Top 5 Hacking Tools ~ You must have!

Top 5 Hacking Tools


There are many hacking tools that can make your hacking quite easy, These hacking tools can decrease your effort, But you must have some knowledge to work on these tools! So here is the list of Top 5 Hacking Tools you must have :


1) Cain & Abel : (For Password Cracking)

Cain & Abel


Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols. The program does not exploit any software vulnerabilities or bugs that could not be fixed with little effort. It covers some security aspects/weakness present in protocol's standards, authentication methods and caching mechanisms; its main purpose is the simplified recovery of passwords and credentials from various sources, however it also ships some "non standard" utilities for Microsoft Windows users.

Link : http://www.oxid.it/cain.html


2) AirCrack-NG : (For Wireless Hacking)

AirCrack-NG


Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the PTW attack, thus making the attack much faster compared to other WEP cracking tools.

Link : http://www.aircrack-ng.org/


3) Nmap : (For Port Scanner)

Nmap


Nmap ("Network Mapper") is a free and open source (license) utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and official binary packages are available for Linux, Windows, and Mac OS X. In addition to the classic command-line Nmap executable, the Nmap suite includes an advanced GUI and results viewer (Zenmap), a flexible data transfer, redirection, and debugging tool (Ncat), a utility for comparing scan results (Ndiff), and a packet generation and response analysis tool (Nping).



Link : http://nmap.org/


4) TOR : (For Encryption)

TOR


Tor is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security.

Link : http://www.torproject.org.in/


5) Metasploit : (For Vulnerability Exploitation)

Metasploit


Its best-known sub-project is the open source Metasploit Framework, a tool for developing and executing exploit code against a remote target machine. Other important sub-projects include the Opcode Database, shellcode archive and related research.

Link : http://www.metasploit.com/

So this was the list of Top 5 Hacking Tools, Hope you liked it!!

Have Fun!!

If you have any queries, comment us below OR contact us.

Google's Surprise at I/O

Android


In the 2014 I/O Conference Google has set its eyes on entering our daily lives in a very profound manner.
Google revealed its plans relating to Android TV and Android Auto. Google is aiming at touching the personal sphere in a highly interactive way. Giving life an Android touch .


Google Maps


Android Auto is aimed at providing an extension of Android to automobiles.




Android Auto would be providing and interface for the users to display and use their Android apps on the move.It would be providing an interface for the start enabled apps and services.Android Auto would be providing the feauures like locking the handheld device when connected, so that drivers can interact with Auto by using the vehicle's input controls, touch display, and voice.


With Android TV the Google is gonna take the experience of Android from small screen to big screen.Bigger screens to give a richer gaming experience to users and to make android a member of your family. It is gonna provide a fluid and a smoother experience to its user.


Courtesy :

http://developer.android.com

How to BYPASS College's/School's Firewall OR internet Filters

It is not possible in some schools and colleges to download a movie or a games or to browse a social networking site because the school's/college's web filter blocks it!

Access Denied


So here i will teach you how to bypass it :

*Download TOR!

See also : Browse Anonymously : Hide your IP (Similar)


What is TOR?

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. Tor provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy.

FOR MORE VISIT : http://www.torproject.org.in/about/overview.html.en

1) Go to : http://www.torproject.org.in/

2) Download the latest version of TOR



3) Install it

4) Done!!

This will help you to bypass the College's/School's Firewall OR internet Filters

If you like article do not forget to subscribe.

If you are having any queries, contact us OR comment us below

Social Engineering Attacks (Basic Guide)

Social Engineering
Image courtesy : www.techrepublic.com


What it is?

•Social engineering attacks are use to say malwares because, it is the easiest way to get the malware installer. It exploit the trust relation ship between you and your co-workers and your family.
•We always open an e-mail received from our friend and co-worker with out checking the proper mail address and lots of time this mail can come with the malicious software.
•This can be send by the hackers to steal your personal information from your computer, for ex, usernames and passwords, bank details, etc.


Case Study

•There is currently a communication process in place to receive and manage requests
•99% of requests come from known contacts
•How should we handle requests from contacts that are not known?


What’s missing?

•We do not have a policy or process in place to confirm identity of contacts making requests
•We do not have a list of authorized contacts
•There is a service level agreement in place for managed hosting -but nothing defined about emergency requests from clients that do not have a services support contract in place.



What can happen?

•Attacker can steal your personal information and can sell this information on the black market, they can sell your bank information to undergone organizations.


How to recognize these attacks?

•real person e-mail address?
•Address from your bank?
•Real website?


Protect yourself from threats

•Use latest Operating System version.
•Use latest web browser.
•Use latest antivirus software
•Be careful when opening e-mail attachments
•Be careful when clicking links
•Always use to directly browse the website, instead of using links, which could be contains malicious software's.


Example of Social Engineering Attacks.

•Java Applet Attack


JAVA Applet Attack

•The Java Applet is one of the core attack vectors within SET and has the highest success rate for compromise.
•The Java Applet attack will create a malicious Java Applet that once run, will completely compromise the victim.
•The neat trick with SET is that you can completely clone a website and once the victim has clicked run, it will redirect the victim back to the original site making the attack much more believable.
•This attack vector affects Windows, Linux, and OS X and can compromise them all.

Nexus 6 in October?

According to the rumors, there have been talks that Google is reportedly working on a Nexus 6 and the device packs a 5.5 inch screen similar to the LG G3 handset

Nexus 6


According to the rumors, Nexus 6 will have :

Snap Dragon 800-Series (64-Bit) with the clock speed of 3GHz
5.2 inch Full-HD LCD screen, Protected with Corning Gorilla Glass
3 GB RAM
13 MP Camera and 5 MP Front camera
Other Features : Bluetooth,NFC,Micro USB,WiFi and 4G






These rumors were spread by a recent from Google's Android Twitter Account. If it is true then more likely the device will be release in late October OR in the mid of November!

The images which were posted in the tweets (Accidentally) were not resembled with either of the previous devices! So it could be true.

Lets hope for the best.


If you like this post, Do not forget to subscribe.

If you have any queries, comment us below OR contact us.

How to Block Candy Crush request on Facebook

If you are tired of these "Candy Crush" requests then there is a good news for you, You can block these requests / notifications from Facebook!

Candy Crush Meme

Steps :

Method 1 :

1) Click on the "Down-Arrow" button on Facebook

2) Click on "Settings"

Settings


3) Select "Blocking" tab

Blocking


OR click on this link : https://www.facebook.com/settings?tab=blocking

4) Look for the "Block Apps" section



5) Now type-in "Candy Crush Saga"

Block Apps


6) Press "Enter"

7) Now click on the "Notification" icon

8) Now select the "Candy Crush" notification and click the "X" icon

9) Click on "Turn off" button

Turn It Off


10) Done!

Congratulations! The notifications from the addictive hit game by King.com "Candy Crush Saga" have been blocked.

If you like this tutorial, Do not forget to subscribe

If you have any queries, comment us below OR contact us.

Browse a website using Command Prompt

This technique is very useful when you want to gather data for the network condition, Information, ISP etc.
And if you are working on the Linux, This tutorial may help you!

telnet

Steps :

In this method we will use Telnet.

What is Telnet?
Telnet is a network protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection. User data is interspersed in-band with Telnet control information in an 8-bit byte oriented data connection over the Transmission Control Protocol (TCP).

So if your telnet client is disabled, Here is a way to enable it :




For Window 7 users : Open Control Panel > Programs > Programs and Features > Turn Windows features on or off (On the left side) > In a small window look for "Telnet Client" and Check (Tick) the Option :

Telnet Client


Now lets Browse the website with the Command Prompt

1) Open Command Prompt

2) Type in the follow command :

Telnet WEBSITE_URL 80

Example : telnet thinkdifferentzone.lan 80

The Code


3) Press "Enter"

4) Done

If you like this tutorial do not forget to subscribe.

If you have any queries, comment us below OR contact us

Make money from home without doing any INVESTMENT!!


There are lots of ways through which you can make real and genuine money online, But the best and the effective way is through NEOBUX. Through NEOBUX you can make money with just click some ads, completing some offers and referring your friends!


How does it work?

NEOBUX is a free service which accepts members from any country. Advertisers pay to have their websites / products exposed and you earn money from NEOBUX while viewing these sites. Paid-To-Click, or simply PTC websites, act as middlemen between advertisers and consumers.


How will I receive payments?

After earning money on NEOBUX, you can transfer it to your bank account using alertpay or paypal. NEOBUX will send your earnings to your alertpay/paypal account first, from there you can transfer the money to your bank. If you don't have an account, you can create it easily by going to paypal.com (or) alertpay.com. It is absolutely free. AlertPay/PayPal is like an online bank, which allows you to send and receive payments using the internet.



How to get Started :

1) Click on the "Register" button below



2) On the main page click on REGISTER NOW button.

3) On the next page you should complete the registration form. Fill username, password, e-mail(if the e-mail you want to use is different from the one you used for PayPal and Alert Pay you should type both e-mails) year of birth and image verification code, then click CONTINUE button.

4) On the next page you should paste the confirmation code from your e-mail. Check your e-mail (or both e-mails if your NeoBux and Alert Pay/PayPal e-mails are different you will have two confirmation codes, one for each e-mail address) Paste validation code, type the image verification and click FINISH REGISTRATION button.

5) Congratulations you are done with your registration. Click on LOGIN NOW button and you will go to log in page. You have to enter your username, password, verification code and then click on LOGIN button.

6) After you log in you will see NeoBux main page. On the right top corner is your account name and your current balance next to it. If you want to start viewing adds you should click on VIEW ADVERTISEMENTS button.

7) This is were you go to view you advertisements for the day. Standard members a guaranteed 4 advertisements a day, but if you check the site multiple times a day you will get more - eventually few mini adds. There is a little red dot that appears when there is an advertisement to be clicked on, then all that is needed is for you to go to the View Advertisements page and click the advertisement. Click on the first one and you will see "CLICK THE RED BUTTON TO VIEW THE ADVERTISEMENT" and a small red dot will appear. When you click on the red dot, a new window or tab will open with the advertisement in it and you will see the top has a NeoBux header, when the advertisement has loaded, a small progress bar will start loading in header and when it finishes you will see that you have been credited for viewing that advertisement. Wait for the timer and continue to the next link with add. Note that you have to wait for the timer to counts down before you continue to the next add. If you close the advertisement before you have been credited, you have just wasted your time and made no money, however you can go back to the view advertisements page and click on the advertisement again.

HOW I MAKE 40$ EVERYDAY WITH NEOBUX??


So here are the instruction divided in (4 Phase), With the help of these instructions you can also make 30$-40$ everyday. 


Phase 1 :

Start clicking ads everyday and don’t miss a single one. This is crucial in the beginning as
you are just starting out and don’t have any referrals. Also, in this stage, you are trying
to get 100 clicks so that you can start having DR’s.
When you reach $0.60 in your balance, it is time to rent your first referrals 3 referrals.
0.001 per ad x 5 ads a day x 120 days = $0.60


Phase 2 :

Once you have $0.60 in your balance, rent the first 3 referrals. At this point, turn
autopay on. This option is available from the referrals list menu. Referrals cost 0.30 a
month to maintain. Instead of paying for the referral, they will pay themselves as long as
autopay is on. You get one penny less from each referral, but they will be your referral
as long as they are active.
As a standard, you receive 0.005 per click from each RR.
Referral clicks
0.005 per ad x 4 ads a day x 3 referrals = $0.06 per day
Total earnings: $0.06 per day


Phase 3 :

Keep renting referrals by increments of 3 once you have the money. You can rent bigger
packages as you make more money. RR Packages come in sizes of 3, 10, 20, 40, etc.
Repeat this process until you have 300 referrals. This will take a few months to
accomplish, and this is where most people flake out.
Referral clicks
0.005 per ad x 4 ads a day x 300 referrals = $6 per day
Total earnings: $6 per day
Note: this example assumes that all referrals are active daily. It is not an ideal world, and this kind of
scenario is highly unlikely. These numbers are for illustrative purposes only. You will need more than 300
referrals to have 300 active referrals.
When you reach 300 referrals, stop buying referrals and just maintain the ones you
already have. Keep doing this until you have $90 in your balance, and you can use it to
pay for the Golden upgrade.


Phase 4 :

Once you reach Golden, your referral earnings will double. You will get 0.01 per referral
click instead of 0.005. Also, you will get 0.01 on personal clicks, instead of just 0.001!
Referral clicks
0.01 per ad x 4 ads a day x 500 referrals = $20 per day
Personal clicks
0.01 per ad x 10 ads a day = $0.10 per day
Total daily earnings:
20.00 + 0.10 = $20.10 per day
At this point, it may be tempting to cash out. I don’t recommend cashing out until you
have 2000 referrals. Until then, save up your money to rent RR’s until you have 2,000. At
this point, you should be making well over $30 to $40 a day


So what are you waiting for? Click on the "Register" button below to get started


Payment Proofs :

Visit the link : http://www.neobux.com/forum/?/6/, To check the payment proofs

How to open password protected RAR/ZIP File

Its very annoying when someone uploaded a password protected ZIP/RAR file on the the file. So here is a method that will help to unlcok a protected ZIP/RAR file.

Unlock


Steps : 

1) Download the "Rar & Zip recovery tools"




2) Extract it

3) Open the required software (If its RAR file then open RARUNLOCKER.EXE and if its ZIP file then open ZIPUNLOCKER.EXE)

In our case we will use RARUNLOCKER.EXE (Due to password protected RAR file)
*Both the softwares have same interface, So don't worry the method is same for both.

RARUNLOCKER


4) Click on "Recover"

Recover


5) Select the password protected ZIP/RAR file

6) Wait for some time (It depends on the length of the password)

7) Bang!!! You got your password!

Liked this tutorial? Subscribe us now!!

If you have any queries, contact us OR comment us below 

How to Create an Undetectable Phishing Page (2014 ~ Guide)

This tutorial is similar to the previous one (How to do undetectable phishing (Hacking Guide)), but the only difference is that this method (tutorial) is more Advanced and more Effective.

Phishing


Note : This tutorial is for Education Purpose only don't misuse it, Think Different Zone will Not Hold any responsibility.

As you all know hosting a phishing page on any hosting site is not easy, Every time you host one it gets deleted automatically due to some of the Guidelines/Privacy Policy (Security Check). So i have decided to share with you some of the best trick through which you can bypass there Guidelines/Privacy Policy (Security Check) without getting your phishing page deleted!!

So lets begin!

Steps : 

1) Download this Phishing Template : Facebook Page Security.zip






2) Host it on any free hosting site you want!

3) Edit the highlighted line in the code "if ($id == "258sdf14fs5567F445d")" which is located in "index.php" with your random code, You can use any 8/12/15 digit numbers and alphabets (I recommend to use there combination)

4) Now open your phishing page link like this :

http://YOUR_PHISHING_PAGE_URL/?id=YOUR_CODE

For example : "http://MYSITE.com/?id=258sdf14fs5567F445d", where the highlighted code is your code.

5) Done!

*All the Phishing details will be saved in "FPSlogs.txt"

Note : This tutorial is for Education Purpose only don't misuse it, Think Different Zone will Not Hold any responsibility.

If you like this tutorial, Do not forget to subscribe!

If you have any queries, comment us below OR contact us