Posts

Showing posts from August, 2016

Hide URL for phishing

Phishing : Hide URL [Tutorial] "How to hide a url | Chnage URL | Mask url" .While sending mail,  you have to include in mail, the link to your phisher page. So, instead of sending mail with actual url which can create a sense of doubt in victim's mind, we can hide the url. Dot.tk is an online service which enables you to hide/mask the url. So, whenever victim checks out this link, he will find the link suspicious. This can be detrimental for our hack. So, the best way is to make this link less suspicious i.e. to hide/mask the url. 1. So, go to  http://www.dot.tk/en/index.html?lang=en  to hide a url. 2. Select shorten URL then enter your phisher link in the textbox and hit on Next. 3. Enter the link you want to rename your phisher link to dot.tk domain name. 4. Now, you can send this masked phisher link to your victim. The victim will now find our phisher link less suspicious as we have hidden the actual phisher link using .tk domain. So friends, I hope you are

How To Remotely Access Another Computer

How To Remotely Access Another Computer #1  Method: Remote Computer Access Using Google Chrome First Download the extension  Chrome Remote Access  in your  Google Chrome . Now this app will get added to your chrome and you can see it at rightmost top corner. Click on it and click  continue . Now it will ask to  allow access to data ,proceed with allowing access to it. Now it will ask ou to c onnect to another computer  or  share your computer . Now if you click on share this computer then it will generate a code. Send the code to the partner by whom you want to accessed your computer. Note that other computer must have same app installed on its computer. Now your partner will enter he code and your desktop will get share to him exactly same as you can see yours. By this anyone having access code can  access your computer remotely  and even you can access someone’s else computer by having access code of it. #2  Method : Using  Team Viewer Team Viewer is

Botnet

Image
Botnet A botnet or robot network is a group of computers running a computer application controlled and manipulated only by the owner or the software source. The botnet may refer to a legitimate network of several computers that share program processing amongst them. Usually though, when people talk about botnets, they are talking about a group of computers infected with the malicious kind of robot software, the bots, which present a security threat to the computer owner. Once the robot software (also known as malicious software or malware) has been successfully installed in a computer, this computer becomes a zombie or a drone, unable to resist the commands of the bot commander. A botnet may be small or large depending on the complexity and sophistication of the bots used. A large botnet may be composed of ten thousand individual zombies. A small botnet, on the other hand may be composed of only a thousand drones. Usually, the owners of the zombie computers do not know that