Monday, June 4, 2018

Technical Terms Explained :-D

When it came to learn about computers,networks, Network Attacks,Hacking, Cracking,and others related to Systems.
The authors of the Material (i.e., A Book or A written Pdf ) which you have downloaded will contain some words that you might not aware of previously.

Below are some of the words that The authors and hackers or online tutors use frequently with their meaning.
Please Comment of you find it useful.

Adware− Adware is software designed to force pre-chosen ads to display on your system.

Attack − An attack is an action that is done on a system to get its access and extract sensitive data.

Back door − A back door, or trap door, is a hidden entry to a computing device or software that bypasses security measures, such as logins and password protections.

Bot − A bot is a program that automates an action so that it can be done repeatedly at a much higher rate for a more sustained period than a human operator could do it. For example, sending HTTP, FTP or Telnet at a higher rate or calling script to create objects at a higher rate.

Botnet − A botnet, also known as zombie army, is a group of computers controlled without their owners’ knowledge. Botnets are used to send spam or make denial of service attacks.

Brute force attack − A brute force attack is an automated and the simplest kind of method to gain access to a system or website. It tries different combination of usernames and passwords, over and over again, until it gets in.

Buffer Overflow − Buffer Overflow is a flaw that occurs when more data is written to a block of memory, or buffer, than the buffer is allocated to hold.

Clone phishing − Clone phishing is the modification of an existing, legitimate email with a false link to trick the recipient into providing personal information.

Cracker − A cracker is one who modifies the software to access the features which are considered undesirable by the person cracking the software, especially copy protection features.

Denial of service attack (DoS) − A denial of service (DoS) attack is a malicious attempt to make a server or a network resource unavailable to users, usually by temporarily interrupting or suspending the services of a host connected to the Internet.

DDoS − Distributed denial of service attack.

Exploit Kit − An exploit kit is software system designed to run on web servers, with the purpose of identifying software vulnerabilities in client machines communicating with it and exploiting discovered vulnerabilities to upload and execute malicious code on the client.

Exploit − Exploit is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to compromise the security of a computer or network system.

Firewall − A firewall is a filter designed to keep unwanted intruders outside a computer system or network while allowing safe communication between systems and users on the inside of the firewall.

Keystroke logging − Keystroke logging is the process of tracking the keys which are pressed on a computer (and which touchscreen points are used). It is simply the map of a computer/human interface. It is used by gray and black hat hackers to record login IDs and passwords. Keyloggers are usually secreted onto a device using a Trojan delivered by a phishing email.

Logic bomb − A virus secreted into a system that triggers a malicious action when certain conditions are met. The most common version is the time bomb.

Malware − Malware is an umbrella term used to refer to a variety of forms of hostile or intrusive software, including computer viruses, worms, Trojan horses, ransomware, spyware, adware, scareware, and other malicious programs.

Master Program − A master program is the program a black hat hacker uses to remotely transmit commands to infected zombie drones, normally to carry out Denial of Service attacks or spam attacks.

Phishing − Phishing is an e-mail fraud method in which the perpetrator sends out legitimate-looking emails, in an attempt to gather personal and financial information from recipients.

Phreaker − Phreakers are considered the original computer hackers and they are those who break into the telephone network illegally, typically to make free longdistance phone calls or to tap phone lines.

Do Comment if you like the Post and find it useful. Request me at Instagram Id @time_driven_hero for more about hacking and technical stuffs.

Sunday, May 20, 2018

Top 15 Computer Hacking Books Of 2k17.

Top 15 hacking books of 2k17.
But why 2k17 not 2k18,as it's not over yet.
You can download these books and develop the knowledge on computers.

These can provide you some advanced information about programming ,using then for hacking,etc...

1.Metasploit - Penetration tester's guide.
                 Click here to download

2. A Beginners Guide To Hacking Computer Systems.
               Click here to download

3.Black Book of Viruses and Hacking.
                 Click here to download

4.Hackers High school 13 .
                  Click here to download

5. Reverse Engineering Hacking And Cracking.
                   Click here to download

6.Computer Hacking.
                   Click here to download

7. Blind SQL Injection Discovery and Exploitation.
                  Click here to download

8. HACKING WITH EXPERTS.
                    Click here to download

9. Computer Hacking and Malware attack for Dummies.
                   Click here to download

10. Stealing Network.
                 Click here to download

11. Secrets of Super Hacker.
               Click here to download

12. 501 Website Secrets.
                 Click here to download

13. Google Dangerous Searching.
                  Click here to download

14. Gmail Hacking.
                    Click here to download

15. Computer Viruses.
                    Click here to download

All these books were hosted here for legal ethical purposes only.
 Comment us if any of the links were not working. We'll Replace them ASAP.


Sunday, May 13, 2018

How to gain Admin access of Routers

In this post you will learn how to Hack and Gain Administrator Access of the WiFi Routers. 

Test on Home Routers Only, Not for illegal purposes ,as it is against law in some countries.


Basic Requirements ::


==> A Web Browser , Firefox Recommended.

==> Port Scanner ,Use Zenmax .
==> Internet connection must.

Instructions :: 

 1. Select an IP range.

2.Scan for home routers.
After scan,Find for open ports like http ,FTP,or telnet ie., port 80 ,port 21, or port 23 respectively.

*Stop scanning when found.

 3. connect to them using web browser on an open http port. And go to login page of the router.
 4. If you see the alert error messages, it says TD-8817.

So we can Google for it or you can visit routerpassword.com to know the default router username and password.

5. Now, Access these IP addresses using default logins got on step 4.

Default username and passwords are not same for every routers.

With username : admin and password : admin, we can log in to the router

OnePlus 6 leaked on Amazon's Germany site see it's looks.

OnePlus 6 is all set to launch on May 16 at a special event in London, but thanks to Amazon Germany, detailed specifications and the price of the phone (in Euro) are already out now.


It was first out by Winfuture.de( a German website) , the OnePlus 6 page was live on the Amazon Germany site, and but not now anyway , however ,the pictures and specifications of the phone have been leaked online.

The price of the OnePlus 6, as stated  will Euro 519 (₹42,000 roughly) for the 64GB variant, while the 128GB variant will cost Euro 569 (₹46,000 roughly) .

So,it's not as high as the Samsung Galaxy s9 variants, or the iPhone X .It's a flagship device at an affordable cost, even high end though.
According to the site ,It will be sale on 22 May ,and will be available on two Colors and Both are black too.

        Then what color Choices ? Thinking right ,it's the "Midnight Black" and Another "Mirror Black" may be with a shiny back panel.The new OnePlus 6 will also come in a special Avengers Infinity War Edition.

OnePlus has itself confirmed a glass back design for the smartphone. The screen of it will be 6.28-inches with near 19:9 aspect ratio and a notch on the front, featuring Snapdragon 845 processor,also support for Dash charging feature which came with the OnePlus 5T previously.The device will have a dual camera at back at 16Mp + 20Mp combo along with Optical Image Stabilization support.

In India,The phone will be sold on Amazon India ,exclusively.



Friday, May 11, 2018

Virus codes that will Meltdown Your computer !!!! Bonus inside !!


Some useful (not for others..Lol) command prompt codes that will amaze your friends.

*Don't play with them *

These codes are not intended for playing purposes and are collected from the internet and organised here. The Admins of this site are not in anyway responsible for the damage / loss of your personal data.
So Never try them in your computer.

They are some sort of viruses. Codes  written specially for deleting all files ,etc..

Each code has a description ofcourse use them for Educational purposes only.Lol just joking,Use them to scare your friends, amaze them.

** Copy the codes and paste them in notepad.
** After that save them in "*.bat" extension.
** Now click that bat file.

Boom !! 

1 ) This Virus Deletes All The Content Of A Drive... 

Comments