Sunday, December 1, 2013

Email Accounts Hacking Method - How To Hack Email Accounts

The Basic level Hacking is Email Account Hacking. Everyone like to do first email account hacking only. So here is the tutorial for budding hackers about email Hacking.

There are different types of Email Account Hacking . Here is some of them :

  1.  Social Engineering
  2.  Phishing
  3.  Brute Force Attack
  4.  Keylogger
  5.  Guessing the Answer for the Security Question


Social Engineering:

Social engineering takes advantage of the weakest link in any organization’s
information security defenses: people. Social engineering is
“people hacking” and involves maliciously exploiting the trusting nature of
human beings to obtain information that can be used for personal gain.

Social engineering is one of the toughest hacks to perpetrate because it takes
great skill to come across as trustworthy to a stranger. It’s also by far the
toughest hack to protect against because people are involved.

Social Engineering is different from Physical Security exploits . In social engineering hackers will analyze about
victim. Hackers will send mail to victim. The contents will be related to the victim.

Eg:

✓ False support personnel claim that they need to install a patch or new
version of software on a user’s computer, talk the user into downloading
the software, and obtain remote control of the system.
✓ False vendors claim to need to update the organization’s accounting
package or phone system, ask for the administrator password, and
obtain full access.
✓ Phishing e-mails sent by external attackers gather user IDs and passwords
of unsuspecting recipients. Hackers then use those passwords to
gain access to bank accounts and more. A related attack exploits crosssite
scripting on Web forms.
✓ False employees notify the security desk that they have lost their keys
to the computer room, receive a set of keys from security, and obtain
unauthorized access to physical and electronic information.

Phishing WebPage:



It is a fake webpage which looks similar to the original page of the website. Using this WebPage we can easily get the Password of victims. The process involved in creating Phishing webpage are,
✓ First Visit the Website which is associated with the email id. Copy the Source code.
✓ Edit the the Source code such that it will store the password for you.
✓ Upload the Webpage to any free webhosting sites. (don't select a famous hosting site,they will find that
your page is fake). Try uploading through the proxy server.



Guessing the Answer for Security Question:




Do you remember that the mail sites will ask for the security questions to retrieve the mail account? You can hack the mail account simply guessing the answer. If the victim is your friend ,then it may very easy to hack.



Brute Force Attack:

                                  
A famous and traditional attacking method . In this method ,the password will be found by trying all possible passwords with any program or software.



Keyloggers:

It is one of the spyware which will capture what you type in the keyboard. so whenever you type the username and password ,it will simply capture.

It is software program which will be attached with any softwares and send to victim. While victim install the software ,the keylogger also start to work.
 

How to create Prepaid Virtual Credit Cards (VCCs) instantly

This Virtual Credit Card creation method is for Indians who does not have a valid credit card and wants to make online transactions where credit card is mandatory.

What is a Virtual Credit Card?

Virtual Credit Card (VVC) is a one-time usable credit card with a preloaded amount and comes with few months of validity. It is the safest way to pay online.

How to get these VVCs?
For this method, you need to have an HDFC Banksavings account with International Debit Card. If you have a normal debit card, apply for an International Debit Card. Visit an HDFC Bank branch nearest to you and submit a simple application for International Debit Card, which takes around a week or two to get your card. If you have not opted for online banking facility, go and get it.

You can create unlimited virtual credit cards using NetSafe by HDFC Bank. Go to thehomepage of HDFC Bank and select “NetSafe/ Verified by Visa/ MasterCard SecureCode” from the different account logins available on the homepage. It pops up a window where you can register for NetSafe using your International Debit Card.

Once you registered, login into your account and it will show your balance and option to create a virtual credit with a specified amount. Fill the amount and click “GO.” It will create a virtual credit card with expiry date, CVV, and the amount you have chosen.

Don’ts:
Do not use this virtual credit card where physical goods are delivered at your doorstep upon presentation of the card to the delivery boy.
Do not use this card where recurrent payments are made because it expires in a month or so.
Except the above, you can now use the virtual card for online payments safely.

The Benefits of Using a Virtual Card
The temporary account number you generate and use for a one time or one vendor purchase is useless to hackers. Even if a hacker obtains the account number it will not be useful to him as it cannot be used again.

Because the virtual card will have a spending limit that reflect the purchase you intend to make, your real account and full credit line are not at risk when you buy online. The temporary number does not lead to your real credit card number no matter what a hacker does.
Using a virtual card for online purchases does not expose you to the risk of identity theft that is a rising problem in the marketplace today. Identity theft relies on the ability of the thief to match various pieces of information that you have placed online. If a hacker is unable to find information that leads to your credit file or your bank account, he is unlikely to be able to use your identity.

NINJA HACKING UNCONVENTIONAL PENETRATION TESTING TACTICS AND TECHNIQUES (FREE DOWNLOAD)

Ninja Hacking Unconventional Penetration Testing Tactics and Techniques


                                                              About book

Ninja Hacking, the new book by Thomas Wilhelm and Jason Andress, is not a typical book about hacking andpenetration testing. Experienced penetration testers who want to learn cutting-edge penetration techniques will find few references to little-known penetration tools or techniques presented in bland technical format. The book doesn’t rely on pun-filled humor, either.


Ninja Hacking is targeted at individuals who have an interest in the warriors of feudal Japan and want a serious philosophical exploration on how those warrior’s techniques map into modern cyber-warfare. For penetration testers who want to know how to be Ninjas, Ninja Hacking creates a framework for becoming a feudal Japanesewarrior in cyberspace. Each chapter discusses a new piece of the puzzle, and, while you won’t achieve mastery from this book alone, the building blocks are laid that should allow an inspired reader to know what additional areas need to be researched.


DOWNLOAD LINK:       LINK 1

POSTGRESQL UP AND RUNNING

PostgreSQL up and Running



If you’re thinking about migrating to the PostgreSQL open source database system, this guide provides a concise overview to help you quickly understand and use PostgreSQL’s unique features. Not only will you learn about the enterprise class features in the 9.2 release, you’ll also discover that PostgeSQL is more than just a database system—it’s also an impressive application platform.

With numerous examples throughout this book, you’ll learn how to achieve tasks that are difficult or impossible in other databases. If you’re an existing PostgreSQL user, you’ll pick up gems you may have missed along the way.


Learn basic administration tasks, such as role management, database creation, backup, and restore
Apply the psql command-line utility and the pgAdmin graphical administration tool
Explore PostgreSQL tables, constraints, and indexes
Learn powerful SQL constructs not generally found in other databases
Use several different languages to write database functions
Tune your queries to run as fast as your hardware will allow
Query external and variegated data sources with Foreign Data Wrappers
Learn how to replicate data, using built-in replication features.


DOWNLOAD LINK:    LINK 1

STEAL THIS COMPUTER BOOK 4.0 (WHAT THEY WON'T TELL YOU ABOUT THE INTERNET)



If you thought hacking was just about mischief-makers hunched over computers in the basement, think again. As seasoned author Wallace Wang explains, hacking can also mean questioning the status quo, looking for your own truths, and never accepting at face value anything authorities say or do.


The completely revised fourth edition of this offbeat, non-technical book examines what hackers do, how they do it, and how you can protect yourself. Written in the same informative, irreverent, and entertaining style that made the first three editions hugely successful, Steal This Computer Book 4.0 will expand your mind and raise your eyebrows. New chapters discuss the hacker mentality, social engineering and lock picking, exploiting P2P file-sharing networks, and how people manipulate search engines and pop-up ads to obtain and use personal information. Wang also takes issue with the media for "hacking" the news and presenting the public with self-serving stories of questionable accuracy. Inside, you'll discover:

How to manage and fight spam and spyware How Trojan horse programs and rootkits work, and how to defend against them How hackers steal software and defeat copy-protection mechanisms How to tell if your machine is being attacked and what you can do to protect it Where the hackers are, how they probe a target and sneak into a computer, and what they do once they get inside How corporations use hacker techniques to infect your computer and invade your privacy How you can lock down your computer to protect your data and your personal information using free programs.



DOWNLOAD LINK:      LINK 1

HACKING AND SECURING IOS APPLICATIONS



If you’re an app developer with a solid foundation in Objective-C, this book is an absolute must—chances are very high that your company’s iOS applications are vulnerable to attack. That’s because malicious attackers now use an arsenal of tools to reverse-engineer, trace, and manipulate applications in ways that most programmers aren’t aware of.


This guide illustrates several types of iOS attacks, as well as the tools and techniques that hackers use. You’ll learn best practices to help protect your applications, and discover how important it is to understand and strategize like your adversary.

Examine subtle vulnerabilities in real-world applications—and avoid the same problems in your apps
Learn how attackers infect apps with malware through code injection
Discover how attackers defeat iOS keychain and data-protection encryption
Use a debugger and custom code injection to manipulate the runtime Objective-C environment
Prevent attackers from hijacking SSL sessions and stealing traffic
Securely delete files and design your apps to prevent forensic data leakage
Avoid debugging abuse, validate the integrity of run-time classes, and make your code harder to trace



DOWNLOAD LINK:       LINK 1

JAVA IN 60 MINUTES A DAY BOOK

Java in 60 Minutes A Day book



Java is a programming language and computing platform first released by Sun Micro systems in 1995. There are lots of applications and websites that will not work unless you have Java installed, and more are created every day. Java is fast, secure, and reliable. From laptops to data centers, game consoles to scientific supercomputers, cell phones to the Internet, Java is everywhere!


Author: Rich Raposa
Features: A revolutionary virtual classroom
Book Name: Java in 60 minutes a day

Introduction:

Chapter 1: Getting Started with Java.

Chapter 2: Java Fundamentals.

Chapter 3: Control Structures.

Chapter 4: Classes and Objects.

Chapter 5: Methods.

Chapter 6: Understanding Inheritance.

Chapter 7: Advanced Java Language Concepts.

Chapter 8: Polymorphism and Abstraction.

Chapter 9: Collections.

Chapter 10: Interfaces.

Chapter 11: Exception Handling.

Chapter 12: An Introduction to GUI Programming.

Chapter 13: GUI Components and Event Handling.

Chapter 14: Applets.

Chapter 15: Threads.

Chapter 16: Input and Output.

Chapter 17: Network Programming.

Chapter 18: Database Programming.

Chapter 19: JavaBeans.

Appendix:
About the 60 Minutes Web Site.

Index.

DOWNLOAD LINK:         LINK 1

ANDROID SECURITY: ATTACKS AND DEFENSES



Android Security: Attacks and Defenses is for anyone interested in learning about the strengths and weaknesses of the Android platform from a security perspective. Starting with an introduction to Android OS architecture and application programming, it will help readers get up to speed on the basics of the Android platform and its security issues.


Explaining the Android security model and architecture, the book describes Android permissions, including Manifest permissions, to help readers analyze applications and understand permission requirements. It also rates the Android permissions based on security implications and covers JEB Decompiler.

The authors describe how to write Android bots in JAVA and how to use reversing tools to decompile any Android application. They also cover the Android file system, including import directories and files, so readers can perform basic forensic analysis on file system and SD cards. The book includes access to a wealth of resources on its website:www.androidinsecurity.com. It explains how to crack SecureApp.apk discussed in the text and also makes the application available on its site.

The book includes coverage of advanced topics such as reverse engineering and forensics, mobile device pen-testing methodology, malware analysis, secure coding, and hardening guidelines for Android. It also explains how to analyze security implications for Android mobile devices/applications and incorporate them into enterprise SDLC processes.

The book’s site includes a resource section where readers can access downloads for applications, tools created by users, and sample applications created by the authors under the Resource section. Readers can easily download the files and use them in conjunction with the text, wherever needed. Visit www.androidinsecurity.com for more information.



DOWNLOAD LINK:     LINK 1

HACKERS: HEROES OF THE COMPUTER REVOLUTION


This 25th anniversary edition of Steven Levy's classic book traces the exploits of the computer revolution's original hackers -- those brilliant and eccentric nerds from the late 1950s through the early '80s who took risks, bent the rules, and pushed the world in a radical new direction. With updated material from noteworthy hackers such as Bill Gates, Mark Zukerberg, Richard Stallman, and Steve Wozniak, Hackers is a fascinating story that begins in early computer research labs and leads to the first home computers.


Levy profiles the imaginative brainiacs who found clever and unorthodox solutions to computer engineering problems. They had a shared sense of values, known as "the hacker ethic," that still thrives today. Hackers captures a seminal period in recent history when underground activities blazed a trail for today's digital world, from MIT students finagling access to clunky computer-card machines to the DIY culture that spawned the Altair and the Apple II.



DOWNLOAD LINK:     LINK 1

HACKING FIREFOX: MORE THAN 150 HACKS, MODS, AND CUSTOMIZATIONS (EXTREME TECH)


They dreamed of a better browser . . . and before you could say "explore no more," Firefox was born. But already you want more. Tighter security, greater functionality. A custom installation for Linux. Maybe even that unique extension you've always dreamed of creating. Well, if you want to tweak the Fox, here are over 400 pages of ways to do it. From hacking profile settings to cracking links and cleaning out the cookie jar, this is the stuff that puts you in control.


Step-by-step instructions for these hacks and dozens more

Settings, content, and extension hacks
Hacking the interface and themes
Performance boosters
Anti-phishing and security hacks
Toolbar and status bar tweaks
Navigation, download, and search hacks
Hacks for common plugins
Extension and theme creation


DOWNLOAD LINK:      LINK 1




THE SHELL-CODER'S HANDBOOK: DISCOVERING AND EXPLOITING SECURITY HOLES SECOND EDITION



This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or application

New material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking "unbreakable" software packages such as McAfee's Entercept, Mac OS X, XP, Office 2003, and Vista
Also features the first-ever published information on exploiting Cisco's IOS, with content that has never before been explored
The companion Web site features downloadable code files


DOWNLOAD LINK:        LINK 1

HACKER TECHNIQUES, TOOLS, AND INCIDENT HANDLING (JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES)



Hacker Techniques, Tools, and Incident Handling begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. It goes on to review the technical overview of hacking: how attacks target networks and the methodology they follow. The final section studies those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on the Web. Written by a subject matter expert with numerous real-world examples, Hacker Techniques, Tools, and Incident Handling provides readers with a clear, comprehensive introduction to the many threats on our Internet environment and security and what can be done to combat them.

DOWNLOAD LINK:        LINK 1