Today i will share you about a interesting thing i.e. E-Mail Spiders, Have you ever wondered how spammers generate a huge mailing Database ??
They pick tons of e-mail addresses by searching in the Internet
All they need is a web spidering tool picking up e-mail addresses and storing them to a database.
These tools are such intelligent code if they run for few hours , they can capture hundreds of thousand of e-mail addresses
Some tools are as follows :
Web Data Extractor
1st E-mail Address Spider
Power Email Collector Tool – it can collect upto 750,000 unique valid email addresses per hour.
How does it work ??
Just enter a domain that you want to collect email addresses from and press the start button, the program opens up many simultaneous connection to the domain and begins collecting addresses.Many people wonder how they possibly get on these lists. Often, the culprit is an email spider that ignores robots.txt files. They crawl through message boards, Web sites, and any online forum that might contain email addresses. The spiders search the Web until they have extracted a certain number of email addresses. Then they triumphantly crawl back to their evil masters with a list of victims
This tool is also helpful in Footprinting for gathering information of an Organization.
Many of people searching on Google about How to hack facebook account , how to hack gmail or yahoo etc. And we got various article on regarding hacking these account. Even free/paid software/program/cracker link is also come for hacking these accounts. But whats the The Reality Of Hacking Facebook, Gmail, or Yahoo Accounts ???
Many people on net impressed by the word “hacking account”they think there is some mind blowing , extra talented people whom known as hacker can do anything , can hack anybuddy account. they have some Super technique to hack anyone account. But in reality the scenario is totally different.
Now the biggest fact about Hacking Facebook, Gmail, Yahoo Accounts are 99% accounts are hacked due to victim’s carelessness/lack of knowledge. And the technique involved for hacking the victim account is Keylogger , Phishing , Social Engineering and Click hijacking.
We usually start like googling this, “how to hack gmail” , “softwares for hacking”, “how to hack facebook” etc. No doubt, they are at the right place. I would have rather use words – they are on the right track but will they open up the right door and gain something or they will just end up becoming a victim them self Reality behind Hacking Facebook, Gmail, Yahoo Accounts
Genrally we have signed up for an account(gmail,yahoo or any other reputed website)
Your password is stored only at two places
1. In website’s database
2. In your mind
Stealing password from the website’s database is quite tough task. i am not saying its impossible , yaa but its impossible for normal person. So the remaining option to steal the password is just from you. So here are some way which you have to keep in your mind to not to loose your Account.
1. Phishing– The most common way of hacking them is phishing.
The common type of phishing is Fake Login Page.
The victim is anyhow anyway made to enter his credentials in fake login page which resembles the genuine login page and gets hacked. For phishing before login you have to just the URL
.2. Keylogger– Its a most common technique used even by a newbie for hacking account. its simply stores whatever you type. So always use Antivirus for your system.
3. Social Engineering – There is no patch to Human Stupidity.It is the hardest form of attack to defend. the best way to don’t share your password to anyone.i think Social engineering is very vast topic so its better to read all information regarding Social Engineering here.
4. Click Jacking – These days its quite famous technique to steal the password, mainly its used for facebook. many peoples for collecting enourmous likes for status fan page or subscribers , they goes for few website (Click jacking) and share its password. To know exactly about Click Hijacking click here.
-> Does any free/paid software/program/cracker exist to hack such accounts ?
No .You might get numberless free or preminum softwares which claim to crack email accounts. The softwares just ask you to enter victim’s email and start cracking/generating password. I have already told you about two places where one’s password is. From where the hell ,these softwares would bring passwords for you ? . This kinda stuff is undoubtedly scam/rubbish.
-> Is there any free/premium online service to hack such accounts ?
No.You might have logged on to many websites that claim to crack any
email account for some amount of money. They are completely fraud and be aware of them. Dont lose your money there !!
In this post i am going to share a list of tools through which you can copy entire website and its depend how these tools will help you. These tools are listed as a Website copier. It downloads all items like videos , images, texts, etc. After downloading you can access entire site even when you are not connected with Internet.
Website copier is a valuable Footpriting tool. This tool mirrors an entire website to the desktop.You can footprint the contents of an entire website locally rather than visiting the individual pages.
the level of copying depend on the tool which you use and it also depends on your query. These are an easy-to-use offline browser utility. It allows you to download a Web site from the Internet to a local directory, building recursively all directories, getting HTML, images, and other files from the server to your computer. These tools arranges the original site’s relative link-structure. Simply open a page of the mirrored Web site in your browser, and you can browse the site from link to link, as if you were viewing it online. Some of them can also update an existing mirrored site, and resume interrupted downloads.
It will help you when you don’t have Internet access. Whether you’re on a plane or your grandparent’s place in the country, life occasionally brings all of us to places where WiFi and 3G can’t reach.
Reamweaver – when a visitor visits a page on your Reamweaver site, Reamweaver gets the page from the target domain , changes the words as you specify,and stores the result (along with images etc.)
Website Watcher – it can be used to get updates on the website , used for competitive purpose.
In this post i will try to make you learn a Competitive Intelligence Gathering to be used as a tool For footprinting. Because that’s the sole purpose why we are here.
Its a intelligent way to find the info. , basically its a process of gathering information about your competitors from resources such as the Internet.
We try to cover as Competitive Intelligence Gathering in Footprinting sense. Now the next thing is Why its needed ???
In today’s scenario, there is a cut throat competition in every sector. so it’s our work to keep an eye on our competitors. So Competitive Intelligence is needed to
compare your product with competitors product ,
Analyze your company position wrt competitiors
produce a profile of entire team
predict there tactics and method on their previous track record
Now next thing is how it should be done, so here are some ways by which you can perform Competitive Intelligence Gathering.
Competitive Intelligence Resource Index – “ bidigital.com/ci “a search engine and list of sites for finding CI resources.
The objective of this post is about to learn about First phase of attack that is Reconnaissance. How Reconnaissance perform ???. if you join our session from this post so i will suggest to read further post in categories of Learn Abc of ethical hacking
As we already read about Reconnaissance ie its is a preparatory phase where we gather all the information regarding Victim.Its the first step of Steps perform by hacker.
Footprinting is the blueprint of the security profile of an Organization undertaken in a methodological manner. We already talk about Footprinting. Now we discuss further
Steps of Footprinting
Find companie’s external and internal URLs
Perform Whois lookup for personl detail
Extract DNS information
Mirror the entire websie an look up names
Extract archives of the website
Google search for company’s news and press releases
Use people search for personal information of employees
Find the physical location of the web server like neo tracer tool
Analyze company’s infrastructure details from job postings
I was wondering in country like India where you can find a computer center in every other home , a college offering computer course in every other street do joining GNIIT course give you edge over others ?
Is it worth investing your time and money in GNIIT course ? what should be the parameters of judging whether GNIIT course is good or bad . My mind was boggling very hard . i did my research . Took part in various discussions , talked to current and previous students who had taken a GNIIT course
Although you can see very beautiful adds of GNIIT course all over the media including newspapers and TV , i don’t think joining GIIT course is any worth .
Here are the reasons and comment
comparison between various centers like delhi center and pune center
By one student
The entire team of NIIT staff, faculty, centre head, accountants. it’s a complete mess out there.NiiT South Ex which claims to be one of the Best Centers in Asia i don’t even consider it to be a Model Centre any more.
It’s A Complete mess out there and best exapmle of highly mismanaged institute.
It’s not worth Being A Student Of NIIT
of course this student is very aggressive.
In terms of faculty i don’t think it’s even eligible for rating .Half the time our staff never turned up for classes. They never completely taught us the syllabus . During the final online exams they simply helped us to answer all the questions correctly .i have witnessed NIIT faculty helping students during exams for the GNIIT course.In some other batch the faculty are so bad that they walked out of the room and the students are having a gala time.
A GNIIT course
wish you could have posted it earlier. i wasted nearly 27k in NIIT Nungambakam. Guys don’t ever think of joining niit.i took .NET course which cover C#,ADO.NET and ASP.NET.first i was given a good trainer ( by luck it seems ) but it lasted only a couple of months.then comes the interesting part.A new MCA guy who don’t even have a basic qualification of proper communication started teach us.he never thought us actually he use to skip a lot and in fear treated people like a kid in schools.i reported about him to GL guess what they told “i only have problem” damn it and i silently studied my self from Microsoft materials.
Don’t bother to join it for placement . there are absolutely 0 placements.
This was my research on NIIT and GNIIT course offered at their centers across country. Do your own research if you want to be completely sure .
Facebook – A book who don’t have a face …. Apart from the joke , Today i will share a small trick with you , to how to check that who unfriend you from Facebook. Yesterday i got a mail , asking a same thing so i got a ideas to make a post on it.
Check Which of Friend Unfriended You or Deleted
Use the Unfriend Alerts Extension to Check Which of Your Friend have Unfriended You or Deleted from their Friends List.
Hello friends, Welcome back to the module of learning ABC of Ethical Hacking. I got various mails regarding the module to add several topics and believe me friends i try my best to improve the module. Now today’s post is on Step of hacking. In this post i elucidate all task perform by hacker to hack.
Steps of Hacking
Hacker performs his Task in 5 Phases.
Steps Of Hacking
Phase 1 – Reconnaissance
Reconnaissance refers to the preparatory phase where an attacker seeks to gather as much information as possible about a target of evaluation prior to launching an attack. In this phase hacker simply gather all the information regarding Target.
This Reconnaissance phase can be perform in two way
Passive reconnaissance involves acquiring information without directly interacting with the target.
• For example, searching public records or news releases
Active reconnaissance involves interacting with the target directly by any means
• For example, telephone calls to the help desk or technical department
Phase 2 – Scanning
Scanning refers to the pre-attack phase when the hacker scans the network for specific information on the basis of information gathered during reconnaissance. Hackers have to get a single point of entry to launch an attack Scanning can include use of dialers, port scanners, network mapping, sweeping, vulnerability and so on. In this phase we simply find the loop of hole of Target.
Phase 3 – Gaining Access
Gaining access refers to the penetration phase. The hacker exploits the loop hole (vulnerability) in the system. The attack can occur over a LAN, the Internet, or as a deception, or theft. Examples include buffer overflows, denial of service, session hijacking, and password cracking
Influencing factors include architecture and configuration of the target system, the skill level of the perpetrator, and the initial level of access obtained. In this phase we attack the Victim.
Phase 4 – Maintaining Access
Maintaining access refers to the phase when the hacker tries to retain his/her ownership of the system, The hacker has compromised the system
Hackers may harden the system from other hackers as well (to own the system) by securing their exclusive access with Backdoors, RootKits, or Trojans. Hackers can upload, download, or manipulate data, applications, and configurations on the owned system.
In simple manner Hackers put the compromised system in that where again he will get access easily.
Phase 5 – Covering Tracks
Covering Tracks refer to the activities that the hacker does to hide his misdeeds. In simple language hacker remove his all foot print so he will not caught.
Reasons include the need for continued use of resources, removing evidence of hacking, or avoiding legal action
Examples include Steganography, tunneling, and altering log files.
All the above phase , and tools involved in these Phase;s will be cleared in further posts.
We all love Google , In fact many of us opening Google to check the our Internet connection is working or not !! I know its funny but its True.Google is the best place to search and find things that we do not know about. In this post i am sharing about Some Great Tips and Tricks for Googling. In my previous post Google Hacking i provided some tricks for Hacking aspirant but now today i provide information for the normal users.
Here are some crucial Way to refining your googling.
Google tips and tricks
Trick #1 : Find the definition of a word:
Trick #2 : Identify Local Time for Any City in the World using Google
Trick #3 : Exclude Keywords in the Search
If you want Google to exclude a word while searching the web page, use – (minus) before the search as shown below. This example searches for the download ebooks, and without the word paid.
Trick #4 : Movie Listings
Google can list the movies playing in your town with showtimes
Trick #5 : Get all results from one specified site :
Trick #6 : Identify Local Weather for Any City in the World using Google
To see the current weather in Mumbai do the following. Go-ahead and try this yourself for your local city and see how it works
Trick #7 : Wildcard Search
The following search string can be very useful if you forgot the words in a lyric of a song you listened earlier. the wildcard symbol “*” will compare the possible results using the Google algorithm
Trick #8 : Accessing blocked websites
Want to catch up on the latest celebrity gossip from a site banned in your corporate firewall? Google can help you through cache option.
Trick #9 : Convert Currency
To converter currency, simply enter the conversion you’d like done into the Google search box and Google will provide your answer directly on the results page.
Trick #10 : Tracking Flight Status
If you know the flight number, you don’t have to be calling the airline to check the status
Trick #11 : Unit Conversion:
You can do unit conversion from one to another just by typing in Google as 12.5 cm in
Trick #12 : Searching for specific filetypes
If you are looking for a specific filetype, say a PowerPoint file to learn about Hacking, this is the right search string for you
Trick #13 : Phonebook Search
Google can be your very own online phonebook
Trick #14 : Mathematical Calculations using Google
Normally for doing the metric conversions we will be using some online conversion websites or conversion softwares. However just by using Google search box you can do calculations, unit conversions and money conversions as explained below.
You can use the Google search box as your scientific calculator as
Trick #15 : Google Advanced Search Page
If you are not able to remember some of the advanced search syntax mentioned in this article, then use the Google Advanced search page as shown below.
Hope you enjoy above best 15 Google tricks , we will shortly publish more tricks.