Translate

Friday, June 28, 2013

FREE Encryption and Decryption program for everyone

In your life there must have come a time, at-least once or a time might come where you want to send a secret message to someone and you wouldn't wish to disclose that message to a third person even if comes into handy of that individual. Well, you are in the right place.



I've created FREE encryption and decryption for everyone. You can use it, share it and do anything you like and all for FREE!! You can find the download link of the programs below. However, it is recommended that you watch the above tutorial video before using the programs. 

You can download the FREE encryption and decryption programs from here:

http://www.mediafire.com/download/cvwebhr7sq1y03q/FREE_encryption_and_decryption_programs_for_everyone-_by_Arlene_Batada.zip



Warning: No cipher is 100% secure. The security of this cypher increases with the length of the key, however no one can guarantee 100% security. It is recommended not to use it for commercial purposes.

Friday, December 7, 2012

Create your own "I LOVE YOU" Virus


So, today I’m going to teach you how to say “I LOVE YOU” to someone. :D ha..ha..ha.., just joking. Well, I’m not lying but actually I’m going to teach your computer to say “I LOVE YOU”. Along with I LOVE YOU, we’ll also look at one other virus code today. These are very simple codes and many of you might be aware of these viruses, but still for those who aren’t will find this exciting.

  1) "I LOVE YOU" virus

Simply copy-paste the given code in notepad:

@ echo off
:love
               msg * I LOVE YOU darling....!!!
goto love

Save the file as love.bat

Once you execute the file by double clicking on it, a message box displaying “I LOVE YOU darling….!!!” Will be displayed on the screen. Try closing it. You’ll enjoy it.

                                                             

Woking: Those who know ‘C’ programming will understand this quickly. 

The ECHO OFF/ON Command is a command which will either turn ON, or OFF the command you put in a batch file from showing itself. Like, here we’ve typed @ echo off so it won’t show the virus code we’ve typed in.

:love‘ is a function you’ve created. And ‘msg * I LOVE YOU darling....!!!’ is the body of the function.‘msg’ is a command to display the message.‘goto :love’ again calls back or executes love function up to infinite times.  So, it would never end.

    
NOTE:- This Virus will not harm to your computer but it continuously runs on the desktop and will be a “pain in the ass”. Once you restart the PC and everything will be as usual. So have fun with your friends by this love virus and also wish your Girl/Boy Friend with this new type of Wishing .
2

   2) "Flooder" Virus

Simply copy-paste the given code in notepad:

@ echo off

:flooder
         md %random%
goto flooder

Make a new folder (I’m telling you to do this for your own good). Save the notepad file in this new folder as flooder.bat

Open the Saved Location of file and Double Click the Bat file and see to your surprise, you’ll find directory filled Up with astronomical number of random folders.

                                                                  
Woking: Working is the same as mentioned in ‘I LOVE YOU’ virus. ‘md’ stands for ‘make directory’. '%random%' generates random numerical values for the directories' name.

NOTE:-This Virus will not harm to your computer but the victim will have a hard time in manually deleting the folders. So to test this virus, create a separate folder and then test it.

Even you yourself can create your own virus by learning batch programming. It is important to note that these viruses will only run on ‘Windows’ operating systems.

In the next post learn to create a real and destructive virus. Till then experiment these viruses and enjoy with your friends.
Have a nice day :) ….

Tuesday, November 27, 2012

Appropriately Indian: Information of India's I.T. discipline

http://www.dukeupress.edu/Assets/Books/978-0-8223-4870-2_pr.jpg 

I.T. field has shown a significant development in the previous decades. The I.T. professionals from India are the core part in the I.T. fanfare created around the world. Job opportunity, including India, is touching the skies in this field. The rationality of merit is so deeply embedded within the logics of the I.T. industry that it especially convinces professional I.T. women that they work in a gender equitable industry in which each woman advances according to her own merit.

It is a false myth the I.T. field is opted by the students of middle class only. In this context Smitha Radhakrishnan wrote a book- “Appropriately Indian”. Brief examples of approx. 130 people pertaining to this field have been a part explanation of this book. She tells that I.T. is one of those successful fields in the world which includes students from both, the middle class as well the upper class families.

 Why is it that I.T. field has a significant demand all over the world? Answer to this question has been given in this book. Moreover, our country is successful in creating its own image in front of the world. In this task, how I.T. sector has played a substantial role is also explained in this book. This book also tells us of How I.T. field is distinct in terms of professionalism with respect to other fields. If you wish to have a close approach to the field of Information Technology, then one may find this book helpful.

You can read the book online over Here.
You can buy imported edition of the book over Here.
You can buy the Indian edition over Here.
To read a more detailed review of this book, click Here.

Thursday, November 15, 2012

Hacking WPA/WPA2 Wi-Fi Networks




Did you ever have a feeling to learn How to Hack Wi-Fi networks? Did you wish to use other people’s Wi-Fi networks but couldn’t, because you didn’t know the network key? 

If the answer to the above questions is YES, then this tutorial is for you.

The old Wi-Fi networks had WEP (Wired Equivalent Privacy). The WEP connection was easily vulnerable to password cracks. So, two new security protocols namely WPA (Wi-Fi Protected Access) and WPA 2 (Wi-Fi Protected Access II) came into effect.
But, in the world of computers, you’ll always find keys to all the locks either being formed or already would’ve been constituted. So, today we are going to learn about cracking WPA and WPA2 Wi-Fi passwords.

For this, you’ll need Hackers' favorite operating system- BackTrack. To download BackTrack and learn about its installation, go to:

WPA/WPA2 password can be cracked simply by capturing WPA handshake and then applying a dictionary attack on them. If he passphrase is in the dictionary then password will be cracked, and this process may take hours, in some cases in even days. But what if password is not in dictionary?

So here we will learn to crack these passpharses

WPS :- Wi-Fi Protected Setup (WPS; originally Wi-Fi Simple Config) is a computing standard that attempts to allow easy establishment of a secure wireless home network. By default this is enabled in most of routers.

WPS has been shown to easily fall to brute-force attacks. A major security flaw was revealed in December 2011 that affects wireless routers with the WPS feature, which most recent models have enabled by default. The flaw allows a remote attacker to recover the WPS PIN in a few hours and, with it, the network's WPA/WPA2 pre-shared key. Users have been urged to turn off the WPS feature, although this may not be possible on some router models.

So, using Reaver we will brute force the AP's (Wireless Access Point) WPS, attempting every possible combination in order to guess the AP's 8 digit pin number. Since the pin numbers are all numeric, there are 10^8 (100,000,000) possible values for any given pin number. However, because the last digit of the pin is a checksum value which can be calculated based on the previous 7 digits, that key space is reduced to 10^7 (10,000,000) possible values.

The key space is reduced even further due to the fact that the WPS authentication protocol cuts the pin in half and validates each half individually.

Reaver brute forces the first half of the pin and then the second half of the pin, meaning that the entire key space for the WPS pin number can be exhausted in 11,000 attempts.So here key concept is that we can brute-force that pin, and can get all the credentials kept for Access Point which can be any combination of digits, special symbols.

Let's Start :

Boot your Backtrack :

Let's we will change the mac address of our network card so that we won't get caught

airmon-ng start wlan0
ifconfig mon0 down
macchanger -m 00:11:22:33:44:55 mon0
ifconfig mon0 up

Now run the following the command to get all the available AP's

wash -1 mon0

Now choose your target and note its bssid and issue the following command replacing <bssid> with the targets bssid:

reaver -i mon0 -b <bssid> -vv

Now wait until you Reaver brute force's the pin. Once its done, you'll have

WPS Pin
WPA PSK
AP SSID

So, Enjoy Hacking!!!

NOTE: THIS IS FOR EDUCATIONAL PURPOSE ONLY AND IN NO WAY SHOULD BE MISUSED.