Create an account


Welcome, Guest
You have to register before you can post on our site.

Username
  

Password
  





Search Forums

(Advanced Search)

Forum Statistics
» Members: 9
» Latest member: Shervin_Rfn
» Forum threads: 18
» Forum posts: 18

Full Statistics

Online Users
There are currently 5 online users.
» 0 Member(s) | 5 Guest(s)

 
  How to bypass iPhone passcode with Siri?
Posted by: hackonology - 06-24-2020, 05:26 AM - Forum: Password Cracking - No Replies

If you are an avid user of Apple products, then chances are that you must have already heard of this iPhone hack. If you are running a device on iOS 8.0 to iOS 10.1, then you can take the assistance of Siri to bypass iPhone lock. Even though this is not a secure way to surpass your phone’s lock screen, it doesn’t restore or erase your data in the process. You can follow these steps to bypass iPhone passcode with Siri.

Steps: 

    1. Firstly, hold the Home button on our phone to activate Siri. Speak a command like “Siri, what time is it?” to ask the present time. Now, tap on the clock icon.
    2. It will open an interface for the world clock feature. From here, add another clock.
    3. Simply provide a textual input while searching for the city and tap on the “Select all” button.
    4. From all the provided features, select the option of “Share” to continue.
    5. Tap on the message icon to draft a new message.
    6. A new interface for message draft would be opened. In the “To” field, type something and tap the return button on the keyboard.
    7. As your text will turn green, tap on the add icon again.
    8. From the next interface, select the option of “Create new Contact”.
    9. While adding a new contact, tap on the contact photo icon and choose to “Add Photo”.
    10. From the photo library, browse your albums.
    11. Wait for 3-5 seconds before pressing the home button again. This will lead you to the home screen of your device.
Indian Cyber Army | Make IT Secure
We Are Indian We are Great
Enjoy…Stay Happy…Stay Secure…

Print this item

  Use VBA Code to Break Excel Worksheet Password
Posted by: hackonology - 06-24-2020, 05:17 AM - Forum: Password Cracking - No Replies

If you think that the above method does not work as per your needs, then there is one more way that can help you know how to break MS Excel password. This solution is used to open worksheets that are password protected in an Excel file. Follow the below steps to unprotect Excel workbook password.

Step 1: Begin with opening the Excel file. Now open the worksheet that you need to unlock. All you need to do is press Alt + F11. This will land you in the macro editor.

Step 2: Double click on the sheet from the menu in the left that you need to break. This will open the General section page for the sheet. Now type in the following code in the General Declaration page:

Quote:Sub PasswordBreaker()
'Breaks worksheet password protection.
Dim i As Integer, j As Integer, k As Integer
Dim l As Integer, m As Integer, n As Integer
Dim i1 As Integer, i2 As Integer, i3 As Integer
Dim i4 As Integer, i5 As Integer, i6 As Integer
On Error Resume Next
For i = 65 To 66: For j = 65 To 66: For k = 65 To 66
For l = 65 To 66: For m = 65 To 66: For i1 = 65 To 66
For i2 = 65 To 66: For i3 = 65 To 66: For i4 = 65 To 66
For i5 = 65 To 66: For i6 = 65 To 66: For n = 32 To 126
ActiveSheet.Unprotect Chr(i) & Chr(j) & Chr(k) & _
Chr(l) & Chr(m) & Chr(i1) & Chr(i2) & Chr(i3) & _
Chr(i4) & Chr(i5) & Chr(i6) & Chr(n)
If ActiveSheet.ProtectContents = False Then
MsgBox "One usable password is " & Chr(i) & Chr(j) & _
Chr(k) & Chr(l) & Chr(m) & Chr(i1) & Chr(i2) & _
Chr(i3) & Chr(i4) & Chr(i5) & Chr(i6) & Chr(n)
Exit Sub
End If
Next: Next: Next: Next: Next: Next
Next: Next: Next: Next: Next: Next
End Sub

Step 3: Press F5 and run the macro and your job here is done.
Your Excel worksheet will be opened without a password. This solution is applicable to all types of Excel versions.


Indian Cyber Army | Make IT Secure
We Are Indian We are Great
Enjoy…Stay Happy…Stay Secure…

Print this item

  Use ZIP to Break Excel Password
Posted by: hackonology - 06-24-2020, 05:13 AM - Forum: Password Cracking - No Replies

Employment of this solution will need you to edit the xml file of the zip. Puzzled? You must be wondering as to where did the xml and zip file came into picture. Well, you need to follow the steps given below and know how to break password on Excel.

Steps to Remove/Break a password of Excel File: 

Step 1: Before we begin, you need to create a backup of the original file. This will be helpful if anything goes wrong. Now, all you need to do is change the extension of the file to .zip.

Step 2: Now, extract the contents of the zip file. In the extracted content, you will need to search the xml format of the file. This will be found in "worksheets" directory.

Step 3: Once you find the xml file, open it in the xml editor. In the xml file, search for the "<sheetProtection password="c4esDF" sheet="1" objects="1" scenarios="1"/> " term and remove it from the file. Once removed, save the file.

Step 4: Change back the extension of the file as it was in the first place. When you try to open the file, no password will be needed.


Indian Cyber Army | Make IT Secure
We Are Indian We are Great
Enjoy…Stay Happy…Stay Secure…

Print this item

  System Security
Posted by: hackonology - 06-24-2020, 04:57 AM - Forum: System and Devices Security - No Replies

Security of a computer system is a crucial task. It is a process of ensuring confidentiality and integrity of the OS.
A system is said to be secure if its resources are used and accessed as intended under all the circumstances, but no system can guarantee absolute security from several of the various malicious threats and unauthorized access.
Security of a system can be threatened via two violations:
  • Threat: A program which has the potential to cause serious damage to the system.
  • Attack: An attempt to break security and make unauthorized use of an asset.
Security violations affecting the system can be categorized as malicious and accidental. Malicious threats, as the name suggests are a kind of harmful computer code or web script designed to create system vulnerabilities leading to back doors and security breaches. Accidental Threats, on the other hand, are comparatively easier to be protected against. Example: Denial of Service DDoS attack.
Security can be compromised via any of the breaches mentioned:

  • Breach of confidentiality: This type of violation involves the unauthorized reading of data.
  • Breach of integrity: This violation involves unauthorized modification of data.
  • Breach of availability: It involves an unauthorized destruction of data.
  • Theft of service: It involves an unauthorized use of resources.
  • Denial of service: It involves preventing legitimate use of the system. As mentioned before, such attacks can be accidental in nature.
Security System Goals –
Henceforth, based on the above breaches, the following security goals are aimed:
  1. Integrity:
    The objects in the system mustn’t be accessed by any unauthorized user & any user not having sufficient rights should not be allowed to modify the important system files and resources.
  2. Secrecy:
    The objects of the system must be accessible only to a limited number of authorized users. Not everyone should be able to view the system files.
  3. Availability:
    All the resources of the system must be accessible to all the authorized users i.e only one user/process should not have the right to hog all the system resources. If such kind of situation occurs, denial of service could happen. In this kind of situation, a malware might hog the resources for itself & thus preventing the legitimate processes from accessing the system resources.
Threats can be classified into the following two categories:
  1. Program Threats:
    A program written by a cracker to hijack the security or to change the behaviour of a normal process.
  2. System Threats:
    These threats involve the abuse of system services. They strive to create a situation in which operating-system resources and user files are misused. They are also used as a medium to launch program threats.
Types of Program Threats –
  1. Virus:
    An infamous threat, known most widely. It is a self-replicating and a malicious thread which attaches itself to a system file and then rapidly replicates itself, modifying and destroying essential files leading to a system breakdown.
    Further, Types of computer viruses can be described briefly as follows:
    – file/parasitic – appends itself to a file
    – boot/memory – infects the boot sector
    – macro – written in a high-level language like VB and affects MS Office files
    – source code – searches and modifies source codes
    – polymorphic – changes in copying each time
    – encrypted – encrypted virus + decrypting code
    – stealth – avoids detection by modifying parts of the system that can be used to detect it, like the read system
    call
    – tunneling – installs itself in the interrupt service routines and device drivers
    – multipartite – infects multiple parts of the system
  2. Trojan Horse:
    A code segment that misuses its environment is called a Trojan Horse. They seem to be attractive and harmless cover program but are a really harmful hidden program which can be used as the virus carrier. In one of the versions of Trojan, User is fooled to enter its confidential login details on an application. Those details are stolen by a login emulator and can be further used as a way of information breaches.
    Another variance is Spyware, Spyware accompanies a program that the user has chosen to install and downloads ads to display on the user’s system, thereby creating pop-up browser windows and when certain sites are visited by the user, it captures essential information and sends it over to the remote server. Such attacks are also known as Covert Channels.
  3. Trap Door:
    The designer of a program or system might leave a hole in the software that only he is capable of using, the Trap Door works on the similar principles. Trap Doors are quite difficult to detect as to analyze them, one needs to go through the source code of all the components of the system.
  4. Logic Bomb:
    A program that initiates a security attack only under a specific situation.
Types of System Threats –
Aside from the program threats, various system threats are also endangering the security of our system:


  1. Worm:
    An infection program which spreads through networks. Unlike a virus, they target mainly LANs. A computer affected by a worm attacks the target system and writes a small program “hook” on it. This hook is further used to copy the worm to the target computer. This process repeats recursively, and soon enough all the systems of the LAN are affected. It uses the spawn mechanism to duplicate itself. The worm spawns copies of itself, using up a majority of system resources and also locking out all other processes.
  2. Port Scanning:
    It is a means by which the cracker identifies the vulnerabilities of the system to attack. It is an automated process which involves creating a TCP/IP connection to a specific port. To protect the identity of the attacker, port scanning attacks are launched from Zombie Systems, that is systems which were previously independent systems that are also serving their owners while being used for such notorious purposes.
  3. Denial of Service:
    Such attacks aren’t aimed for the purpose of collecting information or destroying system files. Rather, they are used for disrupting the legitimate use of a system or facility.
    These attacks are generally network based. They fall into two categories:
    – Attacks in this first category use so many system resources that no useful work can be performed.
    For example, downloading a file from a website that proceeds to use all available CPU time.
    – Attacks in the second category involves disrupting the network of the facility. These attacks are a result of the abuse of some fundamental TCP/IP principles.
    fundamental functionality of TCP/IP.
Security Measures Taken –
To protect the system, Security measures can be taken at the following levels:
  • Physical:
    The sites containing computer systems must be physically secured against armed and malicious intruders. The workstations must be carefully protected.
  • Human:
    Only appropriate users must have the authorization to access the system. Phishing(collecting confidential information) and Dumpster Diving(collecting basic information so as to gain unauthorized access) must be avoided.
  • Operating system:
    The system must protect itself from accidental or purposeful security breaches.
  • Networking System:
    Almost all of the information is shared between different systems via a network. Intercepting these data could be just as harmful as breaking into a computer. Henceforth, Network should be properly secured against such attacks.
Usually, Anti Malware programs are used to periodically detect and remove such viruses and threats. Additionally, to protect the system from the Network Threats, Firewall is also be used.
Indian Cyber Army | Make IT Secure
We Are Indian We are Great
Enjoy…Stay Happy…Stay Secure…

Print this item

  Network Security Methods and Tools
Posted by: hackonology - 06-24-2020, 04:51 AM - Forum: Network Security - No Replies

Network security is the practice of preventing and protecting against unauthorized intrusion into corporate networks. As a philosophy, it complements endpoint security, which focuses on individual devices; network security instead focuses on how those devices interact, and on the connective tissue between them.

The overall thrust is the same: network security is implemented by the tasks and tools you use to prevent unauthorized people or programs from accessing your networks and the devices connected to them. In essence, your computer can’t be hacked if hackers can’t get to it over the network.

Definitions are fine as top-level statements of intent. But how do you lay out a plan for implementing that vision? Stephen Northcutt wrote a primer on the basics of network security for CSOonline over a decade ago, but we feel strongly that his vision of the three phases of network security is still relevant and should be the underlying framework for your strategy. In his telling, network security consists of:

  • Protection: You should configure your systems and networks as correctly as possible
  • Detection: You must be able to identify when the configuration has changed or when some network traffic indicates a problem
  • Reaction: After identifying problems quickly, you must respond to them and return to a safe state as rapidly as possible


Network security methods:

To implement this kind of defense in depth, there are a variety of specialized techniques and types of network security you will want to roll out. Cisco, a networking infrastructure company, uses the following schema to break down the different types of network security, and while some of it is informed by their product categories, it’s a useful way to think about the different ways to secure a network.
  • Access control: You should be able to block unauthorized users and devices from accessing your network. Users that are permitted network access should only be able to work with the limited set of resources for which they’ve been authorized.
  • Anti-malware: Viruses, worms, and trojans by definition attempt to spread across a network, and can lurk dormant on infected machines for days or weeks. Your security effort should do its best to prevent initial infection and also root out malware that does make its way onto your network.
  • Application security: Insecure applications are often the vectors by which attackers get access to your network. You need to employ hardware, software, and security processes to lock those apps down.
  • Behavioral analytics: You should know what normal network behavior looks like so that you can spot anomalies or breaches as they happen.
  • Data loss prevention: Human beings are inevitably the weakest security link. You need to implement technologies and processes to ensure that staffers don’t deliberately or inadvertently send sensitive data outside the network.
  • Email security: Phishing is one of the most common ways attackers gain access to a network. Email security tools can block both incoming attacks and outbound messages with sensitive data.
  • Firewalls: Perhaps the granddaddy of the network security world, they follow the rules you define to permit or deny traffic at the border between your network and the internet, establishing a barrier between your trusted zone and the wild west outside. They don’t preclude the need for a defense-in-depth strategy, but they’re still a must-have.
  • Intrusion detection and prevention: These systems scan network traffic to identify and block attacks, often by correlating network activity signatures with databases of known attack techniques.
  • Mobile device and wireless security: Wireless devices have all the potential security flaws of any other networked gadget — but also can connect to just about any wireless network anywhere, requiring extra scrutiny.
  • Network segmentation: Software-defined segmentation puts network traffic into different classifications and makes enforcing security policies easier.
  • Security information and event management (SIEM): These products aim to automatically pull together information from a variety of network tools to provide data you need to identify and respond to threats.
  • VPN: A tool (typically based on IPsec or SSL) that authenticates the communication between a device and a secure network, creating a secure, encrypted “tunnel” across the open internet.
  • Web security: You need to be able to control internal staff’s web use in order to block web-based threats from using browsers as a vector to infect your network.

Network security software:

To cover all those bases, you’ll need a variety of software and hardware tools in your toolkit. Most venerable, as we’ve noted, is the firewall. The drumbeat has been to say that the days when a firewall was the sum total of your network security is long gone, with defense in depth needed to fight threats behind (and even in front of) the firewall. Indeed, it seems that one of the nicest things you can say about a firewall product in a review is that calling it a firewall is selling it short.
But firewalls can’t be jettisoned entirely. They’re properly one element in your hybrid defense-in-depth strategy. And as eSecurity Planet explains, there are a number of different firewall types, many of which map onto the different types of network security we covered earlier:
  • Network firewalls
  • Next-generation firewalls
  • Web application firewalls
  • Database firewalls
  • Unified threat management
  • Cloud firewalls
  • Container firewalls
  • Network segmentation firewalls


Indian Cyber Army | Make IT Secure
We Are Indian We are Great
Enjoy…Stay Happy…Stay Secure…

Print this item

  Cyber Security tips for your business
Posted by: hackonology - 06-24-2020, 04:45 AM - Forum: Cyber Security Technics - No Replies

Cyber security attacks on businesses are becoming more and more common over time. It doesn’t matter how big or small your business is, you have to make sure you’re doing everything you can to keep it safe. You need to protect your data, your network, your customer information, and your reputation.

It’s a lot to think about, but if you’re just getting started we’ve got your back. Here are our top 11 tips for simple, practical steps you can take to help keep your business safe from attack. A printable version of this guide is available at the bottom of the page.

1. Install software updates
2. Implement two-factor authentication (2FA)
3. Back up your data
4. Set up logs
5. Create a plan for when things go wrong
6. Update your default credentials
7. Choose the right cloud services for your business
8. Only collect the data you really need
9. Secure your devices
10. Secure your network
11. Manually check financial detail

For more Detail visit my Article : How to protect my Business Online


Indian Cyber Army | Make IT Secure
We Are Indian We are Great
Enjoy…Stay Happy…Stay Secure…

Print this item

  WordPress Security Tricks to Keep Your Website Safe
Posted by: hackonology - 06-24-2020, 04:40 AM - Forum: Web & App Security - No Replies

I’ve heard many website owners complain about WordPress security. The thought is that an open source script is vulnerable to all sorts of attacks. Is that a fact? And if so, how do you secure your WordPress website? Luckily, the lack of built-in WordPress security is a myth. In fact, sometimes it’s the other way around – WordPress websites are much more secure than their online brothers and sisters.

Today, I plan to discuss quite a few simple tricks that can help you secure your WordPress website even more.

Steps to protect your Word Press Website :

1. Set up a website lockdown feature and ban users
2. Use two-factor authentication for WordPress security
3. Use your email to login
4. Rename your login URL to secure your WordPress website
5. Adjust your passwords
6. Automatically log idle users out of your site
7. Protect the wp-admin directory
8. Use SSL to encrypt data
9. Add user accounts with care
10. Change the admin username
11. Monitor your files
12. Change the WordPress database table prefix
13. Make backups regularly to secure your WordPress website
14. Set strong passwords for your database
15. Monitor your audit logs
16. Protect the wp-config.php file
17. Disallow file editing
18. Set directory permissions carefully
19. Disable directory listing with .htaccess
20. Block all hotlinking
21. Understand, and protect, against DDoS attacks
22. Update regularly for WordPress security
23. Remove your WordPress version number

For In-depth Detail visit my Article : Word Press Security


Indian Cyber Army | Make IT Secure
We Are Indian We are Great
Enjoy…Stay Happy…Stay Secure…

Print this item

  Unlock Pattern Lock via Factory Reset
Posted by: hackonology - 06-22-2020, 03:09 AM - Forum: Password Cracking - No Replies

This is the simplest trick to unlock locked Android device. However, the risk here is this method deletes all the data which are saved in phone memory. If you are willing to go for this here are the steps to be followed- 

Step 1. Switch off your Android handset and wait for some time. 
Step 2. Now Press '+' volume button and power button at the same time. 
Step 3. It will open your Android device in Recovery mode. Now select Factory Reset button from the menu. 
Step 4. Next when you get a list of options, tap on the 'Wipe Cache Partition To Clean Data'. 
Step 5. Finally, switch on your Android device and you are done!


Indian Cyber Army | Make IT Secure
We Are Indian We are Great
Enjoy…Stay Happy…Stay Secure…

Print this item

  Crack PDF Password using Google Chrome
Posted by: hackonology - 06-22-2020, 02:54 AM - Forum: Password Cracking - No Replies

You can use Google Chrome to remove the password from PDF. But, this method will only work if you already know the password. If you do not know the password, skip to the next method in this article. Chrome comes packed with a native PDF reader and does not require any additional plugin. You can open the password protected file in Chrome browser and then save it on your hard disk sans the password. 

Here are the simple steps:
1. Open Chrome browser on your computer.
2. Locate the PDF file you wish to crack the password from on your hard disk.
3. Drag and drop the file onto the Chrome Window.
4. Chrome will now begin to render the file. Enter the PDF file password when prompted by Chrome. You should now be able to see the file within the Chrome Window

5. Press CTRL + P (if you are using Windows PC. If you are using Mac, press CMD + P) to bring up the print menu.
6. On the left pane, under ‘Destination' press ‘Change' button.
7. Choose ‘Save as PDF' as the new destination on the popup Window.



This will be it! The new file will be saved on your hard drive and it will be without any password protection.


Indian Cyber Army | Make IT Secure
We Are Indian We are Great
Enjoy…Stay Happy…Stay Secure…

Print this item

  Crack ZIP File Password with CMD
Posted by: hackonology - 06-22-2020, 02:49 AM - Forum: Password Cracking - No Replies

To perform the Password Cracking, you need a CMD Line tool called John the Ripper. The CMD line tool is an open-source tool that is available for use onwindows, MacOSx and Linux. To use this tool follow these steps:

To begin with, you need to dowonload John the Ripper CMD line tool on your computer. Now unZIP the ZIP file you downloaded and save it in a fold with a unique name that you will remember, let's say "John".

Step 1: Now open the folder you just saved (John) and then click on the "run" folder. Then create a new folder and name it "crack" inside the "Run" folder. Here youcan use the "Ctrl+Shift+N" key to create the new folder.

Step 2: Copy the password-protected file that you want to crack and paste it in the newly created "crack" folder.
Step 3: Now, close the folders opened and then on the screen of your computer open the command prompt. In the command prompt key in thecommand "cd desktop/john/run" then click "Enter".
Step 4: In the command prompt type "ZIP2john.execrack/YourFileName.ZIP>crack/Key.txt" then click"Enter" to create a  ZIP file password hashes to be used to crack your ZIP file password. Remember to replace the phrase"yourfilename" in the command with the actual name for the file you want to crack.
Step 5: Using the password hash file, crack the ZIP file password by typing in the command "john–format=ZIP crack/key.txt" then click "Enter".The ZIP password will be cracked. You can now use the password to open the ZIP file.




Indian Cyber Army | Make IT Secure
We Are Indian We are Great
Enjoy…Stay Happy…Stay Secure…

Print this item

 
Latest Threads
How to bypass iPhone pass...
Last Post: hackonology
06-24-2020, 05:26 AM
Use VBA Code to Break Exc...
Last Post: hackonology
06-24-2020, 05:17 AM
Use ZIP to Break Excel Pa...
Last Post: hackonology
06-24-2020, 05:13 AM
System Security
Last Post: hackonology
06-24-2020, 04:57 AM
Network Security Methods ...
Last Post: hackonology
06-24-2020, 04:51 AM
Cyber Security tips for y...
Last Post: hackonology
06-24-2020, 04:45 AM
WordPress Security Tricks...
Last Post: hackonology
06-24-2020, 04:40 AM
Unlock Pattern Lock via F...
Last Post: hackonology
06-22-2020, 03:09 AM
Crack PDF Password using ...
Last Post: hackonology
06-22-2020, 02:54 AM
Crack ZIP File Password w...
Last Post: hackonology
06-22-2020, 02:49 AM

Forum software by © MyBB Theme © iAndrew 2016