Posts

Showing posts from August, 2017

Attacking Windows Platform with EternalBlue Exploit via Android Phones | MS17-010

Image
Introduction On 14 April 2017, a hacker group know by the name of Shadow Brokers leaked exploitation toolkit used by the National Security Agency (NSA). The leak was also used as part of a worldwide WannaCry ransomware attack. EternalBlue is also an exploit developed and used by the NSA according to former NSA employees. Lab Environment Target Machine: Windows 7 Ultimate x64 bit Attacker Machine: Android 5.1  What is EternalBlue EternalBlue actually exploits a vulnerability found in Server Message Block (SMB) protocol of Microsoft Windows various platforms. This vulnerability can be found under CVE-2017-0144 in the CVE catalog.The most severe of the vulnerabilities could allow remote code execution if an attacker sends specially crafted messages to a Microsoft Server Message Block 1.0 (SMBv1) server. Windows 7 Operating with Release Effected by EternalBlue Installing Metasploit Framework on Android Step 1: Download Termux from play store....

Someone Hacked Selena Gomez Instagram Shared Nude Justin Bieber Photos

Someone Hacked Selena Gomez Instagram Shared Nude Justin Bieber Photos The highest followers account on Instagram owned by Selena Gomez has recently been hacked with unknown hackers posting a bunch of nude photographs of her ex-boyfriend Justin Bieber on her account. The latest hack is not part of the ongoing  fappening event  affecting a majority of celebrities by targeting their iCloud accounts, rather in the case of Selena, some hacker managed to breach her Instagram account and posted Bieber's photos. Bieber's three full-frontal shots of naked photos were visible to Selena's 125 million Instagram followers for a short duration of time, after which her account was swiftly taken down Monday night. Selena's team has since re-secured her Instagram account, which was back online minutes after it was taken down, with the photos of Bieber deleted. The Bieber nude images were not part of any  Stolen cels photo dump , instead, they were clicked durin...

List of Google Adsense High Paying Keywords/Niche 2017

List of Google Adsense High Paying Keywords/Niche 2017  Mesothelioma Law Firm ($179) Donate Car to Charity California ($130) Donate Car for Tax Credit ($126.6) Donate Cars in MA ($125) Donate Your Car Sacramento ($118.20) How to Donate A Car in California ($111.21) Sell Annuity Payment ($107.46) Donate Your Car for Kids ($106) Asbestos Lawyers ($105.84) Structures Annuity Settlement ($100.8) Car Insurance Quotes Colorado ($100.9) Annuity Settlements ($100.72) Nunavut Culture ($99.52) Dayton Freight Lines ($99.39) Hard drive Data Recovery Services ($98.59) Donate a Car in Maryland ($98.51) Motor Replacements ($98.43) Cheap Domain Registration Hosting ($98.39) Donating a Car in Maryland ($98.20) Donate Cars Illinois ($98.13) Criminal Defense Attorneys Florida ($98) Best Criminal Lawyers in Arizona ($97.93) Car Insurance Quotes Utah ($97.92) Life Insurance Co Lincoln ($97.07) Holland Michigan College ($95.74) Online Motor Insura...

Mesothelioma Law Firm

Image
Mesothelioma Law Firm Mesothelioma Law Firm Early, Lucarelli, Sweeney & Meisenkothen has represented mesothelioma victims and their families honestly and effectively for over 40 years. For over four decades, the mesothelioma law firm of  Early, Lucarelli, Sweeney & Meisenkothen  has limited its practice to asbestos litigation. In that time, ELSM has helped thousands of mesothelioma victims get the financial compensation they deserved for injuries they sustained from asbestos products made and sold by negligent asbestos companies. In this section, you can learn more about our firm, our experienced legal team, and the outstanding results that we have achieved for our  clients . We are confident that after you learn more about us, the clients we serve, and our past track record, you will see how we can put our decades of  experience  winning  mesothelioma settlements  to work for you and your family. Initial consultations at Early, ...

Beware ! viral sarahah App secretly steals Your entire contact List

Beware ! viral sarahah App secretly steals Your entire contact List----------- Are you also one of those 18 Million users using SARAHAH? You should beware of this app because the anonymous feedback application may not be as private as it really sounds. Sarahah is a newly launched app that has become one of the hottest iPhone and Android apps in the past couple of weeks, allowing its users to sign up to receive anonymised, candid messages from other Sarahah users. However, it turns out that the app silently uploads users' phone contacts to the company's servers for no good reason, spotted by security analyst Zachary Julian.   When an Android or iOS user downloads and installs the app for the first time, the app immediately harvests and uploads all phone numbers and email addresses from the user's address book, according to  The Intercept .   While an app requesting access to the user's phonebook is quite common if the app provides any feature ...

Wifi Hacking WPA/WPA2 with Kali Linux Part-1

Wifi Hacking WPA/WPA2 with Kali Linux:--- There are 3 types of security in Wi-Fi WEP stands for WIRED EQUIVALENT PRIVACY ·          Encryption key of either 64 bits or 128 bits in HEX.  ·         The flaws in WEP make it susceptible to various statistical cracking techniques.  ·         If we can capture enough number of the IVs, we can decipher/decrypt the key ! ·         DES Encryption, which is easy to break WPA stands for WIFI PROTECTED ACCESS ·         It builds upon WEP, to make it more secure by adding extra security mechanism and algorithms to stop unauthorized access.  ·         WPA delivers a level of security way beyond anything that WEP can offer.  ·         It's a new security st...

HOW to Convert Text into Audio using Notepad

Image
HOW to Convert Text into Audio using Notepad :- Step 1— Open your Notepad Step 2— Now paste the following code in your notepad Dim message,sapi  message = InputBox(vbcrlf,"Text to Audio converter")  Set sapi = CreateObject("sapi.spvoice")  sapi.Speak message Step 3 – Now save this file by using extension .vbs Step 4 – Now go to the location where that file is stored and double click on it. Now place the text in the inputbox and press ok button.………………………….

India, Japan reaffirm commitment to secure cyberspace

India, Japan reaffirm commitment to secure cyberspace India  and Japan have reaffirmed their commitment to a secure and accessible cyberspace during the Second India-Japan Cyber Dialogue held here on Thursday, the External Affairs  Ministry  said in a statement on Friday. "Japan and India reaffirmed their commitment to an open, free, secure, stable, peaceful and accessible cyberspace, enabling economic growth and innovation," the statement said. "In particular, both sides reaffirmed that existing international law is generally applicable in cyberspace and that no country should conduct or support ICT-enabled theft of intellectual property, including trade secrets or other confidential business information, with the intent of providing competitive advantages to its companies or commercial sector," it stated. According to the statement, the areas of discussion included domestic cyber policy landscape, cyber threats and mitigation, mechanism o...

New Features Of WhatsApp Comming Soon!

New Features Of WhatsApp Coming  Soon! 1. YouTube Video Directly play In WhatsApp The new feature of WhatsApp to let users view YouTube videos inside  WhatsApp messenger without the  leave  app or open YouTube app. The iOS beta  version  of WhatsApp had added a feature of YouTube integration. The feature is not  currently available in an Android version, but we believe that WhatsApp will soon  come out the feature for Android. 2. Edit ‘sent’ Message This is the very important update for WhatsApp user because many users fill problem with this that he can not change the message when he press enter or send. But after this feature users can change the sent message before the message get read. 3. Money Transaction In India, after demonetization in  2016, the people are struggling for cash because the  people are not aware about the online transaction. Now lots of people use paytm o...

Self-driving Cars Can be hacked by just putting stickers on street signs

Self-driving Cars Can be hacked by just putting stickers on street signs :-- Car Hacking is a hot topic, though it's not new for researchers to hack cars. Previously they had demonstrated how to hijack a car remotely, how to  disables cars   crucial functions like airbags, and even how to steal cars. But the latest car hacking trick doesn't require any extra ordinary skills to accomplished. All it takes is a simple sticker onto a sign board to confuse any self-driving car and cause accident. Isn't this so dangerous? A team of researchers from the University of Washington demonstrated how anyone could print stickers off at home and put them on a few road signs to convince "most" autonomous cars into misidentifying road signs and cause accidents. According to the researchers, image recognition system used by most autonomous cars fails to read road sign boards if they are altered by placing stickers or posters over part or the whole road sign b...

Check your email-id is hacked or not ????

Image
How secure is your email-id ????????????? In this blog I am telling you all about the website to check your email-id is hacked or not ………. Follow this simple steps to do so:- 1> Search on your browser about the website    have i been pwned This is the website that allow the user to check whether their personal data is compromised or not  by   data is breach  ....... 2> after opening the site looks like  3> enter the email id you want to check in the box and then click on the pwned button... let me show an example with random email-id ......... see chintubeta@gmail.com id is not compromised .....................

How secure is your Password ??

Image
How Secure is Your Password ???? In this blog I telling you all how to check that how secure is your password Follow these simple step to check the how secure is your password ?? :- Read the complete blog first 1> First search on your browser the site how secure is my password. open the site which i highlighted............. 2> After opening the site looks like this  3> Type the password you want to check in the box . It will tell you the time about in what time your password can be crack by the attacker .........   Let me show you an example :-- NOTE :- This site will you tell about the time in which your password can be crack. But they will store that password in their database for making a dictionary of the password for the attackers and attackers can buy that dictionary from them................................... The site is good but bad also so keep that in mind ………………