Saturday 6 April 2019

HACKER NEWS | THE ANSHUL SAXENA STORY | ALL DETAILS

THE ANSHUL SAXENA STORY

INTRODUCTION: He is one of the renowned tech expert, although his fame was overnight. He has used fame to actively support his nation. He is not like any cringe pop artist making any useless songs only for the sake of gaining fame. He is a true nationalists and actively posts on Indian politics on all his social media accounts. His most famous social account is of TWITTER which is also said to be followed by our respected Prime Minister.

BEFORE FAME: He used to post about Indian Politics on his social accounts but was not so famous and possessed only a reasonable amount of followers. After the heinous attack of PULWAMA on our INDIAN CRPF JAWANS his fame game started. he asked his followers to get him the IDs of the people rejoicing after the attack. Then with the help of cyber police they were able to track the people. These people were immediately removed from their respective institutions for which for which they used to work or studied. No one was spared be it students, men or women.

FAME GAME STARTS:  He became a social media celebrity overnight. This INDIAN CYBER SOLDIER was also rumored to hack Pakistani government websites but later confirmed that he was not behind it at all. This ethical hacker followed by Prime Minister was trending on all social media platforms(YouTube, Instagram, Facebook, Google). People also searched for his name on Wikipedia, to know about him more.He is an efficient and intelligent political analyst and he used to tweet informative facts and opinions about Politics, Foreign Affairs and National Security.

           He is followed by  more than 400 official accounts which include Wikileaks, by several countries ambassadors, many important political leaders, many hacking groups like HSH, Lulzsec India, even official page of Israel government and a lot more. Anshul has a huge fan following and his tech expertise has won him the title "INDIAN CYBER SOLDIER". On his youtube channel  named Anshul Saxena he talks about and provides unbiased, neutral and significant information and opinions  on  politics, national security, foreign affairs, the economy and social issues in its purest form.

Image result for anshul saxena

 IMAGE SOURCE: TWITTER.COM

   

Friday 6 April 2018

Hack a Windows 7/8/10 Admin Account Password

Greetings. This how-to on hacking Windows 7/8/10 etc. admin account passwords using Windows Magnifier is focused on adding, changing, or deleting an admin level account on a Windows 7/8/10 etc.
Maybe you forgot or lost the password to your Windows Admin account, this guide will help with that. If you are trying to hack the computer lab at school then you will need a different method

Disclaimer: This is for use on a PC that you own. Breaking into someone else's PC is considered a serious crime in most places. If you make a mistake or change something else, your Windows may become a non-boot. If so, just undo whatever you changed outside of the hack shown here, and it will back to normal. Need I say this is for Educational Purposes! You are responsible for your own thoughts and actions.
Difficulty Level: 2/10

Prerequisites:

  • Any Linux Live CD/DVD/USB with Live option (ex. Ubuntu Live, Linux Live, Kali, etc.).
  • Ability to use said Linux CD/DVD/USB.
  • Basic understanding of Windows file structure. i.e. can navigate.
  • The desire to modify user account(s) on said Windows boxen.
  • Physical access to said Windows box.
  • Ability to use BIOS if needed.
  • Ability to use command line and basic understanding of net user commands.

Things to Note:

  • If you are trying to hack a coworker / boss / job / school / customer / friend / spouse's account, you are screwed because they won't be able to use the old password anymore—try explaining that.
  • This hack works on Windows 7, 8, 10 and basically any that have "Ease of Access".
  • Servers require "net user Administrator blabla /domain".
  • This will destroy all data encrypted with EFS on the account if it's enabled (you have to enable it first).
  • If you do not undo the hack after you change the password, you will get the magnifier every time you use cmd or nothing at all.
  • If you modify or delete any other files in Sys32, your next boot up is doomed (maybe).
  • Scared? You should be. Now let's get hacking.

Step 1Boot Some Flavor of Linux Live CD

Insert CD/DVD into drive and reboot the machine. Start your Live DVD. You may need to go into the BIOS screen and change the boot-up order to CD/DVD drive first, HDD second.

Step 2Navigate to Sys32

Use the file browser in your Linux environment, navigate to %windir%/system32/. You may have to right-click and mount the Windows partition/drive first or use the NTFS-3G command.

Step 3Rename Magnify.exe

Find and rename magnify.exe (Magnifier file) to magnify.old.

Step 4Rename cmd.exe

Find and rename cmd.exe to magnify.exe.

Step 5Shut Down Linux & Reboot Windows

Logout, remove DVD, and reboot into Windows.

Step 6Get CMD Prompt Modify Accounts

When Windows reboots, click on the ease of access button in the bottom left corner.
Click magnify and hit apply. Ta da. You have a system level command prompt. At this point is where we will only change the Admin password and not any of the 1000 other things that could be done at this point!
Tip: You can right-click on cmd.exe and click run as administrator inside of Windows for escalated privileges. To edit files, it would never be allowed at basic admin level (caution).
Image via whstatic.com
(Hacked system level command prompt. -Cx2H)
As the photo above shows, typenet user to get a list of accounts. To the point type: net user administrator *

Your Options (Choose One That Applies):

Change Password:
net user username new_password
When you do so, the password changes without prompting you again.
Add an account:
net user username password /add
Tip: If your username has a space, like John Doe, use quotes like "John Doe".
Admin that:
net localgroup administrators username /add
Delete that:
net user username /delete
Remote Desktop Users Group: (just in case)
net localgroup Remote Desktop Users UserLoginName /add
Net User Syntax Reference:
net user commands
Domain i.e. Servers:
net user for domain

Step 7Reboot Linux & Fix magnfiy.exe

Now you should insert your Linux Live CD/DVD and rename the files back to original names or you will have issues later.
  1. Repeat Step 1
  2. Repeat Step 2
  3. Rename magnify.exe back to cmd.exe
  4. Rename magnify.old back to magnify.exe
  5. Log out, take out CD/DVD USB, reboot into Windows
Conclusions:
Well, that was how you hack a Windows 7/8/10 etc. administrator account password with Windows Magnifier. This also demonstrates how you could Pwn a machine if you think about it some, have hands on and they have not disabled EoA. Hope it helps you in some way. Cx2H

Tuesday 24 January 2017

Programming language








"> The 9 Most In-Demand Programming Languages


Glassdoor recently published a report on the top 25 lucrative, in-demand jobs. More than half of the jobs listed are in tech and require programming skills. If you’re interested in a fast-growing and lucrative career, you might want to make learning to code next on your checklist!
Next comes the hard part – deciding on the best programming language to learn.
To help narrow things down, we compiled data from Indeed.com (database including current computer programmer jobs). While this isn’t an extensive list, it does provide insight into the most in-demand programming languages sought after by employers.
most-in-demand-programming-languages-2016

 of the 9 Most In-Demand Programming Languages

1.    SQL
It’s no surprise SQL (pronounced ‘sequel’) tops the job list since it can be found far and wide in various flavors. Database technologies such as MySQL, PostgreSQL and Microsoft SQL Server power big businesses, small businesses, hospitals, banks, universities. Indeed, just about every computer and person with access to technology eventually touches something SQL. For instance, all Android phones and iPhones have access to a SQL database called SQLite and many mobile apps developed Google, Skype and DropBox use it directly.
2.    Java
The tech community recently celebrated the 20th anniversary of Java. It’s one of the most widely adopted programming languages, used by some 9 million developers and running on 7 billion devices worldwide. It’s also the programming language used to develop all native Android apps. Java’s popularity with developers is due to the fact that the language is grounded in readability and simplicity. Java has staying power since it has long-term compatibility, which makes sure older applications continue to work now into the future. It’s not going anywhere anytime soon and is used to power company websites like LinkedIn.com, Netflix.com and Amazon.com.
3.    JavaScript
JavaScript – not to be confused with Java – is another one of the world’s most popular and powerful programming languages, and is used to spice up web pages by making them interactive. For example, JavaScript can be used to add effects to web pages, display pop-up messages or to create games with basic functionality. It’s also worth noting that JavaScript is the scripting language of the World Wide Web and is built right into all major web browsers including Internet Explorer, FireFox and Safari. Almost every website incorporates some element of JavaScript to add to the user experience, adding to the demand for JavaScript developersIn recent years JavaScript has also gained use as the foundation of Node.js, a server technology that among other things enables real-time communication.  
4.    C#
Dating from 2000, C# (pronounced C-sharp) is a relatively new programming language designed by Microsoft for a wide range of enterprise applications that run on the .NET Framework. An evolution of C and  C++, the C# language is simple, modern, type safe and object oriented.
5.    C++
C++ (pronounced C-plus-plus) is a general purpose object-oriented programming language based on the earlier ‘C’ language. Developed by Bjarne Stroustrup at Bell Labs, C++ was first released in 1983. Stroustrup keeps an extensive list of applications written in C++. The list includes Adobe and Microsoft applications, MongoDB databases, large portions of Mac OS/X and is the best language to learn for performance-critical applications such as “twitch” game development or audio/video processing.
6.    Python
Python is a general purpose programming language that was named after the Monty Python (so you know it’s fun to work with)! Python is simple and incredibly readable since closely resembles the English language. It’s a great language for beginners, all the way up to seasoned professionals. Python recently bumped Java as the language of choice inintroductory programming courses with eight of the top 10 computer science departments now using Python to teach coding, as well as 27 of the top 39 schools. Because of Python’s use in the educational realm, there are a lot of libraries created for Python related to mathematics, physics and natural processing. PBS, NASA and Reddit use Python for their websites.
7.     PHP
Created by Danish-Canadian programmer Rasmus Lerdorf in 1994, PHP was never actually intended to be a new programming language. Instead, it was created to be a set of tools to help Rasmus maintain his Personal Home Page (PHP). Today, PHP (Hypertext Pre-Processor) is a scripting language, running on the server, which can be used to create web pages written in HTML. PHP tends to be a popular languages since its easy-to use by new programmers, but also offers tons of advanced features for more experienced programmers.
8.    Ruby on Rails
Like Java or the C language, Ruby is a general purpose programming language, though it is best known for its use in web programming, and Rails serves as a framework for the Ruby Language. Ruby on Rails has many positive qualities including rapid development, you don’t need as much code, and there are a wide variety of 3rd party libraries available. It’s used from companies ranging from small start-ups to large enterprises and everything in-between. Hulu, Twitter, Github and Living Social are using Ruby on Rails for at least one of their web applications.
9.    iOS/Swift
In 2014, Apple decided to invent their own programming language. The result was Swift – a new programming language for iOS and OS X developers to create their next killer app. Developers will find that many parts of Swift are familiar from their experience of developing in C++ and Objective-C. Companies including American Airlines, LinkedIn, and Duolingo have been quick to adopt Swift, and we’ll see this language on the rise in the coming years.
Any great craftsman has a belt full of tools, each a perfect choice for certain situations. Similarly, there will never be just a single programming language, and each language will evolve and improve over time to keep pace with innovation.
This is why, if you’re interested in becoming a developer, it’s important to be well-versed in a number of programming languages so you can be versatile and adaptable – and then continue to learn/master languages throughout your career.
Coding Dojo teaches five of 2016’s most in-demand programming languages. Whether you’re interested in picking up a new language, or learning several, make sure to check out Coding Dojo’s online and onsite programs!



B07JHFD1VP

Wednesday 2 November 2016

10 Best Hackers The World Has Ever Known



              

10 Best Hackers The World Has Ever Known

By pratik shinde



In the world of web where we get the global connectivity, it is far easier to break into someone’s personal zone. By personal, we do not just mean the social media. The world wide web which has become the hub of storing and restoring information, considered to be the safest vault, is a mere toy in the hands of a few computer geniuses. Hackers, Black Hat Hackers, villains, crackers, cyber-criminals, cyber pirates as they are well-known, throw a malicious software or virus at a system to gain the access to the desired information. Piqued by curiosity, they may perhaps break into your system too. Here are top 10 hackers or the whiz kids who put the world in awe with their dexterity.

1. Gary McKinnon

Gary McKinnon must’ve been a curious, restless child, for to gain information on UFOs, he thought it better to get a direct access into the channels of NASA. He infiltrated 97 US military and NASA computers, by installing virus and deleting a few files. All the efforts to satisfy his curiosity, but, alas, curiosity killed the cat. It was soon found that McKinnon was guilty of having hacked the military and NASA websites from his girlfriend’s aunt’s house in London. While entering and deleting the files from these websites wasn’t enough, McKinnon thought of shaming the security forces by putting out a notice on the website that said, “Your security is crap.” Well, looks like McKinnon was something, if he could shut down the US Military’s Washington Network of about 2000 computers for 24 hours, making the hack, the biggest military computer hack of all time!

2. LulzSec

LulzSec or Lulz Security, a high profile, Black Hat hacker group, gained credentials for hacking into Sony, News International, CIA, FBI, Scotland Yard, and several noteworthy accounts. So notorious was the group that when it hacked into News Corporations account, they put across a false report of Rupert Murdoch having passed away. While the group claims to have retired from their vile duties, the motto of the group, “Laughing at your security since 2011!” stays alive. There are assertions of the group having hacked into the websites of the newspapers likeThe Times and The Sun to post its retirement news. Many, however, claim that this group had taken it upon itself to create awareness about the absence of efficient security against hackers.

3. Adrian Lamo

Adrian Lamo decided to switch careers when he realized the potentials of his skills. He became a news when he hacked into Yahoo!, Microsoft, Google, and The New York Times. This, although culminated into his arrest, it later helped him gain the batch of an American Threat Analyst. A guy who would hack into top-notch accounts sitting in the spacious and comforting cafeterias, libraries, internet cafes, soon turned Wikileaks suspect Bradley Manning over to FBI. While Manning was arrested for leaking several hundred sensitive US government documents, Lamo went hiding or should we presume, undercover?

4. Mathew Bevan and Richard Pryce

Targeting the over-sensitive nerves, what Mathew Bevan along with his alleged partner Richard Pryce did, could have triggered great many issues between USA and North Korea. The duo hacked the US military computers and used it as a means to infiltrate the foreign systems. The crucial contents of Korean Atomic Research Institute were dumped into USAF system. However, the contents were majorly relevant to South Korea and hence, less volatile. But this, nonetheless, could have led to a huge international issue.

5. Jonathan James

The first juvenile to be imprisoned for a cyber-crime at the age of 16, Jonathan James or better known as c0mrade, hacked into Defense Threat Reduction Agency of US department. Further, he installed a sniffer that scrutinized the messages passed on between the DTRA employees. Not only did he keep a check on the messages being passed around, in the process, he collected the passwords and usernames and other such vital details of the employees, and further even stole essential software. All this cost NASA to shut down its system and to pay from its pocket $41,000. c0mrade, however, had a bitter ending as James committed suicide in 2008.

6. Kevin Poulsen

How far would you go to win your dream car or a dream house? How far will you go to win an online contest or a radio show contest? Perhaps, you shall keep trying your luck, unless you are Kevin Poulsen! Poulsen infiltrated a radio shows call-in contest just so he could win a Porsche. Dark Dante, as he was better known, went underground after FBI started pursuing him. He, later, was found guilty of seven counts of mail, wire and computer fraud, money laundering and the likes. What turned out to be rewarding in Dark Dante’s case is – his past crafted his future. Poulsen now serves as a Senior Editor at Wired.

7. Kevin Mitnick

Clad in an Armani suit, when a bespectacled face in his mid-40s smiles at you from the computer screen, you can hardly consider the man a cyber-criminal. Such is the case with Kevin David Mitnick. Once upon a time, the most wanted cyber-criminal of US, now is an affluent entrepreneur. Kevin, who is now a security consultant, was convicted of hacking Nokia, Motorola and Pentagon. He pleaded guilty to seven counts of fraud that included wire fraud, computer fraud and of illegally interception a wire communication. After five years of incarceration that included eight months of solitary confinement, Mitnick now has started afresh. However, his knack with the computers is still reminisced and was even depicted on celluloid in the films Takedown and Freedom Downtown.

8. Anonymous

The concept of being a “digital Robin Hood” was far from being conceived, but in the computer age, it is very likely that someone somewhere has bagged this title. A “hacktivist group” called Anonymous are known with the penname of being the “digital Robin Hood” amongst its supporters. Identified in public by wearing a Guy Fawkes Masks, Anons, as they are widely known, have publicized themselves by attacking the government, religious and corporate websites. The Vatican, the FBI, the CIA, PayPal, Sony, Mastercard, Visa, Chinese, Israeli, Tunisian, and Ugandan governments have been amongst their targets. Although, Anons have been arguing whether to engage in a serious activism or a mere entertainment, many of the group members have clarified their intent which is to attack internet censorship and control.

9. Astra

Astra, a Sanskrit word for weapon was the penname of a hacker who dealt in the weapon stealing and selling. A 58-year-old Greek Mathematician hacked into the systems of France’s Dassault Group, stole vulnerable weapons technology data and sold it to different countries for five long years. While the real identity of the ASTRA remains untraced, officials have said that he had been wanted since 2002. Astra sold the data to approximately 250 people from around the globe, which cost Dassault $360 millions of damage.

10. Albert Gonzalez

How safe is internet banking? When we browse through the profile of this mastermind, we are certain that one ought to use the World Wide Web with immense care. For two long years, Albert Gonzalez, stole from credit cards of the netizens. This was recorded to be the biggest credit card theft in the history of mankind. He resold approximately 170 million credit cards and ATM numbers. He did so by installing a sniffer and sniffing out the computer data from internal corporate networks. When arrested, Gonzalez was sentenced to 20 years in Federal prison