Cyber Hoodies on Facebook

Find us on Facebook,please like the page and don't forget to follow....

Top methods on how hackers can hack facebook accounts in 2012.

Facebook is one of the most widely used social networking site with more than 750 million users, as a reason if which it has become the number 1 target of hackers.....

23 ways to speed Windows XP not only Defrag

Since defragging the disk won't do much to improve Windows XP performance, here are 23 suggestions that will enhance the performance and reliability of your PCs.....

How Antivirus Software Works

Due to ever increasing threat from virus and other malicious programs, almost every computer today comes with a pre-installed antivirus software on it, so its essential for you to understand the working of antivirus.....

Who is a hacker ........!

To reduce the hardness of reading, i've uploaded two videos regarding who the hacker is just watch this.....

Saturday, 24 November 2012

External IP and Internal IP


Sorry guys..i was too bsy with ma studies....so jst cant concentrate on my blog.....but from now on i hope it will work regularly.....ok lets move into todays topic
There are a couple of concepts you need to know before you can understand port forwarding. I'm going to make a couple broad statements that are almost always true. For simplicity lets assume they are true for now.
1.) Every device on the internet has at least one ip address. The IP address is a number that is used to identify a device. For more information on ip addresses refer to our What is an IP Address page.
2.) Every IP address is divided up into many ports. When one computer sends data to another computer, it sends it from a port on an ip address to a port on an ip address. For more information on ports refer to our What is a Port page.
3.) A port can only be used by one program at a time.
Now that we've got those general concepts out of the way let's talk about NAT. NAT is an acronym for Network Address Translation. NAT takes one ip address and basically breaks it into many ip addresses.

NetworkVisibility.jpg


Here the external ip address is broken into two internal ip addresses. The first ip address "IP Address1" is the gateway. While "IP Address2" is the ip address of the first computer. Take note that the router has two ip addresses. It has the external ip address, and an internal ip address which acts as the gateway for every computer on the network.
BasicNetwork.jpg


Excuse my rough drawing. Computers on the internal network can only "see" internal ip addresses. So computers on the internal network can not send data directly to a computer outside of the network. When a computer on the network wants to send data to a computer outside of the network, it sends the data to the gateway. Remember the gateway is the internal ip address of the router. The router then takes this data and sends it out to the computer on the internet. The router sends the data out of the external ip address. The same thing is true of computers on the internet. A computer outside of the network can not "see" a computer inside of the network. They can only "see" and send data to the external ip address of the router. The router must then decide what to do with this data. Lucky for us NAT takes care of most of the work for us. There are some programs that NAT was not designed to work with, those are the programs we need to set up port forwarding for. Okay take a deep breath! We are on to port forwarding.
Now that you understand the general concepts of a network, explaining port forwarding is easy. When a computer on the internet sends data to the external ip address of the router, the router needs to know what to do with the data. Port Forwarding simply tells the router which computer on the local area network to send the data to. When you have port forwarding rules set up, your router takes the data off of the external ip address:port number and sends that data to an internal ip address:port number. Port Forwarding rules are created per port. So a rule set up for port 53 will only work for port 53.
A port can only be used by one program at a time! Think of how this rule interacts with NAT. Well you've only got one external ip address on your router. When computer 1 is using port 500, it is using port 500 on it's internal ip address. If you have set up a port forwarding rule for computer 1 and port 500, the external ip address's port 500 is also in use. This means that you can only use port 500 on one computer on the network at a time. Using port 500 on two computers at the same time would violate the one program rule, and your data would get messed up. Most routers require you to specify an internal ip address to forward ports to, just for this reason. Some do not, so be aware of this. Port Forwarding rules will only work for one computer at a time!









Friday, 27 July 2012

'Innobuzz' CISE DLP - Honest Review by Cyber Hoodies

Hello Friends,
 

Today is about an exciting post.... yeah, that's 'Innobuzz', the largest and prestigious institute of Ethical Hacking and Cyber Security studies in India. You might have heard about this institute many times before but still some of you may not know how imperative it is for you if you are in ethical hacking field. I know many of you can "HACK". But you must agree that 'Hacking' cannot be taught. It's comes from within, the skill comes from within. But one hacker should must know the every rooms of network, you should learn every aspect of Internet that how does it work, If you know how Internet works only then you will able to maintain their security and even can break into the security. but it requires knowledge of network, it requires the knowledge of executing procedures and using the tools and scripts.So you must need to study for that. I know many of you are very keen to know what the Hack is.How does it work , how hackers break into computers and get access of a computer with out having the legal permission. That's very interesting and even fun for a hacker.

Wednesday, 23 May 2012

The Truth behind Facebook Hacking Software “007 facebook hack v1.0″

Are you looking for this software called “007 facebook hack v1.0″ also known as “James bond’s facebook hack” that can hack your friends facebook password in minutes? If yes then you are at the right place. According to this Software, you just need to input your friends profile id and the email id he has used on his facebook profile. Once you feed these two things to this software, it will automatically reveal the password of your Friend..quite Unbelievable.

Friday, 6 April 2012

Server Rooting

Server Rooting

Hello Buddies .. its a long time since i've posted a nice post sorry guys i was busy with my 12th board exams.just pray 4 me guyss! Ok let's move into our topic:-
Today,I will show you -" How To Gain Root Privileges In Linux Server."
But, let me tell you what is Server Rooting?

Monday, 19 March 2012

Beginners Guide To Hacking Wireless Networks

Hello Friends and Readers It has been a long time since I posted on Cyber hoodies
as i was busy with my 12 board exams.Today i am writing on basics of wireless hacking. So lets continue to our blog...............

Hacking WEP wifi passwords Basic Entry into a WEP Encrypted Network...........


Beginners Guide To Hacking Wireless Networks

Hello Friends and Readers It has been a long time since I posted on Cyber hoodies
as i was busy with my 12 board exams.Today i am writing on basics of wireless hacking. So lets continue to our blog...............


Hacking WEP wifi passwords
Basic Entry into a WEP Encrypted Network



This Tutorial explains EVERYTHING in detail So, it is quite long. Enjoy.


1. Getting the right tools
This Tutorial is in Backtrack 3.But you can Download The Backtrack 4.


Download Backtrack 4. It can be found here:
http://www.backtrack-linux.org/downloads/

I downloaded the Dvd iso and burned it to a Dvd. Insert your BT4 Dvd/usb drive and reboot your computer into BT4. I always load into the 3rd boot option from the boot menu. (VESA/KDE) You only have a few seconds before it auto-boots into the 1st option so be ready. The 1st option boots too slowly or not at all so always boot from the 2nd or 3rd. Experiment to see what works best for you.


2. Preparing the slave network for attack


Once in BT4, click the tiny black box in the lower left corner to load up a "Konsole" window. Now we must prep your wireless card.
Type:


airmon-ng


You will see the name of your wireless card. (mine is named "ath0") From here on out, replace "ath0" with the name of your card.
Now type:


airmon-ng stop ath0


then type:ifconfig wifi0 down


then:


macchanger --mac 00:11:22:33:44:55 wifi0


then:


airmon-ng start wifi0


What these steps did was to spoof (fake) your mac address so that JUST IN CASE your computeris discovered by someone as you are breaking in, they will not see your REAL mac address. Moving on...
Now it's time to discover some networks to break into.


Type:


airodump-ng ath0


Now you will see a list of wireless networks start to populate. Some will have a better signal than others and it is a good idea to pick one that has a decent signal otherwise it will take forever to crack or you may not be able to crack it at all.
Once you see the network that you want to
crack, do this:


hold down ctrl and type c


This will stop airodump from populating networks and will freeze the screen so that you can see the info that you need.


**Now from here on out, when I tell you to type a command, you need to replace whatever is in parenthesis with what I tell you to from your screen. For example: if i say to type:
-c (channel)
then dont actually type in
-c (channel)
Instead, replace that with whatever the channel number is...so, for example you would type:
-c 6
Can't be much clearer than that...lets continue...


Now find the network that you want to crack and MAKE SURE that it says the encryption for that network is WEP. If it says WPA or any variation of WPA then move on...you can still crack WPA with backtrack and some other tools but it is a whole other ball game and you need to master WEP first.

Monday, 27 February 2012

How To Secretly Steal Data Using USB

How To Secretly Steal Data Using USB

Step 1: Open Notepad and copy-paste the following lines and save it as autorun.inf ,

    [autorun]
    icon=drive.ico
    open=launch.bat
    action=Click OK to Run
    shell\open\command=launch.bat

Friday, 24 February 2012

Google Hack: Simple Google webpage hack

Hello friends. It has been a long time since I posted on my Blog. Today, I am writing on a small Google hack which is useful in customizing the Google logo. Using this Google hack, one can change the Google’s logo (present on Google search page) to whatever he wants. We will use a simple Greasemonkey script to hack Google webpage.
As an example, just check the above image. I have edited Google logo to “Vishnu”. Isn’t it great???
So, let us get into the method to hack Google webpage.

Thursday, 23 February 2012

10 reasons why PCs crash U must Know

10 reasons why PCs crash U must Know

Fatal error: the system has become unstable or is busy," it says. "Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications."

You have just been struck by the Blue Screen of Death. Anyone who uses Mcft Windows will be familiar with this. What can you do? More importantly, how can you prevent it happening?...........