Monday, December 15, 2014

PHPBB.com Hacked

PHPBB official website (www.phpbb.com) has been compromised...


PHPBB( PHP Bulletin Board) is an internet forum package in PHP language. Recently on Sunday, December'2014 it was seen that the official website for PHPBB was compromised and the site was immediately put down for maintenance.

This is what the index page of PHPBB.com looks like after the attack. The maintenance notice is put down by the PHPBB officials clearly stating about the attack and also conforming that the personal PHPBB forums are safe and were not being compromised by the attack. You can view the PHPBB website(www.phpbb.com) for the Downtime Notice.


phpbb.com downtime notice after the attack


As stated, it would take take several days to rebuild the system back.
The investigations on the case are going on, but for now there are no signs of how and by whom the attack was done.


Top 10 Hacking Quotes

Get to know about the best quotations about Hacking from the list prepared by us...


We have prepared a list of top quotes about Hacking by top known hackers, Anonymous group and others, which would motivate and encourage one, practicing hacking or even wishing to do so, at any stage in their life.



1. The quieter you become, the more you are able to hear...
                                            - Kali Linux


2. Never tell everything you know...
               - Roger H. Lincoln


3. I was addicted to hacking, more for the intellectual            challenge,the curiosity, the seduction of adventure; not for    stealing, or causing damage or writing computer viruses.
                                       - Kevin Mitnick


4. Give a man a truth and he will think for a day. Teach a man to  reason he will think for a lifetime.
                      - @Anon Group


5. But we are HACKERS and hackers have black terminals with green  font colors. 
    - J. Nunemaker


6. We are Anonymous. We are Legion. We do not forgive. We do not forget. Expect us.
     - @Anon Group 

7. Sometimes I feel like Giving Up! Then I Remember ~ I have a Lot of MotherF*Ckers to Prove Wrong.
               - Pcbots Labs

8. When solving problems, dig at the roots instead of just hacking at the  leaves. 
   - Anthony J. D'Angelo

9. Hackers are actually good, pleasant and extremely intelligent people who could keep computer criminals on the run.
                                    - Ankit Fadia

10. There are a thousand hacking at the branches of evil to one who is striking at the root.
      - Henry David Thoreau


Some other quotes - 

*  Hacking is not a crime, it's a profession till the time you play with it safely.


*  There's a hack for everything. 


*  If you rate a programmer or coder 7.5/10 on knowledge basis, you  would definitely have to rate a hacker 10.


* Hacker is just not about hacking. This is about making too. 
   (shared by @arc)

If you have some really interesting quotes about Hacking, do share.



If you  liked reading this article, click on the share button. For any further clarifications and queries, do post in the comment box below. 




Sunday, November 23, 2014

How to block websites directly from your PC?

Learn how to block or restrict the access to a particular website, or even redirect a person to a different website....


In this hackorial (hack-tutorial), we'll be dealing with the practicals of Desktop Phishing. To know about Desktop Phishing, kindly go through our tutorial on this link http://hackorial.blogspot.in/2014/02/desktop-phishing-learn-to-block.html. To accomplish our task of Desktop Phishing, we'll be working with the hosts file which can be found in the various versions of windows Operating System. We can quickly get to our hosts file in the path (as in win 7, vista, win 8, 8.1) -> C:\  --> Windows  --> System32  --> drivers  --> etc  --> hosts
My hosts file looks like this

hosts file
This is how hosts file looks 


What basically hosts file used for, is to facilitate the task of name resolution or in simple terms the task of mapping the IP addresses to the host names. It fastens the task of name resolution as the entry for the IP address to host name mapping resides at the OS itself, so the DNS resolver need not to send request to the DNS server and wait for the response, and then open the website.

So, lets practically think what all can we do with this hosts file. If we just make an entry in our hosts file that maps a wrong IP address to a host name. So what exactly happens when someone browse that webpage for example www.rtoon.com and in turn that guy is redirected to any other site for exmple www.uhacked.com, or he is blocked from accessing www.rtoon.com if wrong IP address is mapped to it. We can do much more.

Follow these simple steps to block any website or redirect a website to a different webpage-

Step-1 Run notepad as administrator. (Note: not any editor only Notepad with admin privileges as its not easy to edit the hosts file directly)

Step-2 Open the hosts file from Notepad.

Step-3 Find the IP address of the website you want the victim to get redirected. For this open cmd (Win+R , type cmd, enter) type ping www.hackorial.blogspot.com

Step-4 Most important step of editing the hosts file. At the end of the file we can insert our entry by first typing the IP address we just got from ping command in the cmd, and then with a single space followed by the host name. Here host name refers to the website name that user opens and gets redirected to a different page.

Step-5 Save the file (CTRL+S) and restart the web-browser to see the results

For example the host name entry in the hosts file is facebook.com, so whenever the victim opens facebook.com, Our page hackorial.blogspot.com gets opened in the browser. And now the victim can never access facebook.com unless the hosts file is edited again. This is the magic of so called hosts file.

For strictly blocking any website without redirecting to a different website, you can do the following entry in the hosts file
127.0.0.1  anywebsite.com

You can anytime revert back to your original settings by deleting the entries or by commenting the entries in the hosts file by using # in front of each line. Its advisory to work with hosts file with proper understanding.

So, this was one of the practicals of Desktop Phishing in which we saw how to block any website directly from your OS.

Catch out this video tutorial to get step-by-step lesson for accomplishing the task of Blocking the websites.




If you really liked reading this article, click on the share button. For any further clarifications and queries, do post in the comment box below. 




Tuesday, October 14, 2014

Snapdeal.com Hacked !!! 'Payback to Indian Kiddies' says the message...


Snapdeal -  One of the top eCommerce based website of India was recently defaced by Pakistani hackers.


Snapdeal.com official blog section being defaced by Pakistani Hackers


As the Webmasters of these popluar websites including flipkart and amazon are busy in facilitating the customers with bunch of deals and offers, meanwhile paving a way to Hackers to breach into the systems easily.

The Blog section of the snapdeal redirects you to the hackers page

And yes this time the target was Snapdeal. Snapdeal's official Blog page was being hacked. And as the message clearly says its being hacked by a Pakistani Hackers Group named 'Pakistan Haxors Crew'.

What more, The About us section was also hacked and defaced with a message like this "Payback to Indian". Woooah...It clearly shows that the defacement of the website was a sign of revenge and payback.

The defaced page was thereafter quickly removed by the Snapdeal Team, and there was a message of the "the site is down for maintenance" on the blog section of the website, which now when seen redirects you to the products page of the website whenever you click the blog hyperlink : http://www.snapdeal.com/products/sports-hobbies

Snapdeal quickly removed the defaced page and the blog section shows the maintenance message

Now when you click the Blog link it redirects you to this page as of 15-10-2014  00:02 (IST)


You can find the mirror of the defaced page here : http://zone-h.com/mirror/id/23135906?zh=1

On one side the celebration of Diwali continues , other side seems to be a cold one with the cyber war going on between the two countries. Let's see what's next, as its said WINTER IS COMING, there's surely more to come soon.



Friday, August 22, 2014

XIAOMI PHONES SECRETLY SPYING USERS DATA

Xiaomi mi3 - One of the most selling phones today, fitting the budgets of the middle class population has no doubt created a hike in india, going out of stock in just 38 minutes or so on the first day of its launch in India.

Priced just 14K, built and designed beautifully with all the latest features and best configurations matching those of an high end phones from the brands like Google, HTC, apple etc. has already made a place in the indian market as the current scenario says.

Xiaomi Mi3
Source: www.xiaomishop.com
But there is a BIG question to it that most of the users in India and other countries are concerned about??? Many users are concerned and are in dilemma about the Chinese Government using their country's manufacturers to spy users data over seas.

Friday, May 2, 2014

Gmail Hack

Learn how to geek with Gmail...


This article doesn't deal with hacking gmail accounts only deals with tricking and geeking with the gmail accounts. One thing that is surprisingly there in the gmail, which I noticed a couple of days back, is that you can use your single gmail account differently as multiple accounts.


Making it easier, see nowadays whenever visiting any website you are asked to sign up, for the full access to all the services and features offered by that website. But there are cases when the sign up process fails and you often get a message "You are already a registered member of this site" or "This email-id is already been taken". Therein either you have to reset your password and follow those same freaking steps or signup with a different id. Here i got a remedy for it, whether you have already registered on a website and want to register again, or there is a promotion or free services on a website which can be delivered to a single email-id, and you wanna grab it multiple times without making multiple id's. Here is the trick for you all, Geeks. I don't know whether it's a loophole in Gmail or they have done it purposely, it's totally none of our business till the time we are being benefited by it. Look, the thing is you have dot (.) in your Gmail ids, right? Now try out one thing, even if you remove this dot from email id and login to your account, you are successfully into your account without getting any error of wrong email-id or so. Cool, right? I think now you have got it, what more can be done with this simple trick.

Image illustrating the login process to a single Gmail Account differently

Monday, March 24, 2014

Top 5 ways to get more traffic, viewers, followers and likes on any of the social media or personal websites and blogs

Learn to get free likes on your facebook pics/comments, more followers on facebook fan page, twitter, google plus, instagram, more views on youtube, more traffic to your websites and blogs....


Everyone today wants fame in the social networking front. Whether we talk about getting more and more facebook followers on their business fan page, or likes on their facebook pics and comments whenever there is a  facebook competition/challenge to get maximum likes, or its about the followers on google plus, twitter, instagram or views on youtube, or about getting traffic to your blogs or websites. Some or the other way every netizen today wants a way to excel high so as for the money cause or just for the fame in this ever increasing internet marketplace.
So here The Hackorial brings to you some of the easiest ways to gain fame, through which you can easily get 100s and 1000s of likes and followers on any of the social networking sites daily, and the amount of likes and followers you get depends on you.
The Hackorial fb Fanpage
The Hackorial Facebook Fanpage as an illustration
We have prepared our Top 5 list of best sites which will give you 100% result for sure. Try it out geeks.

Friday, February 28, 2014

How to Hide Folders in PC without any software?

Learn the simplest way of Hiding Folders in your PCs without using any software...


Everyone has something or the other, important data which they want, to be hidden in their Personal Computers. Hidden from their buddies, siblings or even from their Parents and Teachers. Important data may be of any kind, whether it is important documents, Passwords Storage file, or any personal stuff (you know what i mean). Now the thing is, how to hide it ?? As anyone today would say, There are various softwares available which will serve you with this purpose. The best ones are TrueCrypt, Folder Lock and various other available online. But who has time downloading the software, then doing its freaking installation process and all. Not only that, the software is visible to everyone (in most cases), henceforth what happens, is that your buddies or siblings gets even more excited and crazy knowing whats there hidden in your naughty mind, i mean the hidden folders. So, the alternative left is, doing our job manually. Yes, here we are, with the easiest way of Hiding your folders manually without any software.                                                      
Follow this Step-by-Step guidelines :

Wednesday, February 26, 2014

Watch blocked Youtube Videos at schools and colleges

Learn to unblock the Youtube videos protected by Websense at schools and colleges...


Youtube is one of the most popular site for watching online streaming videos of all genres. And almost everyone, whether it is a school kid or an adult, every age group enjoy visiting this site very often. In schools and colleges, it is often seen that the Youtube is banned by Websense or any such service. Sometimes the complete access to the site is forbidden or in other cases Youtube do opens well but the search is filtered and not all videos are accessible. So here we bring out the trick for you to access those videos which are protected, provided that you have access to Youtube i.e. Youtube opens on your connection.

So here we are with the most easy way to unblock the protected videos on youtube and the best part is that no software is required. In crux, you just have to edit the URL of the video.

Friday, February 14, 2014

Best Crazy Facebook Tricks 2014 : Trick 1

Play with Facebook by posting your status Upside-Down...



ɥɥɥo¡¡¡˙˙˙ɟʇʍ ʞooqǝɔɐɟ pǝɥsɐɹɔ 


With this trick you can post your status or even chat in the upside-down text format( 'әp!spu uʍop' ). Isn't it crazy and cool??

Generally it's quiet boring checking out your buddies' same boring status updates every now and then, Similarly your own status goes out with less likes and comments on it as no body else too pays off enough attention until and unless it's somewhat attractive and unique. Do it something cool to enhance and attract your readers, i mean your facebook friends to view your status and which can even force them to comment on it. And also enjoy your chat with the same.

Not only the trick makes your status UPSIDE_DOWN but you can make your text go crazy like this 'ţħє ħДςķόяĬДĿ' 'Thë hÅckØrïÅl' 'тнє нα¢кσяιαℓ',etc....



Here is the simple trick for it ~

Tuesday, February 11, 2014

How to remove Write-Protection of the Pen Drive?

Learn to bypass Write-Protection of the Pen Drive in seconds...


This is not at all hacking or something like that. Its just a simple trick which can remove the write protection of the pen drive.
.
Sometimes, when we copy some data into our pendrive from our friend's PC it shows an error saying "The disk is write-protected" etc etc...

This dialog box comes out when you try copying files to the Write-Protected Pen Drive


I also came across the same incident today with a friend as my friend had used the write protection so i tried this trick and copied the folder into the pen drive.
.
Check it out guyz 


.
Step 1) Start Menu -> Run -> cmd.exe
Step 2) diskpart
Step 3) list disk
Step 4) select disk 1
Step 5) Attributes disk clear readonly
Now i can easily copy the data into my pen drive....... :)
.
Also if you want the disk to be write protected as you wanna annoy any of your friend because "har ek friend kamina hota hai" (slang in hindi for friends, meaning 'Every friend is a rascal' )
You can use this command in step 5
"Attributes disk set readonly"
.
Have fun guyz 



If you really liked reading this article, click on like and share button. For any queries and doubts, do comment. Stay tuned to The Hackorial for more tutorials.

#MYK



Friday, February 7, 2014

Remote Access to your friend's PC

Learn to connect to your partner's PC remotely...


Can you connect to your friend's desktop without your physical presence there and access it, either to help them out solving their doubts or for some other purposes, right away from your residence onto their PCs?

Is there any way out guys...?? 
By the way, yesterday my friend had some problem in hiding his folders and it was urgent for him to do it asap to protect some data from his younger brother. He was in Bangalore and i, in Delhi. There was no one to help him out. He searched on internet but some or the other problems occurred in his PC, where he was unable to resolve out the issue. Then he contacted me and I had the solution to this. I told him to install TeamViewer in his PC and I already had it installed in mine. With this setup done, I was remotely connected to his PC in seconds and resolved out his issue.

So, guys this is what I was talking about. With TeamViewer you can remotely connect to your friend’s device(PC or laptop) and help them out in their issues, by using their device as if you are using yours in front of you.

To get started, just visit www.teamviewer.com and download TeamViewer, Its free! Then install it in your device and tell your friend to do it too. You don't need to worry about the installation process, its damn easy. Just open the downloaded setup file, and click on Next, Next and OK. Your installation is done. Now, open the TeamViewer you just installed on your device and tell your partner to open it too. Now ask your friend for the Id and Password provided by Teamviewer. Just copy paste the Id and Password onto your Teamviewer display and click on 'Connect to partner' button, You are done. Now your are connected to your partner's device. You'll see their screen on your device and can use it just the way you are using yours. Also, check out the tutorial on The Hackorial for Step-by-step setting up the TeamViewer connection.

This is how TeamViewer comes out on your device


With various other softwares facilitating the concept of Remote Connection, TeamViewer stands out ahead of all because of its excellent and easy-to-use services for the users. After its popularity and name in the market, still some drawbacks knocks at it. Let's see both, the advantages and disadvantages.

Pros:
1. Great software to connect with partners and help them in their problems.
2. Connect to any part of the world within seconds.
3. Its free! Most of the much used features are totally free.
4. Add-on feature of Video Chat and messenger.
5. Its secure, no-one can meddle in your connection.
Cons:
1. Can't use it with hacking mindset, requires TeamViewer Id and Password to connect, which keeps on changing on each new connection. Don't think of exploiting your friend's device on connection, they may quit the connection any time.
2. Needs high internet connectivity from both the sides to enjoy the experience fully.

Try it. Its too easy to get started and surely you'll love the experience.
Install it today itself and tell your partners to do it too.
Help and get helped remotely all over the world in seconds with this smart software.

If you really liked reading this article, click on like and share button. For any queries and doubts, do comment.


#SS




Thursday, February 6, 2014

How to block websites with Desktop Phishing?

Learn to block websites and much more...


Its time to do some Desktop Hacking or instead Desktop Phishing...
Do you know what's that??? Before starting practically lets see what exactly is Desktop Phishing. In short and simplest way Phishing is a method to acquire some sensitive and secure credentials or information from some one like passwords,usernames,credit card details,etc by appearing to them as a genuine or trustworthy person.By genuine means that you are forcing your buddies to trust you, and after gaining their trust you try to victimize them.That's what is so called Phishing.

This is the icon of fake facebook login page on the desktop

With phishing you can victimize any1 with your social tricks n get their credentials easily...that means you can hack their emails for eg. gmail, yahoo, hotmail,etc or any of the social networking sites as well like facebook, twitter,etc.

The process of Phishing involves making of a fake page of the site for eg. facebook.com, then you convince your victim to enter their credentials...As soon as they enter the login details and hit enter to proceed...you get their credentials on ur email-id...This is how it works...

This is the fake login page as clearly depicted by the URL


Desktop Phishing is an advanced type of Phishing attack.In normal phishing attack one can easily get to know about the fake login page on seeing the URL bar.But in desktop phishing this drawback is totally eliminated...What happens is that the hacker makes changes in the host file(C:\Windows\System32\drivers\etc\), and the send compressed file of this to the victim as soon as the victim opens particular site for facebook.com, he/she gets directed to the fake page and the domain name(facebook.com) remains same as typed by the victim...n the victim doesn't come to know that its a fake one...So doing changes in the host file n following the same procedure of the phishing is so called Desktop Phishing...

Stay tuned to The Hackorial for the tutorial on the practical application of Desktop Phishing i.e. Blocking websites

#SS