Ofer For You (1)

Wednesday, 11 December 2013

How To Hack A Satellite


How To Hack A Satellite

In a few days we have heard of a couple of satellite attacks by hackers meanwhile surfing on the web I came across more than one occasion in satellite photos reporting strange structures that we asked the real intended use.

The successful attacks occurred in 2007 and 2008. The more serious of the two happened in ’08 when NASA had control of the Terra EOS earth observation system satellite disrupted for 2 minutes in June, and then a further 9 minutes in October. During that time, whoever took control had full access to the satellites’ systems, but chose to do nothing with it. The second hack affected the Landsat-7 satellite on two occasions, one in October of ’07, the other in July of ’08. Unlike the Terra OS incident, this hack did not see control taken away, but access was gained.
We read that Chinese hackers have taken control of NASA satellites for 11 minutes and we know how the news is disturbing. The satellites are a vital component in the process of information management, a stream of bits passes on our heads, no matter whether its a talk show or to military communications, they are there and hackers and militar government know it. It is a new challenge, access and control this data.
What is going on in our heads? The phenomenon of hacking satellites seems to be fashionable. Let me suggest a precious reading (Hacking a Bird in the sky), a proof of concept made by the popular security experts Jim Geovedi, Raditya Iryandi and Raoul Chiesa that have approached the problem in the past.
What if they could get hold? Which scenario we face if they were able to govern satellite communications?  The answer is obvious as terrifying.
But the satellites are really vulnerable? Current satellite systems are vulnerable to several type of attacks but the problem is known and from several parts is working to improve its security.
Without going deep in the topic we can enumerate the main threats for those systems:
  • Denial of Service (Jam Uplink, Overpower Uplink, Jam Downlin)
  • Attack to Orbital Positioning (Raging Transponder Spoofing, Direct Commanding,Command Replay,Insertion)
To show e sensible interest on this issue by Governments and cyber criminals Congress of the U.S has made a report entitled “U.S.-CHINA ECONOMIC AND SECURITY REVIEW COMMISSION“.
Malicious cyber activities can be carried out to either destroy the system rendering it useless, or to exploit it to access to sensible informations breaking intelligence actions. Interestingly, the report points to the use of ground stations outside of the U.S. to control satellites as weak points. The reason being they use the Internet for data access and communication, not a closed link.
Which are the conclusions proposed in the report ?
 • China is one of the top space powers in the world today.The prestige of space exploration and the national security benefits of space systems serve as primary motivators for Chinese decisionmakers.
• China views all space activities in the context of ‘‘comprehensive national power.’’ This concept includes many dimensions, but military aspects are fundamental.
• China’s civil space programs have made impressive achievements over the past several decades.
• China seeks new opportunities to sell satellites as well as satellite and launch services in international commercial space markets. Chinese firms’ prospects for greater success in this field remain uncertain over the near term. However, China’s international space-related diplomatic initiatives and their firms’ ability to offer flexible terms on sales to developing countries may provide additional opportunities.
• In the military sphere, China appears to seek ‘‘space supremacy.’’ The PLA aims to implement this policy through two tracks. First, they increasingly utilize space for the purposes of force enhancement. The best example is China’s integration of space-based sensors and guided weapons. Second, they seek the capabilities  to deny an adversary the use of space in the event of a conflict. To this end, China has numerous, active, counterspace weapons programs with demonstrated capabilities. China’s military space and counterspace activities are part of a larger strategy for area control.
But are we sure that it is all China’s fault? Are they the only Country interested in the control of satellite communications? Of course not.
I leave you with a little mystery … In recent days the media spread the news of the discovery of satellite images which were taken strange structures in the Chinese desert.
What are they for? Some experts believe that these are structure in use for satellite calibration. So far so normal. This morning a collegue informed me that coordinates reported in the article related to NASA satellite hacking are related to the area where the strange calibration structures has been discovered. Amazing!!  The Chinese hack a NASA satellite to calibrate or to test it on presumed internal calibration structures? Journalistic error or what else? Something is not right!

Still Having Problem..!!! Connect with Admin Kunal Vohra

Download Our Official Android App & Get Free Internet*

"The Hackers Street"

For Daily Updates

Monday, 2 December 2013

How to steal Facebook Authentication cookies

How to steal Facebook Authentication cookies



Connect with admin : Kunal Vohra

How to hack a facebook account – or, basically how to hijack php sessions. Yes – this is old news – yes its a common vulnerability – but you get a better idea for what it is and how it works when things are explained in detail (with screenshots!).

Before we begin, however, I want to re-emphasize that it is VERY EASY to protect yourself against this sort of attack. Facebook supports HTTPS, so when you browse facebook (or twitter for that matter) or if you have it bookmarked – please make sure you’re using HTTPS:// rather than HTTP:// in the URL at the very least, if not using a VPN solution for further encryption. Also, if the ‘victim’ logs out of facebook, the attackers session becomes invalid – so it’s a good practice to actually log out of facebook and log back in again rather than using the ‘remember me’ checkbox.

Facebook like many sites operates using authentication cookies. Their auth cookies contain a variety of information, but for our purposes this is irrelevant. Here is a sanitized cookie for reference:



You can see the ‘lxe’ field is the login. We haven’t done any further research into what the various other fields mean, but using facebook without any kind of security you’re both leaking the email address used for your login and the session cookie.
First thing you’ll want to do is fire up your favorite packet capture application. For this example we’ve used Wireshark:
Next, set the filter in the top left to ” http.cookie contains “datr” “. This should show you only packets captured which contain the cookie we’re looking for. You can see that in this screenshot we’ve already captured a cookie.
Once you’ve found a suitable cookie, you can copy it into the buffer by right clicking on the cookie line, and clicking Copy -> Bytes (Printable Text Only)
Next you’ll want to open up firefox. You’ll need both greasemonkey and the cookieinjector script.
Simply browse to facebook – make sure you are not logged in:
Hit ALT-C to bring up the cookie injector dialog box:
Then paste in the cookie!
Hit refresh and – VIOLA! you’re now logged in as your victim! Now this doesn’t give you access to their credentials, this is about the equivalent to walking up to their workstation while they’re away from their desk and using facebook.
Neat huh? Pretty easy too. I smiled big when we demo’ed the attack in our lab – its old, sure, but being successful is always a good feeling!





Still Having Problem..!!! Connect with Admin Kunal Vohra

Download Our Official Android App & Get Free Internet*

"The Hackers Street"

For Daily Updates

Thursday, 14 November 2013

How to Remove Passwords From RAR Files?

How to Remove Passwords From RAR Files?

Option 1: Create a New Archive File Without Password Restriction

As a password can be set to protect the file from unauthorized access, when the file is double-clicked, the user is prompted to enter a password. But if you entered a wrong password, the file remains locked. Well, you can remove the password restrictions on RAR files by creating a new archive file.

1. Double-click the RAR file to open.

2. Enter the password when prompted. The contents of the file are then extracted.

3. Right-click the extracted file and click “Add to Archive.” The “Archive Name and Parameters” window launches.

4. Click the “Advanced” tab and then click “Set Password.”

5. Empty any text in the both password boxes in the Set Password window.

6. Click the “OK” button to save the settings. A new RAR archive file is created without a password.

Option 2: Remove the Password with a RAR Password Recovery

When you can not still access into the rar files with password protected, at this time you can take a rar password recovery tool to get in. RAR Password Unlocker is proved to be a helpful tool when you forgot WinRAR/RAR password and cannot open the RAR archives. It can recover RAR password at high speed via 3 attack options: Brute-force, Brute-force with user-defined Mask and Dictionary.

Rar Password Unlocker ==> http://www.passwordunlocker.com/rar-pass...overy.html

1. Download, install and launch RAR Password Unlocker.

2. Click “Open” to load your RAR file. Click “Open” again to continue.

3. Select the type of attack you want to use to retrieve your RAR password: brute-force attack, brute-force attack with mask or dictionary attack.

4. Click “Start” to retrieve your RAR password. The process may take several minutes to complete.

5. Click “OK” when you remove WINRAR password to exit RAR Password Unlocker.



Still Having Problem..!!! Connect with Admin Kunal Vohra
Download Our Official Android App & Get Free Internet
"The Hackers Street"
For Daily Updates

Tuesday, 12 November 2013

How to Increase Youtube's videos buffering speed?

How to Increase Youtube's videos buffering speed?

Hi there guyz i am Kunal vohra, once again with you people with a new trick in which I'll be showing you that how can you increase youtube's videos buffering speed without using any software. This trick is suitable for those users as well who have slow internet.This process don't take too much time.


Disclaimer: 
             H2K will not be responsible for any damage caused by you to your device. All the posts present in this blog are for educational purposes only. Try at your own risk.



Follow the steps Below:

Step 1: Open Run by pressing Windows key + R, or by going to start menu and searching for Run.


Step 2: Now in the Run type "system.ini" without quotes and hit enter.


Step 3: Now a Notepad file will appear. Like this (Picture given Below)
Copy the code given below and paste it in the notepad file which is already opened. Paste the code below [mci]
========================================================================
page buffer=1000000Tbps



load=1000000Tbps



Download=1000000Tbps

save=1000000Tbpsback=1000000Tbps

search=1000000Tbps

sound=1000000Tbps

webcam=1000000Tbps

voice=1000000Tbps

faxmodemfast=1000000Tbps

update=1000000Tbps
================================================================================= 
After pasting the code it will look like this

Step 4: Now close the notepad file and save it. If it is saved, then just restart you'r PC or Laptop and distinguish between the speed ;)

Now You are all done. If you are facing any problem saving this notepad file and having an error saying you "Access is denied" then just simply proceed to Step 5.

Step 5: Search for Notepad in the start menu, when it appears right click on it and select Run as administrator

Notepad file will be opened again. Now press Ctrl+o. And in the search menu write system.ini (File is located in C ==> Windows) and open that file. 
After the file is opened in the notepad again, Copy the code given above and paste it in the notepad as shown above. And save the file. Now restart your PC and observe the changes in the speed of the Youtube's video buffering.

Thanks

Enjoy!!!

Regards

Still Having Problem..!!! Connect with Admin Kunal Vohra

Download Our Official Android App & Get Free Internet*

"The Hackers Street"

For Daily Updates

Tuesday, 5 November 2013

BlackBerry May Stop Smartphone Business


BlackBerry may abandon smartphone business
BlackBerry's new interim CEO John Chen hints that the company would be focusing more on providing software than coming up with new devices.

The device that was so addictive that it was dubbed the "CrackBerry" might not have much of a future: Its new chairman and interim chief executive says he wants to emphasize software and services - not devices. That could mean the company might ultimately get out of the business of selling smartphones.

The possible change in strategy comes as Fairfax Financial, BlackBerry's largest shareholder with a 10% stake, said Monday it won't buy the struggling smartphone company and take it private. It said that instead Fairfax and other investors will inject $1 billion as part of a revised investment proposal.

CEO Thorsten Heins is stepping down and John Chen was appointed chairman of BlackBerry's board of directors and interim CEO. Chen, the former CEO of software data company Sybase, said that BlackBerry employees need to start thinking differently about the company and accept that "we're really not in phones but we're in phones for software, for services.''

Chen said he wants to find a CEO with a strong software and services background.

He noted that BlackBerry Messenger, BlackBerry's popular messaging application, has been downloaded by more 20 million users since it became available on Google's Android and Apple's iOS platforms last month. BlackBerry Messenger, or BBM, works like text messaging but doesn't incur extra fees.

"I'd like to find somebody to help me monetize that," Chen said.

Colin Gillis, an industry analyst at BGC Financial, questioned whether that's possible.

"It's like Apple saying we're going to stop making phones and we're going to become an iMessage company," Gillis said.

Gillis said BlackBerry might indeed stop selling phones but noted BlackBerry is already obsolete. He doesn't think current BlackBerry users have to worry though.

"They are not just going to shut the lights off," Gillis said.

The decline of the BlackBerry has come shockingly fast. In 1999, BlackBerry became a game-changing breakthrough in personal connectedness. It changed the culture by allowing on-the-go business people to access wireless email. President Barack Obama couldn't bear to part with his BlackBerry. Oprah Winfrey declared it one of her "favorite things.''

Then came a new generation of competing smartphones, and suddenly the BlackBerry looked ancient. Apple debuted the iPhone in 2007 and showed that phones can handle much more than email and phone calls. In the years since, BlackBerry been hammered by competition from the iPhone as well as Android-based rivals.

This year's much-delayed launch of the BlackBerry 10 system and the fancier devices that use it was supposed to rejuvenate the brand and lure customers. It did not work. Waterloo, Ontario-based BlackBerry recently announced 4,500 layoffs, or 40% of its global workforce, and reported a quarterly loss of nearly $1 billion.

"Sadly I think they are already out of the business after the BlackBerry 10 flop," said Mike Walkley, an analyst with Canaccord Genuity.

Walkley said he believes BlackBerry will focus on its mobile device management business, which allows IT departments to manage different devices connected to their corporate networks.



Still Having Problem..!!! Connect with Admin Kunal Vohra

Download Our Official Android App & Get Free Internet*

"The Hackers Street"

For Daily Updates

Wednesday, 30 October 2013

COMPLAINT BOX:

 "I Speak India"

INTRODUCTION:

Today, in this era where everyone is so much busy in their schedule that they don’t have any time to work and to make their society to work properly. All what they just can blame the government for the condition and the problems, they are facing. If ever they are insisted to report to the government officials, there is a single argument that “We don’t have so much TIME”.
This reason not only affects them but also a great hurdle in the development of the country. Government wants to work but don’t know what the problems, countrymen are facing.
This is where the idea of an ONLINE COMPLAINT BOX comes into the picture. This is an online portal for all the country persons where they can report their complaints online and need not to go to the offices for reports.
This complaint box will be available all over India, with a control over the Indian Government Bureaucrats.


PROJECT ANALYSIS

This project is made keeping in mind that everyone should be able to operate this in a simple and lenient manner. If a layman with no computer knowledge can even work on this by just following the instructions.

 LANGUAGE USED - In this project we have preferred to use

ANDROID & PHP to work. As in today’s scenario, android OS have captured the market and everyone is preferring android, so we will be developing app in ANDROID & PHP


PROJECT WORKING

In this project, there will be following MODULES:

1. Signup Panel
2. Login Panel
3. Lodging Complaint
4. Chat box panel
5. Responses from the Officials

1) Signup Panel: This panel will provide a form with columns asking the details about user, like “First Name”, “Last Name”, “Date of Birth” etc.
After all these details there will be a confirmation E-Mail for all users. In this panel, user can have a UNIQUE USERNAME & PASSWORD, which will be used while logging in.
All the entries will be inserted in a database and can be viewed to the administrator only.


2) Login Panel: This panel will let the user to get into the complaint forum and after logging in with their unique USERNAME & PASSWORD only then he/she can lodge any complaint. There will be an option of FORGOT PASSWORD, in case user forgot the password.


3) Lodging Complaint: This panel will be the actual and main panel where the user will get into the profile and here will be able to lodge a complaint which ever he/she will be facing in his/her locality, society.
There will be a commenting section for all the other users of same region which can suggest some ways to cope up with all these problems.
All the complaints will be available to the administrator only of their area.

Example: A person for KURUKSHETRA (HARYANA) lodged a complaint about “Water Supply” in locality, ADMINISTRATOR from KURUKSHETRA (HARYANA) can view that particular complaint not all other ADMINISTRATORS of other part.


4) Chat box: This feature allows all the registered users can chat and can discuss their problems in according to the society and we have also introduced a “hash tag” feature to this portal in which if any user want to know that how many people are facing such problem, he/she can type there and will get to know all those persons who are facing that problem.


5) Response from the Officials: All the complaints will be stored in the database which can be viewed only to the ADMINISTRATOR; he/she can only be able to view all the complaints only of their region and can respond back to them. They can also view all the suggestions given by all the other users in order to help in the decision. With all these we have created a project keeping in mind that ADMINISTRATOR should not get hampered and can work with a relaxed mind.

Although there is no such ONLINE COMPALINT BOX available to the people of
India till now which could hear them online.


ADVANTAGES OF ONLINE COMPALINT BOX

This Complaint Box is created by keeping following advantages in mind:

1)     It will save time of all the officials as well as the common people.
2)     Government can give better solution to all the problems.
3)     There will be less mental pressure to the officials.
4)     People of other region will come to know about other’s problem and can try to cope up with that problem if it occurs there too.
All these features are added to the project keeping in mind that it should be as much user-friendly is much it can.


Thanking You

HITANSH KATARIA (hitanshkataria@gmail.com)
KUNAL VOHRA (vohra.kunal3@gmail.com)

Hope you will like our project’s presentation and will shortlist us. With regards thanking you.



Get Pin Point Location Of Your Lost Phone


Admin Kunal Vohra back with the awesome trick to get back your lost Android device with very few and easy steps.. Have a look!!


Recently Google introduced with a new feature – Android Device Manager. Today we will discuss what is Android device manager and how can we use it to find your lost phone. Sometimes people lost lost their phone accidentally then police complaint and other legal working does not help us to find our phone. So that we are responsible if have lost our phone. As I have already said we will discuss about Android Device Manager to find our lost phone so we can find only android phone using this feature of google. Now question is that what are necessary steps to use Android Device Manager and find out lost phone.

STEP 1:

First of all ,  you have to give administrator rights to Android Device Manager so that you can access your phone location from your computer.

How To Turn on Android Device Manager

Note: If you’re using a tablet with multiple users, only the tablet owner can manage thesettings for Android Device Manager.
  1. Open  FIND YOUR LOST PHONE USING ANDROID DEVICE MANAGER Google Settings from your device’s apps menu.
  2. Touch Android Device Manager.

You can turn on the following options:

  • Remotely locate this device. Remotely locate a device and find its approximate location on Google Maps. For devices running 4.1 and higher, location access must also be enabled. To turn it on, go to Google Settings > Location > Access location.
  • Allow remote factory reset. Remotely erase all data on your device. Touch this option, then select Activate to turn on the device administrator.

STEP 2:

Now  visit  & sign in Android Device Manager from your computer.

STEP 3:

Now suppose that you have lost your phone. Then just visit Android DeviceManager from your computer and click on REFRESH button. It will provide you your device exact location.[Note: Please note that you need internetconnection on your device to perform this task so it my advice to make you WiFi turn on and also always make your data connection on.]
android device manager
In case , if your phone is misplaced and it is on silent mode then you can ring up your phone using this RING feature of Android Device Manager.
If you are sure that you can not get your phone back then just GIVE a command to Erase Device All Data & whenever your phone will come in internet range it will automatically erase all data from your phone.
Important: If you believe your device has been stolen, contact law enforcement. Don’t  attempt to retrieve the device yourself.




Still Having Problem..!!! Connect with Admin Kunal Vohra

Download Our Official Android App & Get Free Internet*

"The Hackers Street"

For Daily Updates

Thursday, 24 October 2013

Nexus 5 Release Date Coming: Device Pre-Orders Surface On eBay

Nexus 5 Release Date Coming: Device Pre-Orders Surface On eBay


As we wait for the Nexus 5 to be announced, possibly on Thursday, the upcoming handset has already made its way to eBay.
A recent leak of the Nexus 5 on the Google Play Store has confirmed its price at $349 for the 16GB model; many expect the 32GB model will be priced at $399. However, several eBay sellers are offering the device for pre-order for as much as $700, a price rivaling those of Apple and Samsung smartphones.
One listing in particular has ended since being discovered; however it notes that two Nexus 5 handsets were pre-ordered, while it is listed that three more are available. A total of 13 people bid on the $650 32GB Nexus 5 before the listing ended.
Pundits note that prospective Nexus 5 customers should be careful with purchasing from such listings on eBay. If they are not complete scams, the transaction may be the seller offering to attempt to get a Nexus 5 handset on its release day and ship it out to the customer. Several sellers have already tried to cover themselves by listing that they reserve the right to cancel the transaction in the event that they are not able to obtain a Nexus 5 handset. Some also note that sellers may cancel transactions if the eBay price for the Nexus 5 significantly increases once it is released, likely to relist their offer at a higher price.
Many have taken the appearance of Nexus 5 pre-orders on eBay as a sign that

Still Having Problem..!!! Connect with Admin Kunal Vohra

Download Our Official Android App & Get Free Internet*

"The Hackers Street"

For Daily Updates