Wednesday 11 June 2014

Create trojan virus(BOTNET) and hijack login details


A botnet (also known as a zombie army) is a number of Internet computers that, although their owners are unaware of it, have been set up to forward transmissions (including spam or viruses) to other computers on the Internet. Any such computer is referred to as a zombie - in effect, a computer "robot" or "bot" that serves the wishes of some master spam or virus originator. Most computers compromised in this way are home-based. According to a report from Russian-based Kaspersky Labs, botnets -- not spam, viruses, or worms -- currently pose the biggest threat to the Internet. A report from Symantec came to a similar conclusion. Computers that are coopted to serve in a zombie army are often those whose owners fail to provide effective firewalls and other safeguards. An increasing number of home users have high speed connections for computers that may be inadequately protected. A zombie or bot is often created through an Internet port that has been left open and through which a small Trojan horse program can be left for future activation. At a certain time, the zombie army "controller" can unleash the effects of the army by sending a single command, possibly from an Internet Relay Channel (IRC) site.
The computers that form a botnet can be programmed to redirect transmissions to a specific computer, such as a Web site that can be closed down by having to handle too much traffic - a distributed denial-of-service (DDoS) attack - or, in the case of spam distribution, to many computers. The motivation for a zombie master who creates a DDoS attack may be to cripple a competitor. The motivation for a zombie master sending spam is in the money to be made. Both of them rely on unprotected computers that can be turned into zombies.
According to the Symantec Internet Security Threat Report, through the first six months of 2006, there were 4,696,903 active botnet computers.

Top 10 Best Hacking Tools


Hacking always involves tools. A good hacker knows how to use tools to his best advantage. An even better hacker writes his own tools. Here I have listed the top 10 most popular tools used in hacking. It is advisable to master these tools to become a good hacker. Note that all the tools listed here are completely free.


1. Nmap
Nmap is also known as the swiss army knife of hacking. It is the best port scanner with a lot of functions
In hacking, Nmap is usually used in the footprinting phase to scan the ports of the remote computer to find out wich ports are open.


2. Wireshark
Wireshark is a packet sniffer. It captures all network traffic going through a network adapter. When performing man in the middle attacks using tools like Cain, we can use Wireshark to capture the traffic and analyze it for juicy info like usernames and passwords. It is used by network administrators to perform network troubleshooting.

3. Cain and Abel

Cain and Abel is a multipurpose windows only hacking tool. It is a bit old now, but it still does the job well. Cain can be used to crack windows password, perform man in the middle attacks, capture network passwords etc.

4. Metasploit

Metasploit is a huge database of exploits. There are thousands of exploit codes, payloads that can be used to attack web servers or any computer for that matter. This is the ultimate hacking tool that will allow you to actually "hack" a computer. You will be able to get root access to the remote computer and plant backdoors or do any other stuff. It is best to use metasploit under linux.

5. Burp Suite

Burpsuite is a web proxy tool that can be used to test web application security. It can brute force any login form in a browser. You can edit or modify GET and POST data before sending it to the server. It can also be used to automatically detect SQL injection vulnerabilities. It is a good tool to use both under Windows and Linux environments.

6. Aircrack-ng

Aircrack-ng is a set of tools that are used to crack wifi passwords. Using a combination of the tools in  aircrack, you can easily crack WEP passwords. WPA passwords can be cracked using dictionary or brute force.  Although aircrack-ng is available for Windows, it is best to use it under Linux environment. There are many issues if you use it under Windows environment.


8. Nessus

Nessus is a comprehensive  automatic vulnerability scanner.  You have to give it an IP address as input and it will scan that IP address to find out the vulnerabilities in that system. Once you know the vulnerabllities, you can use metasploit to exploit the vulnerablity. Nessus works both in Windows and Linux.



10. THC Hydra

Hydra is a fast password cracker tool. It cracks passwords of remote systems through the network. It can crack passwords of many protocols including ftp,http, smtp etc. You have the option to supply a dictionary file which contains possible passwords. It is best to use hydra under linux environment.

9. Netcat

Netcat is a great networking utility which reads and writes data across network connections, using the TCP/IP protocol. It is also known as the swiss army knife for TCP/IP. This is because netcat is extremely versatile and can perform almost anything related to TCP/IP. In a hacking scenario, it can be used as a backdoor to access hacked computers remotely. The use of netcat is limited only by the user's imagination. Find out more about netcat at the official website.

10. Putty

Although putty is not a hacking software by itself, it is a very useful tool for a hacker. It is a client for SSH and telnet, which can be used to connect to remote computers. You may use putty when you want to connect to your Backtrack machine from your Windows PC.  It can also be used to perform SSH tunneling to bypass firewalls.

Indians Swallow Live Fish and get cured from Asthma

HYDERABAD, June 10, 2014 (AFP) – With pinched noses and watery eyes, thousands of Indians have lined up to swallow live fish in a traditional treatment for asthma administered annually in the country’s south.
Asthma sufferers gather every June in the southern city of Hyderabad to gulp down the fish stuffed with a yellow herbal paste, in hopes it will help them breathe more easily.
The wriggling five-centimetre (two-inch) fish are slipped into the throats of patients in a bizarre treatment that leaves them gagging.
The Bathini Goud family, which administers the treatment, says the fish clear the throat on their way down and permanently cure asthma and other respiratory problems.
But the family has declined to reveal the secret formula which they say they got from a Hindu saint in 1845.
Parents are often forced to pry open the mouths of reluctant children who cry at the site of squirming fish, while others pinch their noses, tip their heads back and close their eyes.
“Thousands of people travel from across India for the free medicine during a two-day period, the specific dates of which are determined by the onset of the monsoon every June.”
Thousands of people travel from across India for the free medicine during a two-day period, the specific dates of which are determined by the onset of the monsoon every June.

Rights groups and doctors have complained that the medicine is “unscientific”, a violation of human rights and unhygienic, claims rejected by the family.
The Indian government arranges special trains for the “fish medicine” festival every year and extra police are on duty to control crowds.
After digesting the treatment, patients are told to go on a strict diet for 45 days.