaks into computer systems by using pre-packaged automated tools written by others, usually with little understanding of the underlying concept—hence the term script (i.e. a prearranged plan or set of activities) kiddie (i.e. kid, child—an individual lacking knowledge and experience, immature).

Neophyt :

A neophyte, "n00b", or "newbie" is someone who is new to hacking or phreaking and has almost no knowledge or experience of the workings of technology, and hacking.

Blue Hat :

A blue hat hacker is someone outside computer security consulting firms who is used to bug test a system prior to its launch, looking for exploits so they can be closed. Microsoft also uses the term BlueHat to represent a series of security briefing events.

Hacktivis :

A hacktivist is a hacker who utilizes technology to announce a social, ideological, religious, or political message. In general, most hacktivism involves website defacement or denial-of-service attacks. Nation state Intelligence agencies and cyberwarfare operatives of nation states.

Attack :

A typical approach in an attack on Internet-connected system is:
1. Network enumeration: Discovering information about the intended target.
2. Vulnerability analysis: Identifying potential ways of attack.
3. Exploitation: Attempting to compromise the system by employing the vulnerabilities found through the vulnerability analysis.

In order to do so, there are several recurring tools of the trade and techniques used by computer criminals and security experts.

Security Exploit :

A security exploit is a prepared application that takes advantage of a known weakness. Common examples of security exploits are SQL injection, Cross Site Scripting and Cross Site Request Forgery which abuse security holes that may result from substandard programming practice. Other exploits would be able to be used through FTP, HTTP, PHP, SSH, Telnet and some web-pages. These are very common in website/domain hacking.

Techniques

Vulnerability Scanner :

A vulnerability scanner is a tool used to quickly check computers on a network for known weaknesses.Hackers also commonly use port scanners. These check to see which ports on a specified computer are "open" or available to access the computer, and sometimes will detect what program or service is listening on that port, and its version number. (Note that firewalls defend computers from intruders by limiting access to ports/machines both inbound and outbound, but can still be circumvented.)

Password Cracking :

Password cracking is the process of recovering passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.

Packet Sniffer :

A packet sniffer is an application that captures data packets, which can be used to capture passwords and other data in transit over the network.

Spoofing Attack (Phishing) :

A spoofing attack involves one program, system, or website successfully masquerading as another by falsifying data and thereby being treated as a trusted system by a user or another program. The purpose of this is usually to fool programs, systems, or users into revealing confidential information, such as user names and passwords, to the attacker.

Rootkit :

A rootkit is designed to conceal the compromise of a computer's security, and can represent any of a set of programs which work to subvert control of an operating system from its legitimate operators. Usually, a rootkit will obscure its installation and attempt to prevent its removal through a subversion of standard system security. Rootkits may include replacements for system binaries so that it becomes impossible for the legitimate user to detect the presence of the intruder on the system by looking at process tables.

Social Engineering :

When a Hacker, typically a black hat, is in the second stage of the targeting process, he or she will typically use some social engineering tactics to get enough information to access the network. A common practice for hackers who use this technique, is to contact the system administrator and play the role of a user who cannot get access to his or her system.

Trojan Horses :

A Trojan horse is a program which seems to be doing one thing, but is actually doing another. A trojan horse can be used to set up a back door in a computer system such that the intruder can gain access later. (The name refers to the horse from the Trojan War, with conceptually similar function of deceiving defenders into bringing an intruder inside.)

Viruses :

A virus is a self-replicating program that spreads by inserting copies of itself into other executable code or documents. Therefore, a computer virus behaves in a way similar to a biological virus, which spreads by inserting itself into living cells. While some are harmless or mere hoaxes most computer viruses are considered malicious.

Worm :

Like a virus, a worm is also a self-replicating program. A worm differs from a virus in that it propagates through computer networks without user intervention. Unlike a virus, it does not need to attach itself to an existing program. Many people conflate the terms "virus" and "worm", using them both to describe any self-propagating program.

Key Loggers :

A key logger is a tool designed to record ('log') every keystroke on an affected machine for later retrieval. Its purpose is usually to allow the user of this tool to gain access to confidential information typed on the affected machine, such as a user's password or other private data. Some key loggers uses virus-, trojan-, and rootkit-like methods to remain active and hidden. However, some key loggers are used in legitimate ways and sometimes to even enhance computer security. As an example, a business might have a key logger on a computer used at a point of sale and data collected by the key logger could be used for catching employee fraud.

If you have any query feel free to comment below.






Read More

December 30, 2015

WHAT IS ZOMBIE ARMY OR BOTNET ?

Posted by Unknown



A botnet (also known as a zombie army) is a number of Internet computers that, although their owners are unaware of it, have been set up to forward transmissions (including spam or viruses) to other computers on the Internet. Any such computer is referred to as a zombie - in effect, a computer "robot" or "bot" that serves the wishes of some master spam or virus originator. Most computers compromised in this way are home-based. According to a report from Russian-based Kaspersky Labs, botnets -- not spam, viruses, or worms -- currently pose the biggest threat to the Internet. A report from Symantec came to a similar conclusion.

Computers that are rooted to serve in a zombie army are often those whose owners fail to provide effective firewalls and other safeguards. An increasing number of home users have high speed connections for computers that may be inadequately protected. A zombie or bot is often created through an Internet port that has been left open and through which a small Trojan horse program can be left for future activation. At a certain time, the zombie army "controller" can unleash the effects of the army by sending a single command, possibly from an Internet Relay Channel (IRC) site.

The computers that form a botnet can be programmed to redirect transmissions to a specific computer, such as a Web site that can be closed down by having to handle too much traffic - a distributed denial-of-service (DDoS) attack - or, in the case of spam distribution, to many computers. The motivation for a zombie master who creates a DDoS attack may be to cripple a competitor. The motivation for a zombie master sending spam is in the money to be made. Both of them rely on unprotected computers that can be turned into zombies.

According to the Symantec Internet Security Threat Report, through the first six months of 2006, there were 4,696,903 active botnet computers.
Read More

December 29, 2015

Game Killer 3.11 Apk [Latest]

Posted by Unknown
Game Killer is AN robot application which is able to assist you to hack Offline robot games coins, score, money, gems, etc… it’s one in every of the most effective applications out there to try to to such a issue.

Features of Game Killer: 

  • Search game value with precise variety 
  • Search game price with unclear directions, e.g. larger or smaller 
  • Lock the computer game price to a repaired variety 
  • Save/Load the taken care of list bit GameKiller faerie to quote the device throughout diversion 
  • EX edit 
  • Unload code 
  • Bugs Fixed 
  • Much more features 

Notes: 

GameKiller won’t work for on-line Games like young Patti and Hayday. 
For exploitation GameKiller you may want a nonmoving robot device. 
If something goes wrong mention US within the comments. 





How to Use ? 

  1. Open GameKiller then minimize it. 
  2. Open the game where you want to have unlimited money, gems,… 
  3. Look how much coins you have, open GK and write the value you have seen, press the search button and AUTO IDENTIFY, now GK will find many results,so you have to spend or play the game so that the coins change, then search the new value in GK so that it find less results. Keep trying until it finds few or one result. 
  4. Now that you have the results click the results and change all the values and hit ok. 
  5. That’s all. 

Download Here 

Game Killer 3.11 (1 MB) 

Read More

December 27, 2015

VLC Media Player Shortcut Keys

Posted by Unknown
New VLC user?

Don't know about keyboard shortcuts?

Don't worry here i am going to list all keyboard shortcuts for vlc media player.

hope it will enjoyable for you.





Shift     Start/Pause

Single Key Control

A     cycle aspect ratio
B     cycle audio track
C     cycle cropping ratio
D     cycle deinterlace filters
E     next frame (1.0 and over)
F      toggle fullscreen
G     subdelay down
H     subdelay up
I       interface show
J      audiodelay down
K     audiodelay up OR next subtitle-track (or none) (??????????????)
L      loop
M     mute
N     next track
O     original video size ( adding the black borders to the video )
P     previous track
R     random
S     stop
T     position/time
V     subtitle track cycle
W    wallpaper (does only work with video output DirectX)
Z     cycle zoom
+     Play faster 
-      Play Slower 

Shift Control

Shift + A      cycle audio device
Shift + B      title next

Shift + G      history back
Shift + H      history forward
Shift + N      chapter next
Shift + O      title prev
Shift + P      chapter prev
Shift + M      disc menu
Shift + R      Record
Shift + S      snapshot

Alter Control

Alt + A            audio menu (English translation)
Alt + C            crop / (+shift) uncrop bottom
Alt + D            crop / (+shift) uncrop left
Alt + F            crop / (+shift) uncrop right
Alt + H            help menu (English translation)
Alt + L            playback menu (English translation)
Alt + M            media menu (English translation)
Alt + R            crop / (+shift) uncrop top
Alt + T            tools menu (English translation)
Alt + V            video menu (English translation)

Arrow Control

Alt + Left Arrow               jump 10 sec. back
Alt + Right Arrow            jump 10 sec. forward
Control + Left Arrow       jump 1 minute back
Control + Right Arrow    jump 1 minute forward
Control + Alt + Left Arrow jump 5 minutes back
Control + Alt + Right Arrow jump 5 minutes forward
Shift + Left Arrow            jump 5 seconds back
Shift + Right Arrow         jump 5 seconds forward
Ctrl+Rt Arrow                  Forward 1 minute
Ctrl + Rt Arrow                Forward 1 minute
Ctrl+Lt Arrow                  Backward 1 minute
Ctrl + Lt Arrow                Backward 1 minute
Alt + Ctrl + S                   Video Snapshot

Control Itself

Ctrl + A         Advanced controls
Ctrl + B         Bookmarks
Ctrl + C         Open capture device
Ctrl + D         Open disc
Ctrl + E         Extended settings
Ctrl + F         Open Folder/Directory
Ctrl + H         hide/show menus (a.k.a Minimal view; like in Acrobat Reader)
Ctrl + I           Media Information
Ctrl + J          Codecs Information
Ctrl + L          Hide/Show playlist
Ctrl + M         Messages
Ctrl + N          Open network stream
Ctrl + O          Open File
Ctrl + P          Preferences
Ctrl + Q         Quit
Ctrl + R         Convert/Save
Ctrl + S         Streaming
Ctrl + T         Goto Time
Ctrl + U         Dock/Undock playlist
Ctrl + V         Paste Location/Paste MRL
Ctrl + Shift+W        VLM configurator
Ctrl + X         Load playlist
Ctrl + Y         Save playlist

Also read: New Technology Li-Fi is coming up
Read More

December 26, 2015

New Technology Li-Fi is Coming Up

Posted by Unknown
Say Goodbye to Wi-Fi.New remote innovation is coming soon. It has 100 times speedier than Wi-Fi. 

It is Li-Fi and its beyond your imagination. Its transmits data utilizing obvious light correspondence its as yet being tried in numerous workplaces and different spots in Tallinn in Estonia.




Its been uncovered that Li-Fi can be up to 100 times speedier than wi-fi.
it use unmistakable light and transmits messages through parallel code. stable light can not go through dividers, it is through the framework will be more secure. 

Be that as it may, analysts have no arrangement to escape the Wi-Fi with Li-Fi, they are planning to develops a new technology with these in order to develop more reliable and secure connectivity.


Professor Harald from the Univeristy of Edinburgh has developed Li-Fi in 2011, he demonstrated that more information could be transmitted than a phone tower by gleaming light through a signaled LED. 

Our homes, workplaces, and industry structures have as already been fitted with framework to give Wi-Fi, and tearing the greater part of this out to supplant it with Li-Fi innovation isn't especially practical, so the thought is to retrofit the device we have at this time to work with Li-Fi innovation.
Read More

Install Whatsapp on Tablets without Sim Card

Posted by Unknown



The first step you need to do is, obviously downloading Whatsapp from the Google Play Store.

Now, open whatsapp, it will ask you to enter your mobile number. Now, enter the mobile number for which you want to activate whatsapp.

Now, it will show that “we have sent an sms at your number, we will automatically detect that and let you know when we are done” . Now, you will receive an sms with verification code at the mobile number which you have entered. Delete it! Its of no use.

Whatsapp wil try to detect the sms till 5 minutes but after 5 minutes, it will show a message that sms not detected and will display the option to “verify by call”

Just press the call button and you will instantly receive a call on the number you entered. Pick it up, a voice will tell you your verification code (It will repeat it 3-4 times), listen it carefully and enter it in your tablet.

That’s it! You are done with the installation of whatsapp on your sim card less tablet.

Also Read : Octro TeenPatti new Cracker

Note:

Whatsapp works on only one device for each number. So, if you install it in your tablet, you cannot use it simultaneously for the same number on your phone. If you try to do that, it will block your access and show you the message to reverify your number.

So, this was the whole you need to know to install whatsapp on Tablets with no Sim Cards. Hope I have helped you.

Please like and share this post. Your valuable comments are always appreciated.

Also Read :
How to increase internet speed on Windows PC
Read More

Beautifull 3D social widget for blogger 2015

Posted by Unknown
Hello friends today i want to show you the latest 3d social widget for blogger. 


Live Demo 




To add this widget 

  1. Go To Layout>Add A Gadget>Html/javascript 
  2. Paste The Give Code And Save The Arrengements 
linkrel="stylesheet" href="https://googledrive.com/host/0B_7JWdEqBhVVbThSWkRoNDZQc00"/> 
<div class="maincont"> 
<div class="container"> 
<ul class="ch-grid"> 
<li> 
<div class="ch-item ch-img-1"> 
<div class="ch-info-wrap"> 
<div class="ch-info"> 
<div class="ch-info-front ch-img-1"></div> 
<div class="ch-info-backfb"> 
<h3>Facebook</h3> 
<a href="your facebook url">Like Our Facebook Page</a> 
</div>
</div> 
</div> 
</div> 
</li> 
<li> 
<div class="ch-item ch-img-2"> 
<div class="ch-info-wrap"> 
<div class="ch-info"> 
<div class="ch-info-front ch-img-2"></div> 
<div class="ch-info-backgp"> 
<h3>Google+</h3> 
<a href="your google plus url">Add us on Google+</a> 
</div> 
</div> 
</div> 
</div> 
</li> 
<li> 
<div class="ch-item ch-img-3"> 
<div class="ch-info-wrap"> 
<div class="ch-info"> 
<div class="ch-info-front ch-img-3"></div> 
<div class="ch-info-backtw"> 
<h3>Twitter</h3> 
<a href="your twitter url">Follow on Twitter</a> 
</div> 
</div> 
</div> 
</div> 
</li> 
</ul> 
</div> 
</div> 

All Done Enjoy!!
Read More

December 22, 2015

Windows 10 All the Editions Official Final ISO Direct Download Links !

Posted by Unknown





Windows 10 is a personal computer operating system released by Microsoft as part of the Windows NT family of operating systems. It was officially unveiled in September 2014 following a brief demo at Build 2014. The first version of the operating system entered a public beta testing process in October 2014, leading up to its consumer release on July 29, 2015, and its release to volume licensing on August 1, 2015. To encourage the adoption of Windows 10, Microsoft announced that during its first year of availability, the operating system would be made available free of charge to users of genuine copies of eligible editions of Windows 7 or Windows 8.1. 

Direct Download Links 

Windows 10 Home 

Download 32 Bit (2.87 GB) 
Download 64 Bit (3.82 GB) 

Windows 10 Pro 

Download 32 Bit (2.84 GB) 
Download 64 Bit (3.80 GB) | Mirror

Windows 10 Enterprise 

Download 32 Bit (2.69 GB ) 
Download 64 Bit (3.84 GB) 

Windows 10 Education 

Download 32 Bit (2.62 GB) 
Download 64 Bit (3.53 GB) 

Windows 10 All in One Edition 

Download (4.80 GB) | Mirror (google drive) 

Torrent Download Links 

Windows 10 Home 

Download 32 Bit (2.87 GB) 
Download 64 Bit (3.82 GB) 

Windows 10 Pro 

Download 32 Bit (2.84 GB) 
Download 64 Bit (3.80 GB) 

Windows 10 Enterprise 

Download 32 Bit (2.69 GB ) 
Download 64 Bit (3.84 GB) 

Windows 10 Education 

Download 32 Bit (2.62 GB) 
Download 64 Bit (3.53 GB) 

Windows 10 All in One Edition 

Download (4.80 GB) 

Notes : 

All the links are given for the latest final official released ISO files (29th July 2015 Official Release)

Windows 10 Home has a catch . Microsoft don’t let you turn off automatic updates on Windows 10 Home. But its free, no crack required 

All in One Edition let you select the edition you want install in the installation setup (Direct Download link has all the editions each edition from both 32 bit and 64 bit) 

I found That To : Windows 10 Final Any Edition Activator is Here ! [Pro,Enterprise & All]

Read More

CONTRACT KILLER: SNIPER v4.0.1 MOD APK is Here ! [LATEST]

Posted by Unknown

What Is Contract Killer : Sniper :

Contract killer sniper is amazing android game where you can play with realistic environment like counter strike.

Features of game:

  • Eliminate a mob of enemies, destroy entire bases or take out the single target that matters most. The next objective is up to you.
  • Take on over 250 missions and campaigns with unique goals. Stake out targets from long-range, take them down with well-placed shots, assault enemy bases head on or infiltrate enemy lines without compromising your identity.
  • Upgrade your weapons and base defenses to protect your stash. Load up on sniper rifles, assault rifles, heavy guns, tesla guns, rocket launchers, throwing knives, med kits, armor, and more.
  • Assault other players’ bases, steal their resources, and become the undisputed champion of PvP. 
  • Choose your path through each mission and use cover to your advantage. Disable sentry guns, detonate explosive objects and avoid incoming fire. 
  • Move unseen from one location to the next and take on the newest international contracts. It’s up to you to become the ultimate global assassin. 
  • High-end, immersive tablet gameplay! 


Download Links

How to Use: 

  1. Just Download above file and install in your android device 
  2. Enjoy!
Read More

Lucky Patcher cracked Apk is Here! [LATEST]

Posted by Unknown

What is Lucky Patcher ? 


Lucky Patcher is a stunning android application which gives you a chance to expel advertisements, break distinctive applications from Android Market License Confirmation or different Confirmations for the applications. For using this application you require rooted device.

It can Patch each applications to 

  • Remove licence check in all applications 
  • Remove ads in all application
  • Customize as well as restrict permissions
  • Create an altered application 
  • Manually patch with HEX code
  • Backup applications for future use
  • Patch an application while device booting


Bugs: 

  • It cannot give you guarantee that the fix works or doesn't block the application 
  • It can work only on rooted device and Busybox

Changelog : v5.9.1 

  • Fix settings information from old package for a few firmwares
  • If you have issue with new lucky patcher, you can attempt clear information for IP
  • New lP requirement for reapply support fix to target applications.


        

Download

Please note : Root Needed

How to use:

  • Download the apk file
  • Install it and you will see each of the applications clarifying a wide range of applications 
  • It will describe all the applications conduct, it is possible that it has google advertisements, permit confirmation or some other limitation 
  • Simply apply path to it and you are finished.
Read More

December 18, 2015

Octro TeenPatti Hacking Tricks

Posted by Unknown 3 Comments
Octro Teen Patti is a standout amongst the most played android game and well known poker game in asian nations. In this game you can challenge other player in various table which is having diverse boot prices. Many People are constantly looking for it's genuine hack for boundless chips or to get Octro TeenPatti chips without paying. Much the same as other Poker game. 
However othe games such as 8ball can be hacked in iOS through a cydia change, Octro teen patti poker has no chance to get around it. The strategies you get from the web are either all fake and waste of time.
Some folks claim to have hacked octro teen patti and as a proof they likewise make fake recordings of unlimited chips on Youtube. 
For the most part on web three well known fake approaches to Hack Teen Patti. I am posting all these three craps here !

Methods To Hack Octro TeenPatti

1. Hack Octro Teen Patti by Using GameKiller : 

  • Game Killer is an popular Android application for hacking coins, chips, cash and a great deal. However, it works for offline games only.
  • Game Killer required root permission, so you need to root your gadget and this will void your gadget's guarantee. On contrary, nothing will happen in light of the fact that Teen Patti is an Online game. 
  • So I prescribe you to don't root your gedget for hacking Octro teen patti because it won't work.

2. Octro Teen Patti Hack Tools : 

  • They all are FAKE ! When you'll open the download connection of that file. It will take you to the download page and for the download that file and will approach you for the survey and that survey will be unending. 
  • So don't squander your opportunity to finish these overviews.

3. Hack Octro Teen Patti with Freedom app: 

  • Yesterday I've seen a video on YouTube. It's a FAKE video which demonstrating that one can purchase free chips from Octro for FREE by Freedom application ! 
  • I attempted it excessively ! what's more, I failed everytime. 
  • When I introduce freedom application and run teen patti and purchased chips from octro it saw that Payment Successful BUT following a moment it demonstrates a popup "There is an issue handling your receipt'". It implies you can not get chips ! 
  • So kindly don't attempt the Freedom application its a misuse of a period ! 

Conclusion : 

Shape over three techniques it is certain that there is a no strategy accessible to Hack teen patti. However, many individuals are offering chips. you can purchase chips from him, but it is illegal of an Indian government. So it is fitting to don't play teen patti and spare you time and cash.

One of the effective method i found is . . .

4. Cheat With Your Friends On Facebook :

  • Open your Teen patti app and check your leader board. If someone having lots of chips then try to hack his/her facebook account by following method.
  • Sync contact by using old facebook android app. just go to Facebook app >> Settings >>sync contact >> Sync all
  • You will get his/her mobile number as well as email id (if submitted on Facebook). Then you can try mobile number or birth date as password. If you are lucky then it will works for you sometimes.
  • Also try this for gmail account.
  • This method is probably works for old fashion TeenPatti users. I tried for many accounts and get it useful.
  • And finally this is not fair method but the only way to get free chips.
So, I recommend you to play this game for fun not for money.

Read More

December 16, 2015

How to Put Meta Keywords in Each Blogger Post

Posted by Unknown
To discover your webpage's rank better in internet browser, you need to include metatags or keywords in each page of the site. Metatags or keywords are exceptionally valuable SEO terms. Be that as it may, when you need to place keywords in each blogger posts, you can't because of there is just meta description put in blogger. There you can't discover keywords including space. So in the event that you need to include metatags or keywords likewise, you need to include a few codes your blogger format. Meta catchphrases are likewise as imperative as meta description. Meta labels help you to build sound and better movement. 
Here I will demonstrate to you proper methodologies to include metatags or keywords in blogger format for individual post of your blog. Ensure that this code need to include blogger template not in post coding box.

Method of adding Metatags or Keywords


Tip: I generally prescribe you not to change any code of your tamplate without keeping backup of your template.

  • Log in to your Blogger
  • Go to Template >> Edit Html.
  • Now find the code <b:include data=’blog’ name=’all-head-content’/>
  • Paste below code after above indicated code

<b:if cond='data:blog.url == "PAGE-URL"'>
<meta content='PAGE-KEYWORDS' name='keywords'/>
</b:if>

You can also add description by below code otherwise do it in each individual post as shown below.
<meta content='PAGE-DESCRIPTION' name='description'/>

Adjustments: 

  • Write the url of your post in PAGE-URL.
  • Write meta description in PAGE-DESCRIPTION.
  • Write meta keyword in PAGE-KEYWORD.
  • You have to add new code for each new Post
  • If you can not find <b:include data=’blog’ name=’all-head-content’/> then simply paste above code after <head> 
  • Adjust above code as per your post.
  • Do not forget to hit save template button.

If you have any doubt then leave comment below.



Read More

December 15, 2015

SQL Injection Using Software

Posted by Unknown


SQL Injection with Software

Before we see what SQL Injection is. We should know what SQL and Database are.

Database:

Database is collection of data. In website point of view, database is used for storing user ids,passwords,web page details and more.

Some List of Database are:

* DB servers,
* MySQL(Open source),
* MSSQL,
* MS-ACCESS,
* Oracle,
* Postgre SQL(open source),
* SQLite,

SQL:

Structured Query Language is Known as SQL. In order to communicate with the Database ,we are using SQL query. We are querying the database so it is called as Query language.



Definition From Complete Reference:

SQL is a tool for organizing, managing, and retrieving data stored by a computer database. The name "SQL" is an abbreviation for Structured Query Language.

For historical reasons, SQL is usually pronounced "sequel," but the alternate pronunciation "S.Q.L." is also used. As the name implies, SQL is a computer language that you use to interact with a database. In fact, SQL works with one specific type of database, called a relational database.

Simple Basic Queries For SQL:

Select * from table_name :

this statement is used for showing the content of tables including column name.

For eg:

select * from users;

Insert into table_name(column_names,...) values(corresponding values for columns):

For inserting data to table.

For eg:

insert into users(username,userid) values("TheSec","break");


What Is SQL Injection?


SQL injection is Common and famous method of hacking at present . Using this method an unauthorized person can access the database of the website. Attacker can get all details from the Database.

What an attacker can do?

- ByPassing Logins
- Accessing secret data
- Modifying contents of website
- Shutting down the My SQL server

Now let's dive into the real procedure for the SQL Injection.


Steps


Finding Vulnerable Website:

Our best partner for SQL injection is Google. We can find the Vulnerable websites(hackable websites) using Google Dork list. google dork is searching for vulnerable websites using the google searching tricks. There is lot of tricks to search in google. But we are going to use "inurl:" command for finding the vulnerable websites.

Some Examples:

inurl:index.php?id=
inurl:gallery.php?id=
inurl:article.php?id=
inurl:pageid=

Here is the huge list of Google Dork


How To Use?

Copy one of the above command and paste in the google search engine box.

Hit enter.

You can get list of web sites.

We have to visit the websites one by one for checking the vulnerability.

So Start from the first website.

- After finding the vulnerable website open Havij, lets say the vulnerable site has

URL:- “http://website.com/index.php?module=pages&id=85”

- If you get error then site is vulnerable to S.Q.L. injection attack .

- Download havij from here.

- After opening Havij paste the above URL like this i-e of vulnerable Site:-

- After that hit “Analyze” and thus it will scan site that whether sql injection is possible or not. 

- It will tell you the type of server and also the type of OS running on the server and will give a message like :- Target Vulnerable if the site is vulnerable.

Now go to “Tables” and “Get Database” and after getting data bases check all of them and hit “Get Tables” After getting tables of DB’s , select the admin table and hit “Get Columns” , after getting columns now a hacker can check the password and username column and can hit “Get Data”.

Now a You will get data in encrypted form , like mostly in “md5 hash” but we can decrypt it easily by using havij or other online tools present, After decrypting md5 , you have to find “admin page” using havij, find the buttons for decrypting md5 and finding admin page, Point the browser to the admin page, where you have to put the decrypted “password” and “username” of the admin to login into the website.

Thus after successful login into the website as admin the hacker can do whatever he wants.
Read More