Showing posts with label Security Info. Show all posts

What is SSL? What the hell is it !


Ok so here we know that the SSL is protocol(set of rules) to make is feel safe, but hey anything that makes things safer is enemy of hackers >:0 So we need to understand what it is and the chop it into pieces!

WIKI SAYS: Secure Sockets Layer (SSL), is cryptographic protocols that provide communication security over the Internet.TLS and SSL encrypt the segments of network connections above the Transport Layer, using asymmetric cryptography for key exchange,symmetric encryption for privacy, and message authentication codes for message integrity.
Several versions of the protocols are in widespread use in applications such as web browsing, electronic mail, Internet faxing, instant messaging and voice-over-IP (VoIP). (via[http://en.wikipedia.org/wiki/Secure_Sockets_Layer] )

A MIND BLOWING AND EASY VIDEO TUTORIAL! 




HOW TO CHOP IT!
Here is a article for that http://hackthepc.blogspot.com/2011/12/ssl-strip-video-tutorial.html
Sunday, December 25, 2011
Posted by Anonymous

"How to" Tutorial Collection.



Here's the list of the containing Tutorials:-
 How To Change Your Folders Background
- How To Crack A Router For Username And Password
- How To Deface With Tamper Data
- How To Get Passes To Pornsites
- How To Get Past Your School Blocking System Without Programs
- How To Hack Into A Computer On LAN
- How To Hack Passwords Using USB Drive
- How To Hack Someone With His IP Address
- How To Hack WEP wifi Passwords
- How To Hide Files In A jpg
- How To Make A Phisher For A Website
- How To Make Moilla Firefox 30 Times Faster
- How To Shutdown A Computer With A Cell Phone
- How To Sniff Password With Cain And Abel
- How To Use Your First Web Exploit
- How To Crack A WEP Encryped Wireless Network On Windows Vista
- How To Get IP's Through The Steam Client
- How To Get Unlimited Time In Internet Café's
- How To Grab IP Address With PHP
- How To Kick Everyone From A Counter Strike Source Server
- How To Kick Someone Of A Wireless Network
- How To Make Your Name Stay In The Task Bar
- How To Use A Trial Program Forever Without Activation
- How To Use Cain & Abel To Get Local Passwords
- How To Close Ports
- How To Crack WEP In Linux
- How To "Deface" A Guestbook With HTML-Injection
- How To Chat With Friends Through CMD (Netsend)
- How To Rename Your Recycle Bin
- How To Make A Folder Lock Without Any Software
- How To Reveal Asterisk Passwords Using Javascript
- How To Hack An Administrator Account With A Guest Account



DOWNLOAD> 
http://www.mediafire.com/?gqhom1z4m0m
or
http://www.multiupload.com/1LRB7G0PRZ
Saturday, August 13, 2011
Posted by Anonymous

How not to get HACKED?

Follow These Simple Guidelines n u are done

1. Stop using Internet Explorer and make the switch to Opera, it’s more secure, plain and simple.

2. Get Spybot Search and Destroy or Spyware Doctor and immediately update it.

3. Get Adaware SE and immediately update it.
(Use both as a 1-2 punch on infected client computers and between the two there’s not much they won’t kill)

4. Update your anti virus

5. Boot into safe mode and run all three scans

6. While the scans are going check your registry (Click start –> Run and type regedit to get intot he registry) and look in HKEY_CurrentUser/software/microsoft/windows/currentversion/run & HKEY_Local_Machine/software/microsoft/windows/currentversion/run. Verify that all programs listed are legitimate and wanted.

7. If or when your antivirus scan comes across anything, search for that file name in your registry and delete it.

8. Use explorer to go to the windows/system32 folder and sort by date. If you haven’t already done so, make sure you can see the entire file names. click Tools –> Folder Options and unclick the box labeled “Hide extensions for known file types” and under Hidden files and folders click “Show hidden files and folders.” However, make sure you choose “Hide protected operating system files” so you don’t accidentally remove anything that would cripple your computer.. You are looking for recent files with names ending with .exe and .dll that look suspicious. Major culprits will have gibberish names such as alkjdlkjfa.exe.

9. Once you can get clean scans in safe mode, reboot in normal mode and scan all over again. If you can’t get a clean scan in regular mode then you have something more persistent that could take more research.

10. Make sure your firewall doesn’t have strange exceptions.

11. If you suspect anything that is going wrong with your computer is the action of a stalker, on a more secure system change all your passwords.

12. If your system has been specifically targeted and hacked you can never be 100% sure that your system is no longer compromised so start with 11, make backups of personal files on the infected system and format and re-install Windows.

Good luck!
Tuesday, November 23, 2010
Posted by Anonymous

WHAT IS SSL?

You might have heard some times that not to give your password or credit card information or any other sensitive information on public computers or on Msn, yahoo etc chats.The reason why you might have heard that the Hackers have some ways to you would have probably heard that hackers have a way to steal your your credit card numbers , passwords etc.
A hacker can use different types of attacks such as Packet sniffing or ARP Poisoning to steal your sensitive information

Secure Sockets Layer (SSL) is the most widely used technology for creating a secure communication between the web client and the web server. You must be familiar with http:// protocol and https:// protocol, You might be wondering what they mean. HTTP protocol is used for standard communication between the Web server and the client. HTTPS is used for a secure communication.

Cryptography


If two users want to have a secure communication they can also use cryptography to accomplish it

For example:

TFDVSF=Encrypted Text

SECURE= Decrypted Text

You might be wondering how i Decrypted it, Here i have used Algorithm=+ for the communication and the key is "1", What comes after S is T so as you can see that S is converted into T, What comes After E is F to letter E from the word secure if converted into F and so on, To help you understand this more better I am adding a Video



So If the hacker starts sniffing from between he will get Encrypted text and as the Hacker does not know the keys so he cant decrypt it, but if the attacker or hacker is sniffing from the starting point so he will get the key and can easily Decrypt the data

Standard Communication VS Secure communication

Suppose there exists two communication parties A (client) and B (server)

Standard communication(HTTP)


When A will send information to B it will be in unencrypted manner, this is acceptable if A is not sharing Confidential information, but if A is sending sensitive information say "Password" it will also be in unencrypted form, If a hacker starts sniffing the communication so he will get the password.

Secure communication (HTTPS)

In a secure communication i.e. HTTPS the conversation between A and B happens to be in a safe tunnel, The information which a user A sends to B will be in encrypted form so even if a hacker gets unauthorized access to the conversion he will receive the encrypted password (“xz54p6kd“) and not the original password.

This mean that even if the Hacker Sniff the Communication between the client And Server even then he/she would not be able to get the Sensitive information.
Monday, November 22, 2010
Posted by Anonymous

Popular Post

Labels

- Copyright © _.:Learn To Hack:._ :: Hacking Tutorials :: Warez -Metrominimalist- Powered by Blogger - Designed by Johanes Djogan -