This Blog is about Technology to which our World is Addicted

This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Sunday 26 April 2015

Top 25 people who changed internet forever...


Top 25 people who changed internet forever...

1• Sir Tim Berners Lee 
Tim BL
                                               – World Wide Web


In 1989, Tim Berners-Lee invented the World Wide Web, an Internet-based hypermedia initiative for global information sharing while at CERN, the European Particle Physics Laboratory. He wrote the first web client and server in 1990. His specifications of URIs, HTTP and HTML were refined as web technology spread.
He is Director of the World Wide Web Consortium (W3C), a Web standards organization founded in 1994 that develops interoperable technologies (specifications, guidelines, software, and tools) to lead the Web to its full potential. He is a founding Director of the Web Science Trust (WST) launched in 2009 to promote research and education in Web Science, the multidisciplinary study of humanity connected by technology. Berners-Lee is also a Director of the World Wide Web Foundation, launched in 2009 to coordinate efforts to further the potential of the Web to benefit humanity.
At MIT, Berners-Lee is the 3Com Founders Professor of Engineering in the School of Engineering, with a joint appointment in the Department of Electrical Engineering and Computer Science at the Laboratory for Computer Science and Artificial Intelligence (CSAIL). He is also a Professor in the Electronics and Computer Science Department at the University of Southampton, UK.
In 2001 Berners-Lee became a Fellow of the Royal Society. He has been the recipient of several international awards. In 2004 he was knighted by H.M. Queen Elizabeth, and in 2007 he was awarded the Order of Merit.
2• Vint Cerf And Bob Kahn 

                                                            –TCP/IP
While it's true that both Vinton Cerf and Bob Kahn made of their many of their own notable accomplishments, it was their partnership that drove the creation of the TCP/IP protocol as one of the core components of the Internet.  

The partnership can be traced back to when Cerf was a graduate student at UCLA and Kahn, who was working on hardware for the ARPANET. But it wasn't until 1973 that when Kahn, who as then working for Defense Advanced Research Projects Agency (DARPA), rejoined his UCLA colleague to create the TCP/IP protocol.
There were two major events that led Kahn to start developing the TCP/IP protocol.
During the International Computer Communication Conference in the fall of 1972 when he was working at the Information Processing Techniques Office (IPTO) within ARPA, Kahn demonstrated the ARPANET by connecting 20 different computers. This was described as "the watershed event that made people suddenly realize that packet switching was a real technology."  
But it was in 1973 when Kahn was working on a satellite network project that he got the inspiration to develop what eventually became the TCP protocol. Initially, the TCP protocol was meant to be a replacement for the ARPANET's NCP protocol. All of his work on TCP/IP helped laid the groundwork for open-architecture networking, a concept that enables any computer and network to freely speak with one another despite the hardware or software they use on their particular system.
In 1976, Cerf joined Kahn at DARPA (the Defense Advanced Research Projects Agency) and stayed there until 1982. Then, like fellow Internet pioneer Larry Roberts, he realized that packet switching and the Internet had commercial applicability, so he joined MCI, now Verizon Business (NYSE: VZ), where he developed the MCI Mail service that was connected to the Internet.
Along with driving the commercialization of e-mail, Cerf was a key figure in forming and funding the Internet Corporation for Assigned Names and Numbers (ICANN), an organization that manages IPv4 and IPv6 address spaces and assigns address blocks to regional Internet registries such as the American Registry for Internet Numbers (ARIN).
In the early 1990s, the two men synched up again to form the Internet Society (ISOC), an organization that aims to drive awareness around Internet-related standards, education and policy.  
Their influence continues to resonate in 2011 through their activism and corporate work.
Since 2005, Cerf has served as Google's (Nasdaq: GOOG) vice president and chief Internet evangelist and on the UN's Broadband Commission for Digital Development, which has set a goal of expanding the availability of broadband services. Meanwhile Kahn serves as the Chairman, CEO and President of the Corporation for National Research Initiatives (CNRI) that is set on providing funding for research and development for the National Information Infrastructure.

3• Larry Page and Sergey Brin

    
                                                                                                        – Google Inc.

Larry Page and Sergey Brin founded Google, the Internet search engine, while they were graduate students at Stanford University in Palo Alto, California. Since its founding in 1998, Google has become one of the most successful dot-com businesses in history. Both Page and Brin were reluctant entrepreneurs who were committed to developing their company on their own terms, not those dictated by the prevailing business culture.

Not instant best friends

Page grew up in the East Lansing, Michigan, area, where his father, Carl Victor Page, was a professor of computer science at Michigan State University. The senior Page was also an early pioneer in the field of artificial intelligence, and reportedly gave his young son his first computer when Larry was just six years old. Several years later Page entered the University of Michigan, where he earned an undergraduate degree in engineering with a concentration in computer engineering.
Larry Page (left) and Sergey Brin. AP/Wide World Photos. Reproduced by permission.
Larry Page (left) and Sergey Brin.
AP/Wide World Photos. Reproduced by permission.
His first jobs were at Advanced Management Systems in Washington, D.C., and then at a company called CogniTek in Evanston, Illinois.
An innovative thinker with a sense of humor as well, Page once built a working ink-jet printer out of Lego blocks. He was eager to advance in his career, and decided to study for a Ph.D degree. He was admitted to the prestigious doctoral program in computer science at Stanford University. On an introductory weekend at the Palo Alto campus that had been arranged for new students, he met Sergey Brin. A native of Moscow, Russia, Brin was also the son of a professor, and came to the United States with his family when he was six. His father taught math at the University of Maryland, and it was from that school's College Park campus that Brin earned an undergraduate degree in computer science and math.
Brin was already enrolled in Stanford's PhD program when Page arrived in 1995. As Brin explained to Robert McGarvey of Technology Review, "I was working on data mining, the idea of taking large amounts of data, analyzing it for patterns and trying to extract relationships that are useful." One weekend Brin was assigned to a team that showed the new doctoral students around campus, and Page was in his group. Industry lore claims they argued the whole time, but soon found themselves working together on a research project. That 1996 paper, "Anatomy of a Large-Scale Hypertextual Web Search Engine," became the basis for the Google search engine.

4• David Filo and Jerry Yang – Yahoo! Inc.




5• Bill Gates – Microsoft

6• Steven Paul Jobs – Apple Inc.
7• Mark Zuckerberg – Facebook
8• Chad Hurley and Steve Chen – YouTube
9• Linus Torvalds – Linux
10• Jack Dorsey – Twitter
11• Kevin Rose – Digg
12• Bram Cohen – Bit Torrent
13• Mike Morhaime – Blizzard Entertainment
14• Jimmy Wales – Wikipedia
15• Jeff Preston Bezos – Amazon
16• Shawn Fanning – Napster, Rupture
17• Pierre Omidyar – eBay
18• Jack Ma – Alibaba
19• Craig Newmark – Craigslist
20• Matt Mullenweg – WordPress
21• Thomas Anderson – MySpace
22• Garrett Camp – Stumble Upon
23• Jon Postel – Internet Pioneer
24• Caterina Fake – Flickr
25• Marc Andreessen – NetscapeTop 25 people who changed internet forever...

1• Sir Tim Berners Lee – World Wide Web
2• Vint Cerf And Bob Kahn –TCP/IP
3• Larry Page and Sergey Brin – Google Inc.
4• David Filo and Jerry Yang – Yahoo! Inc.
5• Bill Gates – Microsoft
6• Steven Paul Jobs – Apple Inc.
7• Mark Zuckerberg – Facebook
8• Chad Hurley and Steve Chen – YouTube
9• Linus Torvalds – Linux
10• Jack Dorsey – Twitter
11• Kevin Rose – Digg
12• Bram Cohen – Bit Torrent
13• Mike Morhaime – Blizzard Entertainment
14• Jimmy Wales – Wikipedia
15• Jeff Preston Bezos – Amazon
16• Shawn Fanning – Napster, Rupture
17• Pierre Omidyar – eBay
18• Jack Ma – Alibaba
19• Craig Newmark – Craigslist
20• Matt Mullenweg – WordPress
21• Thomas Anderson – MySpace
22• Garrett Camp – Stumble Upon
23• Jon Postel – Internet Pioneer
24• Caterina Fake – Flickr
25• Marc Andreessen – Netscape
Share:

Monday 20 April 2015

How to hack WhatsAPP

How to Access Others WhatsApp Account


Want to access someone else's WhatsApp account from your phone? Here's how to do it -- but make sure to get their permission first, as you might be infringing on their privacy.


Method 1 of 2: MAC Spoofing

Step1

Uninstall WhatsApp from your phone or device. You'll install it again at the end of the method, but you'll need to configure it differently, and the easiest way to make sure you'll be able to do that correctly is to completely uninstall it now.


Step2


Obtain your target's phone. You'll need it for two different steps throughout the process, but this shouldn't take too long - you should be able to return it before your target starts to miss it.

Step3


Find your target's phone's Media Access Control (MAC) address. A MAC address is a unique identifier assigned to your phone or other device that essentially serves as its online identity. Find and write down your target's MAC address. It takes the form of six pairs of letters or numbers, separated by colons (01:23:45:67:89:ab).
  • On an Android, find this in Settings → About phone → Status → Wi-Fi MAC address.
  • On an iPhone, go to Settings → General → About → Wi-Fi Address.
  • On a Windows phone, look in Settings → About → More info → MAC address.
  • On a BlackBerry, go to Options → Device → Device and Status info → WLAN MAC.



Step4


Find your MAC address using the instructions above. Make sure to save it somewhere secure, as you'll want to change your device back to that address once you're done.



Step5

Change ("spoof") your phone's MAC address to that of your target. This will allow your phone to pass as your target's, letting you convince WhatsApp that you are your target when you log in.
  • On an iPhone or other device, install a MAC spoofing app like MacDaddy X or WifiSpoof. Use that to change your MAC address.
  • On Android, install BusyBox and the Terminal Emulator (apps available for free on Google Play). In the terminal, type "ip link show" to see a list of interfaces. Identify the one that has your MAC address -- for this example, we'll use the eth0 interface. In the terminal emulator, enter "ip link set eth0 address XX:XX:XX:XX:XX:XX" and "ip link set eth0 broadcast XX:XX:XX:XX:XX:XX", where eth0 is the interface you identified and XX:XX:XX:XX:XX:XX is your target's MAC address. To check that you've successfully changed your MAC address, enter "ip link show eth0."



Step6


Install and configure WhatsApp on your phone. Enter your target's phone number to set up WhatsApp rather than your own. This will allow you to receive their messages and send messages from their account.



Step7


Get the confirmation code from your target's phone. This code will be sent to their phone number as part of the WhatsApp configuration process. Access their phone one last time to get that verification code. Enter it into WhatsApp on your phone when prompted, and you're all ready to go.
  • If you don't want your target to find out about your spoofing, make sure to delete the confirmation code from their phone before they can see it.

Step8

When you no longer need to access your target's WhatsApp account, change your MAC address back to what it was. Repeat the instructions to change it, but this time change it to your original address rather than your target's. This will restore your phone to how it was originally, which will ensure that there are no future problems with Internet usage or connectivity.\


Method 2 of 2: Using Spy Software:


Step1


Obtain permission from the person whose phone you'll be monitoring. The apps that you'll be using are intended for parents, spouses, or employers to monitor the activity of their children, spouses, or employees. They require that you use them only with prior consent, so make sure to ask the person whose phone you want to monitor and get their full permission before you proceed.

Step2

Choose an app or program to use. There are a number of different apps or programs you can choose from. Research these apps to figure out which one works best for you. Consider factors like what the app was intended for, what it monitors, and whether it will pass undetected by your victim. mSpy and Spymaster Pro are two good examples of the kinds of programs you'll be looking for.
  • Look for the perfect app online, on Google Play, or in Apple's app store.
    Step3
Buy and install your chosen app. Once you've made your purchase, follow the instructions to install the app. This will usually involve installing it on your phone or computer as well as on the phone that you'll be monitoring.

Step4


Set up the app and start tracking. Follow the app's instructions to make sure everything is set up properly so that you can view all the desired information. You should start receiving their WhatsApp messages, as well as any other information you've included.

Share:

Sunday 19 April 2015

DUALBOOT KALI LINUX WINDOWS 8

DUALBOOT KALI LINUX WINDOWS 8 (INSTALL KALI)

Share:

Sunday 12 April 2015

Bulgarian hacker accused of stealing thousands of dollars from Bill Gates arrested in Philippines

Bulgarian hacker accused of stealing thousands of dollars from Bill Gates arrested in Philippines



Konstantin Simeonov Kavrakov, 32, was caught red-handed by the Presidential Anti-Organized Crime Commission (PAOCC) and the Philippine National Police (PNP) Criminal Investigation and Detection Group (CIDG) on Thursday as he was attempting to withdraw cash from an ATM system using fraudulent cards.

Fraudster had nine stolen cards on him

Kavrakov was featured in the press before, when he got arrested and jailed in 2011 in Asunción, Paraguay, for the same type of activity. He was part of a group called by the media Super Hacker Bulgarian Group, whose actions are reported to have begun as far back as 2004.
The press coverage received at that time was due to the arrest of Kolarov Aleksey Petrov (nicknamed “king of hackers” in his native country), who was involved in an operation that led to cloning the payment card of Bill Gates and stealing thousands of dollars from it.
At the time of the arrest on Thursday, Kavrakov had on him nine credit cards belonging to different individuals and a bag with 76,000 Philippine pesos ($1,700 / €1,600).
According to some sources, he tried to bribe the arresting officers by offering them $12,000 / €11,300 to let him go.

Card cloning is not new, but crooks grew more organized

Cloning payment cards is an old robbery technique employed by cybercriminals across the world, who usually get the necessary information for creating a fake card from underground forums.
The underground community has become extremely organized and there are groups specialized in stealing the card data and selling it online to crooks that already have a scheme for getting the cash out of the ATMs.
Most of the times, the card data is obtained by compromising point-of-sale (PoS) systems of various merchants. However, it can also be captured on special devices mounted out of view on ATM systems.
If stolen from PoS, the details are exfiltrated to the hackers, who may sell it for quick money and to avoid unnecessary risks; alternatively, the same group may have control over the hackers, those who clone the cards and the individuals that withdraw the money.
Share:

Friday 3 April 2015

5 Steps Wifi Hacking – Cracking WPA2 Password

5 Steps Wifi Hacking – Cracking WPA2 Password


According to Wikipedia :

Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2) are two security protocols and security certification programs developed by the Wi-Fi Alliance to secure wireless computer networks. The Alliance defined these in response to serious weaknesses researchers had found in the previous system, WEP (Wired Equivalent Privacy)

A flaw in a feature added to Wi-Fi, called Wi-Fi Protected Setup (WPS), allows WPA and WPA2 security to be bypassed and effectively broken in many situations. Many access point they have a Wifi Protected Setup enabled by default (even after we hard reset the access point).

Requirements:

1. Wireless card (support promiscuous mode)



5 Steps Wifi Hacking - Cracking WPA2 Password

In this tutorial I use ALFA AWUS036H from Amazon.


5 Steps Wifi Hacking - Cracking WPA2 Password

2. Access point with WPA2 and WPS enables

5 Steps Wifi Hacking – Cracking WPA2 Password:


1.Open our terminal (CTRL+ALT+T) and type airmon-ng

this command will lists our wireless card that attached with our system.



2. The next step we need to stop our wireless monitor mode by running airmon-ng stop wlan0


3. Now we ready to capture the wireless traffic around us. By running airodump-ng wlan0 our wireless interface will start capturing the data.

From the picture above, we can see many available access point with all the information. In the green box is our victim access point which is my own access point :-)
Information:

BSSID (Basic Service Set Identification): the MAC address of access point

PWR: Signal level reported by the card.

Beacons: Number of announcements packets sent by the AP

#Data: Number of captured data packets (if WEP, unique IV count), including data broadcast packets.

#/s: Number of data packets per second measure over the last 10 seconds.

CH: Channel number (taken from beacon packets).

MB: Maximum speed supported by the AP. If MB = 11, it's 802.11b, if MB = 22 it's 802.11b+ and higher rates are 802.11g.

ENC: Encryption algorithm in use.

CIPHER: The cipher detected. TKIP is typically used with WPA and CCMP is typically used with WPA2.

AUTH: The authentication protocol used.

ESSID: Shows the wireless network name. The so-called “SSID”, which can be empty if SSID hiding is activated.

4. From the step 3 above, we can find access point with encryption algorithm WPA2 and note the AP channel number. Now we will find out whether target AP has WPS enabled or not.

wash -i wlan0 -c 8 -C -s

if the WPS Locked status is No, then we ready to crack and move to step 5.

5. The last step is cracking the WPA2 password using reaver.

reaver -i -b –fail-wait=360

Because we already get the information from step 3 above, so my command look like this:

reaver -i wlan0 -b E0:05:C5:5A:26:94 –fail-wait=360


it took about 5 hours to crack 19 characters WPA2 password (vishnuvalentino.com) from my Kali virtualBox, but it depend with our hardware and wireless card.

Conclusions:

1. WPA and WPA2 security implemented without using the Wi-Fi Protected Setup (WPS) feature are unaffected by the security vulnerability.

2. To prevent this attack, just turn off our WPS/QSS feature on our access point. See picture below (I only have the Chinese version :-P )


Notes: Only practice this tutorial on your own lab and your own device. Hacking can be a crime if you don't know where to put it.



Share:

get free cryto here

Check our new updates

CHECK THIS

get your free bitcoins here

Check your Ads here

Get Your Packs here

Powered by Blogger.

Wikipedia

Search results

Contact Form

Name

Email *

Message *

Followers

Total Pageviews

Facebook

Advertise

Translate

Custom Gadget

Blog Archive

Blogger templates