The Hackers World

A Blog About Cyber Technology news updates, Tricks, Tips and Ethical Hacking Tutorials, Gadget Reviews and many more.

6/13/2021

How to stay Anonymous online in 2021: VPN, TOR, WHONIX & TAILS

 

In many applications including surfing the internet, chatting, sending confidential documents anonymity has become a necessary and legitimate desire. A piece of information can be encrypted by using many encryption techniques, but it will only give you the encrypted content and will not hide your identity because It is still possible to know the source and destination of the communicating end. Anonymity in a business network can be devastating as it can make an organization vulnerable to security risks, liability and potential litigation and it is very useful for your competitor to know your moves. Moreover many renowned big companies like Amazon, Microsoft, and Google have collected your personal information in order to serve up targeted ads.

There is nothing wrong to be anonymous and controlling your own personal privacy if you are doing the legitimate business. Several ways are present to ensure your privacy while browsing the internet.

VPN

VPN is the acronym for the Virtual Private Network, a technology that allows you to connect to one or more computers by using a private network from public internet connection. Your IP (internet protocol) address is the prime identity number that Internet provider assigns your computer to let you go anywhere on the Internet. It’s exactly like the house number on your home. It masks an IP address so all online activities are virtually untraceable from any one. User’s initial IP address is replaced with one from the Virtual Private Network provider so that a communication take place without being tracked, monitored, and identified.

Why VPN is called a network because you’re using a special network of VPN servers that covers the entire globe.

How does VPN Work?

VPN works in a way to bypass censorship by creating a pathway within a client and server ends with different control points through which data packets travel. When using a VPN an encryption and authentication layer is applied to that pathway in order to protect the traffic and data packets travel. Data packets travel through virtual, private and secure channel. This technique is called VPN Tunneling which creates a secure communication channel within network of computers.

How does VPN work

Drawbacks of VPN

For end-device users, VPN might be an easy set up since you just need to download your VPN application and install it on your device but it has the drawback of being monitored from VPN service providers as they allow you to use their private servers in exchange for your data. There have been cases where VPN service providers are monitoring the data from their users for their own benefits in that way your communication is not all private but be monitored by service providers.

What is TOR?

The Onion Router (TOR) is a free and open-source software for enabling anonymous communication. It is designed to stop people tracking your browsing habits including government agencies and corporations. The name (The Onion Router) refers to the way that Tor protects your data by wrapping it in multiple layers of encryption like an onion.

How does TOR work?

TOR Browser routes all web traffic through the TOR network, making it anonymous. As the image below shows, TOR consists of a three-layer proxy, like layers of an onion. At first, TOR Browser connects at random to one of the publicly listed entry guards, bounces that traffic through a randomly selected middle relay, and finally directed the traffic through the third and final exit relay.

how does tor work

Drawbacks of TOR

One of the drawbacks of TOR browser is that your ISP can see that you’re connected to TOR hence it can draw attention to you. Although, your ISP can’t see your activities but it will raise suspicion about what you’re doing.

Another drawback of using TOR browser is that it only hides traffic going through TOR network and won’t anonymize other apps on your computer hence not completely giving the concept of anonymity.

WHONIX OS

Whonix is a Debian based Linux operating system used to provide anonymity, privacy and security on browsing the Internet. It consists of two main components i.e. Whonix workstation and Whonix gateway.

Both components are VirtualBox virtual machine appliances, so as to run it on any operating system that has VirtualBox.

How Does Whonix Work?

At first the Whonix workstation and gateway are configured on host machine. Workstation consists of the desktop application, routes all of its traffic to the gateway which is connected to the workstation. The gateway is further connected to the TOR network for accessing the internet. Whonix gateway is the only way for the workstation to transmit the information through internet because the workstation is an isolated machine and it has no idea about its own host IP and configuration.

From the image we can see that all the traffic that is directed through the gateway is TORrified while the traffic from the host machine in non TORified.The host machine does not participate in the Whonix private network and that is why continues to use its normal internet connection.

how does whonix work

It is a huge advantage of isolating the workstation from a network to keep an IP address private even if any application in a Whonix workstation is compromised, it is almost impossible to reveal your IP because it does not know your IP.

Drawbacks of Whonix

Although Whonix provides transparency of your IP address, it has a notable disadvantage in terms of physical security. If your host machine is ever compromised, all the stored personal information and your internet browsing activity could be discovered easily.

TAILS Linux OS

If your goal is to leave no trace of every activity you did on the host machine then choose Tails. Tails or The Amnesic Incognito Live System is a live Debian based linux operating system that aims to provide privacy and anonymity. You can start TailsOS on almost any computer from a USB stick or a DVD. Tails sends its traffic by using TOR network, leaving no trace on the system you are using.

Live means it runs on the medium typically a USB, immediately upon starting the system. The entire operating system lives on that USB. All you have to do is first download the live operating system, write it on a USB, insert it to the system, after turning it on you will get a live operating system simply boots from a USB device.

tails OS linux

The portability of TailsOS solves the problem of physical security as if your USB device ever gets lost or compromised, there will be no personal information present on that USB as well as the system on which you have inserted that USB and nothing can be learned about your specific usage.

And The Winner Is?

As we have seen there are many techniques and tools available to hide a person’s identity while browsing the internet. The above mentioned techniques provide anonymity at some point and has some notable drawbacks which can lessen the degree of anonymity so by comparing VPN, TOR, WHONIX and TAILS, the technique that is said to be the best practice for providing complete anonymity as well as safe and secure communication is TAILS as it gives you complete security for traffic transmission, privacy of identity and the physical security.

Subscribe Us On Youtube : Subscribe

So we hope you’ve learned something new today. So stay on safe side and use this information just for educational purpose. Join Our Telegram Channel for More Hacking Tutorials. 

6/16/2020

10 Most Common Sources of Computer Viruses Infection in India 2020

9 types of malware and how to recognize them | CSO Online


10 Most Common Sources of Computer Viruses Infection in India:

No one wants to infect system with viruses or malwares, isn’t it? However, to protect oneself effectively, one must know the probable sources of viruses and malwares. Therefore, in this write-up we list down the most common ways to attract viruses/ malwares. 

Source 1: Inserting or connecting an infected disc, pen-drive etc.
Inserting an infected pen-drive, disc is one of the most common sources of virus in devices. As long as something is writable, a virus can move from a computer to that disc, disk, drive etc. The same rule applies to any networked drive or computer. If another computer has write access to your computer or a drive is accessible by your computer, a virus can move between computers on a network. 

Source 2: Opening attachment or links from unknown sources. 
In these cases, the messages are tailored to make it “click bait”. As soon as you click it, instead of performing benign functions, it impacts the system adversely. Further, emails can be spoofed to make it appear legitimate, to make even professionals fall for it. Make sure, you don’t click on any link or open any attachment sent by strangers. 
As a general rule, don’t open emails you were not expecting to receive in your inbox. Even if the message is from known ones, always use caution before opening a link or downloading an attachment, as emails can be spoofed easily. 

Source 3: Downloading soft-wares from malicious sites.
Viruses are prevalent all over the internet, and can be sourced even when downloading software from trusted sources. However, in general, downloading questionable files, or from inappropriate website can lead you to trouble. 
A malicious website may also have the capability to read files on the computer, transfer malicious files to device, or access sensitive personal information.  

Source 4: File Sharing.
Using BitTorrent, users download media via peer-to-peer file sharing. However, these files tend to travel across multiple devices, which may not have security softwares, so can be laden with viruses. Also, hackers tend to setup fake files on these networks, which are actually malware in disguise.  

Source 5: Phishing.
The emails are disguised to fool the user into taking an action not in their best interest like clicking a link that installs malware. A tactic commonly used in phishing is to make a link appear legitimate, but redirect the user to a different page whose URL closely resembles the URL of the legitimate website. 

Source 6: Online Ads.
Malicious online ads also known as Malvertising, is another source to infect your device with malwares. In fact, it hardly leaves any trace or realization. Criminals often place clean ads on trusted website and leave them, to gain popularity. Thereafter, they insert malicious codes in the ads to infect devices, when clicked. 

Source 7: Bundled Free Software Programs.
You might have heard the saying, “There are no free lunches”. 
Frequently, free software companies partner with other companies and bundle additional software within the download. The additional download can transfer data and information from the system, capture your behavior, steal sensitive data etc. 

Source 8: Scareware.
They are also known as rogueware. It’s a malware that masquerades itself as internet security software. The user is notified falsely with pop-ups that their system is infected with malwares. It then shows a link to “clean up” the malware. Once the gullible user clicks on it, the system gets compromised with malware/ viruses.  

Source 9: Adult Websites.
Much like Torrents sites, website serving adult material often contain malwares and viruses. The content can be in the form of material downloaded or served by just visiting in the form of “Malvertising”. 

Source 10: Accepting without reading.
Users accepting what they see on their screen without reading the prompt, is one of the most common ways to infect devices with malwares.
While installing a program, if you given the options between an automatic and custom install, select custom install to make sure nothing else is added or changed during the installation process.  

Conclusion:
Given the threat that malwares and viruses poses, you must change your browsing and internet behavior to remain safe and secure. For example, make sure that you download soft-wares only from reliable sources. Also, run your downloads through your anti-virus and anti-malware scanners upon completion. During the installation process, read all the prompts carefully. 

How to Prevent Malware Pop Ups and Spam


How to Prevent Malware Pop Ups and Spam:

If you are a regular internet user, you must be familiar with pop-ups. These annoying ads come in various forms, but generally try to sell their product or make the user click on innocuously looking link. Harmless enough, right?  

Don’t be fooled. While many such pop-ups and emails from reputable companies are safe, the adware programs that generate illegitimate malware pop-ups and spam are capable of installing viruses, trojans etc. These malwares can hack your system, capture sensitive personal information, relay live videos / audio and much more.

Malwares Explained:

Malware is short form of malicious software. It is often software but can also appear in form of script or code. It is often used by malicious elements to in-filtrate, damage or disrupt computer operation, gather sensitive information or break into computer devices. 

Malware is a general term which refers to different forms of hostile, intrusive or annoying soft-wares. It includes trojan horses, spyware, adware, root-kits, viruses and other malicious programs. Most of the malwares disguise themselves as having some benign function, and may come from reputable sites/ mails. 

Some of them track your activities, show pop-ups, redirect sites etc. They can reinstall themselves after removal or hide themselves deep with the system to make them difficult to find and clean. 

How does Malware Infect Your Computer?
It’s easy to get enticed by the offer of pop-up ads. By the time you start seeing signs of a malware attack, your system shall probably get compromised beyond repair. Spam and pop-ups laden with malwares can arrive from different sources in a variety of forms, including:

  • Attachment sent through a spam email 
  • Embedded as a file meant to download and open
  • Pop-up ads that appear, unwanted on your screen 
  • Links within the body of a message

What are Fake Pop Ups:
You must have noticed a variety of pop-ups appearing on the computer screens. They are usually generated by websites to guide user, provide useful information, offer newsletters etc. In short, they are meant to be useful – to help in filling out forms, to apply for discount code etc. However, not all pop-ups are useful and benign. For example, a pop-up installed by malwares can entices the user to click on a button that redirects to a phishing page. 

Some of the pop-ups display false security warning as part of pop-up scam e.g., Ransom-ware pop-up. An example:
Error Code #13987t34F9 (Unauthorized access)
Region: Punjab, India 
Compromised Information: Debit card details, Email account details
Action: Do Not Shut Your Computer, Call Us for Expert Opinion 
Call Help Desk: (Toll Free) for Free Checkup.
 
You should not respond back to such illegitimate pop-ups. 

How do Pop-up Scams Work?
As shown above, fake pop-ups are generated by cyber criminals using malwares. The pop-ups flag fake security issue, virus attack, technical problem with the system or anything else which is alarming enough to make the user feel insecure and look for immediate solution. Generally, the scammer, instructs the victim to call a phone number shown in the pop-up, in order to demand payment for technical support to resolve the non-existent threat. 

Thus, cyber criminals use these pop-ups to extort money from concerned users who want to fix their problems and resolve threats that do not exist. 

How to Identify Fake Pop-ups:
Following is the procedure we suggest, to know the veracity of the pop-up in question:

  • Look for spelling mistakes and unprofessional images: Poor spelling, grammatical and punctuation errors, unprofessional looking symbols and images, fake logo etc. are sign of a illegitimate pop-up. A professional company would never commit such mistakes. 
  • Try to close your browser: Fake pop-ups may cause the browser to switch to full screen mode. So, if your browser is already at full screen mode, try to minimize or close it. If unable to do so, it’s a pop-up scam. 
  • Verify the phone number: Cross check the phone number listed in the pop-up with the official phone number of the security provider, the pop-up is claiming to be. A legitimate company phone number can be verified by a simple Google search. If the phone number search yields no result, it is most likely a scammer’s number.  

How to Remove Fake Pop-ups:
Step 1: Click on Ctrl+Alt+Del and select “Task Manager”. 
Step 2: Choose the browser in which pop-up was detected. 
Step 3: Click “’End Task” to close the selected browser.
Step 4: When you re-open the browser, ensure that you don’t restore the pages.

To remove the malware that led to illegitimate pop-up, follow these steps:

  • Download and install a credible Anti-Virus
  • Disconnect the internet to prevent further interaction with the pop-up 
  • Reboot the system into Safe Mode
  • Delete temporary files using “Disk Clean Up”
  • Run complete Anti-Virus scan 
  • If malware is reported, delete or quarantine the file
  • Reboot the system 
  • Update your soft-wares, browser, Operating System and anti-virus to their latest version available 

How to Protect Against Pop-up Scams:
If you spot a fake pop-up, do the following to avoid being scammed: 

  • Avoid any click on pop-ups, even closing them
  • Don’t call the number instructed by the pop-up
  • Don’t share any personal detail including payment details
  • Close the browser using “Task manager” as explained above 

How to Prevent Fake Pop-ups:
So, how can to prevent fake pop-ups from appearing at the first place?

  • Never “unsubscribe” from spam emails as the process just validates your email address 
  • Don’t click on unverified links in spam emails, messages or unfamiliar websites
  • Increase your browser security settings 
  • Avoid questionable websites
  • Use reliable anti-virus software
  • Keep your anti-virus, browser, soft-wares etc updated 
  • Don’t download apps outside Play Store 
  • Never open attachments in spam emails
  • If using public Wi-Fi, use a secure VPN connection. 
  • Do not insert unknown USB sticks or disks into your compute
  • Don’t open email or text messages from unknown senders 
  • Immediately delete the message you suspect are spam 
  • Avoid too good to be true messages

5/25/2020

How To Find Someone Phone Number On Facebook

Today in this tutorial am going to tell you how to find someone's phone number and email on Facebook

As you know, Facebook brings changes and people are hiding their Phone numbers and email from Facebook Profiles, so that we cannot see their phone numbers and email without asking them

But today I will tell you a trick to extract their phone number and email address information using Termux

how to find someone phone number on facebook

Firstly you must have basic knowledge of how to use Termux, if not then read our tutorial on how to use Termux for ethical hacking


Before we proceed, there are some things that you need to keep in mind in order to find phone number on facebook

  • By using this trick, you can see phone number and email address of your friends list
  • You can extract even if they hidden their phone & email from public profile
  • Only you have to know is make sure the person in your friends list whom info you're gonna extract

Now let's gets started,

Fbi Termux


you can use this tool in Windows, Mac and Kali Linux but this time we are using the tool Termux

Firstly Download and install Termux from Playstore

After installing

Now Type Below command

 apt update && apt upgrade

Then type

 pkg install python2

Then type

 pkg install git

Then type

 git clone https://github.com/xHak9x/fbi.git

Now type

 cd fbi

Then type

 pip2 install -r requirements.txt

Finally type

 Python2 fbi.py

Then type help to get the help menu
Now you have to create access token
For that type token

Then type your Facebook login ID and password then you will see a list of commands to dump your friends email, phone numbers list

Eg: how to find friends email on facebook use dump_mail

dump_phonelist for phone numbers on facebook

After executing the commands you will get the info in a txt file

To read the .txt file You can install nano in Termux by typing pkg install nano

Also you can use FacebookToolkit, Osif similar tool to fbi

Thanks for reading,

Note that this tutorial is only for educational purpose only, and we are not responsible for any misuse

5/24/2020

How To Hack WiFi Password In 2020 ( Ultimate Guide)

How to hack WiFi password 
Hey guys, Today in this tutorial am going to teach you how to hack WiFi Password.

The Exact Process I personally use to Hack my neighbours WiFi, college's WiFi and  many other password protected WiFi.

How to use Google Dorks

A Google dork query, sometimes just referred to as a dork, is a search string that uses advanced search operators to find information that is not readily available on a website.

Google dorking, also known as Google hacking, can return information that is difficult to locate through simple search queries. That description includes information that is not intended for public viewing but that has not been adequately protected. 


                                Google hacking (dorking) tutorial #1 - ITBlogSec.com

( Google Dorks ka simply mtlb hota h, Google main advance level ka search krna

 

eg. agar aap normal search krte ho "Movies" google pr toh vo websites dikhayega jinhone ranking kri hui h lekin Google Dorks se aap advance level ka search kr sakte ho

 

eg. vo search result apke hisaab se dikhayega, agar aap chahte ho ye dekhna

 

ki konsi website ke name main movie word aata h or konsi website ke title main sirf movie aata h, apke hisaab se he search result show krega Google isme ) 



Google Dorks live example ==>

intitle:
inurl:
intext:
define:
site:
phonebook:
maps:
book:
info:
movie:
weather:
related:
link:

 

Step #1 => go to Google.com

 

and Search

 

intitle:movies

 

and Google will only show search results which are having Movies keyword as Title on website 

eg. 

 

site:facebook.com +91

and similarly site: and other dorks you can use

eg. If you want to search anything inside a web


eg. 

 

site:facebook.com +91

 


sirf ye search krke dekho

aaj iss trah baaki sabh search krke dekho and ye sabh commands use kro


Best Hacking Apps For Android (2020 Update)

                              Best Hacking Apps For Android
 
Now Days Android Smart Phones Became Much Popular because of its Awesome features and also Cheaper than other Smart Phones,

As we know Android Is a Linux Based OS, and Its Hardware is Designed to Perform New Kind Of Tasks when We Root Our Device
Today Android Smart Phone became a Mini Hacking Device

We can Perform Several Hacking, Pentesting tasks From Our Smart Phone With the help of some Android Apps,

In this post am going to tell you the best hacking apps for android which you can use to do some basics of hacking through your smartphone, But some of the Apps requires Root Access,

Best Hacking Apps For Android

In this Article i have Presented some Of The Top Android Hacking Apps Used by Hackers, Pentesters, Security Researchers, and also by Script Kiddies and Noobs, that are for Root Users, still non Root Users can use some of the apps

The First one is Nmap


As we Know Nmap is a Popular Tool Designed for Network Mapping, though this app Is Not The Official App Of Nmap Still We can use it For Several Tasks

2. The second one is Zanti
                                                            New zANTI: Mobile Penetration & Security Analysis Toolkit


Zanti Is a WiFi Network Vulnerability Scanner ,it has So many Mitm Tools,
With this tool we can perform some MITM attacks over a WiFi network

3. The third one is Wps Wpa Tester


This Apps is Used To Test your Router's Weakness ,

With this App we can Connect to any WPS enabled WiFi Network within 2 minutes
Similarly WpsConnect is also used For The Same

How To Be A Computer Hacker | Beginner Guide

We can call this era as Cyber Era, Not Because of the Cyber Attacks, because of its advantages and massive growth of technology,


People showing more enthusiasm towards Hacking & Cyber Security, and there isn't any single reason behind it,


You might probably watch movies where Hackers are doing a lot of cool stuff like hacking into banks and stealing millions and tracking people, finding out their information


But Wait..!

Hackers usually different than you see in the Movies, Some people often judge Hackers as Real Hackers and Fake Hackers


That's isn't a big issue 😉


By the end of the post, you will get a clear picture of what is Hacking and how you can be a hacker


I came across many people, they often think to be a hacker, they think hacking is just like playing games with the PC but it's not like that


However people sometimes fall in confusion, they wanted to be a hacker but due to lack of knowledge they even ask where to start from and how


If you're too in the same situation, and you're too wondering how to be a computer hacker then this post may be good to go with, I will share the step by step guide along with my personal experience

how to be a computer hacker

Before we begin some key points you have to keep in mind,

  • What Does Hacking mean
  • Hackers
  • Types of Hackers


What is Hacking?


What is Hacking


When some people hear the term "Hacking" they usually think this matrix effects and blindly say this is Hacking,
While others think stealing bank account balance is Hacking, defacing websites is Hacking


Don't get confused, Hacking is not like that you see in the movies

In reality, it's quite different

There is no single definition for Hacking, you may find different definitions on the internet


Don't be confused, let me tell you what hacking is and how to be a computer hacker


In simple words, Computer hacking is a process of getting unauthorized access to any Computer by breaking its security

I mean breaking computer security is Hacking


It can be hacking into digital devices, spreading malware, stealing bank logs and so, it has no particular branch, it has several branches and several types of Hacking,


We can discuss it later



Let's see who are the Hackers and what do they do