BREAKING NEWS

Category 5

Category 6

Category 7

Saturday, 27 December 2014

How to DDos a website using cmd (Command Prompt) | Hacking Point

How to DDos a website using cmd (Command Prompt) - Hacking Point
How to DDos a website using cmd (Command Prompt) - Hacking Point


How to DDos a website Using command prompt (cmd)

Shutting down a network or flooding a server by sending large amount of Ping request packets due to which  the transmission of data between a server and  user gets disconnected , and website goes on an offline stage.

Now the question is "How to  DDos a website using command prompt (cmd)?" just follow simple steps to do that :


1.) Find  a target website...
for ex we have our website : www.anysite.com

2.) Now we have to find ip adress of the website > for that just goto run>type CMD  and Command prompt will open

then just type ping www.anysite.com  ( Note: write ur targeted site in place of www.anysite.com)
How to DDos a website using cmd (Command Prompt) - Hacking Point

3.) now you will find the ip address of website below just copy that ip adress For example it is : 209.240.81.46

4.)Now we have got ip adress to send the packets , now in the next line  type :

      ping 
209.240.81.46  -t -l 65500     [Here ip adress is just an example type ur own targeted site ip address here]

How to DDos a website using cmd (Command Prompt) - Hacking Point


Now let it do its work and wait for at least 1 hour

5.) after one hour visit the website you will see the website is crashed ;) ...!!!

6.) This method is more effective if u send this packets from many computers at the same time on the same website ....!!!

Thats it

Thanks for reading
Keep sharing if you like ... ;) 

Sunday, 21 December 2014

Three Type of Hackers | Black Hat - Grey Hat - White hat Hackers | Hacking point

3 type of hackers - black hat - grey hat- white hat - Hacking point



Hackers are of three types:-
1.    White hat hacker
2.    Gray hat hacker 
3.    Black hat hacker

White Hat and Grey Hat Hacker & What is the Real Difference?

What is worse, the public is not able to understand terms like grey hat, white hat, Linux OS, or cracker.
However, the truth is that the subculture of the hacker world is more complex than we think. Especially if we consider that, these are very intelligent people.

So, what is ethical hacking white hat and how does it differentiate from grey hackers? The only way to find out is to submerge ourselves in the world of hacking and understand, at least, the most basic concepts.
  


Who Is A White Hat Hacker?
 
A Hacker can be a wiz kid who spends too much time with computers and suddenly finds himself submerged in the world of  cyber-security or criminal conspirators. On the other hand, he can be a master criminal who wants to obtain huge amounts of money for him, or even worse, dominate the world.
In the movie Matrix, the concept of hackers changed a bit. Although the agents of the Matrix considered them terrorists, the truth is that they were rebels fighting for the liberty of humanity. Things do not need to reach that extreme, though. We are not at war with intelligent ma chines so that kind of scenario is a bit dramatic.

Therefore, a hacker is an individual who is capable of modifying computer hardware, or software. They made their appearance before the advent of computers, when determined individuals were fascinated with the possibility of modifying machines. For example, entering a determine code in a telephone in order to make free international calls.
 
 When computers appeared, this people found a new realm where they could exploit their skills. Now they were not limited to the constraints of the physical world, instead, they could travel through the virtual world of computers. Before the internet, they used Bulletin Board Systems (BBS) to communicate and exchange information. However, the real explosion occurred when the Internet appeared.

Today, anyone can become a hacker. Within that denomination, there are three types of hackers. The first one is the black hacker, also known as a cracker, someone who uses his computer knowledge in criminal activities in order to obtain personal benefits. A typical example is a person who exploits the weaknesses of the systems of a financial institution for making some money.

On the other side is the white hat hacker. Although white hat hacking can be considered similar to a black hacker, there is an important difference. A white hacker does it with no criminal intention in mind. Companies around the world, who want to test their systems, contract white hackers. They will test how secure are their systems, and point any faults that they may found. If you want to become a hacker with a white hat, Linux, a PC and an internet connection is all you need.


Grey Hat Hackers

A grey hat hacker is someone who is in between these two concepts. He may use his skills for legal or illegal acts, but not for personal gains. Grey hackers use their skills in
order to prove themselves that they can accomplish a determined feat, but never do it in order to make money out of it. The moment they cross that boundary, they become black hackers.
For example, they may hack the computer network of a public agency, let us say, NOAA. That is a federal crime.

If the authorities capture them, they will feel the long arm of justice. However, if they only get inside, and post, let us say, their handle, and get out without causing any kind of damage, then they can be considered grey hackers.

If you want to know more about hackers, then you can attend one of their annual conventions. Every year, hackers from all over the US, and from different parts of the world, reunite and meet at DEF CON. These conventions are much concurred. In the last one, 6,600 people attended it.
Every year, DEF CON is celebrated at Las Vegas, Nevada. However, hackers are not the only ones who go to this event. There are also computer journalists, computer security professionals, lawyers, and employees of the federal government. The event is composed by tracks of different kind, all of them related, in some way, to the world of hackers (computer security, worms, viruses, new technologies, coding, etc). Besides the tracks, there are contests that involve hacking computers, l ock picking and even robot related events. Ethical hacking, white hat hacking or whatever names you wish to use, at the end, it has a purpose: to protect the systems of organizations, public or private, around the world. After all, hackers can now be located anywhere, and they can be counted by the millions. Soon, concepts like white hat, linux operating system or grey hat will become common knowledge. A real proof of how much has our society been influenced by technology.



Black Hat Hackers


Black hat hackers have become the iconic image of all hackers around the world. For the majority of computer users, the word hacker has become a synonym for social misfits and criminals.
Of course, that is an injustice created by our own interpretation of the mass media, so it is important for us to learn what a hacker is and what a black hacker (or cracker) does. So, let's learn about black hat techniques and how they make our lives a little more difficult.
Black hat is used to describe a hacker (or, if you prefer, cracker) who breaks into a computer system or network with malicious intent. Unlike a white hat hacker, the black hat hacker takes advantage of the break-in, perhaps destroying files or stealing data for some future purpose. The black hat hacker may also make the exploit known to other hackers and/or the public without notifying the victim. This gives others the opportunity to exploit the vulnerability before the organization is able to secure it.
 
What Is Black Hat Hacking?
 
A black hat hacker, also known as a cracker or a dark side hacker (this last definition is a direct reference to the Star Wars movies and the dark side of the force), is someone who uses his skills with a criminal intent. Some examples are: cracking bank accounts in order to make transfernces to their own accounts, stealing information to be sold in the black market, or attacking the computer network of an organization for money.

Some famous cases of black hat hacking include Kevin Mitnick, who used his black hat hackers skills to enter the computers of organizations such as Nokia, Fujitsu, Motorola and Sun Microsystems (it must be mentioned that he is now a white hat hacker); Kevin Poulsen, who took control of all the phone lines in Los Angeles in order to win a radio contest (the prize was a Porsche 944 S2); and Vladimir Levin, which is the handle of the mastermind behind the stealing of $10'000,000 to Citigrou.

Thats it
Hope you enjoyed
Thanks
Keep visiting and keep sharing

All RUN Commands | Hacking Point

all run commands - Hacking point

All RUN Commands:

Go To START an then  RUN

START >> RUN

Accessibility Controls
access.cpl

Add Hardware Wizard
hdwwiz.cpl

Add/Remove Programs
appwiz.cpl

Administrative Tools
control.exe admintools

Automatic Updates
wuaucpl.cpl

Bluetooth Transfer Wizard
fsquirt

Calculator
calc

Certificate Manager
certmgr.msc

Character Map
charmap

Check Disk Utility
chkdsk

Clipboard Viewer
clipbrd

Command Prompt
cmd

Component Services
dcomcnfg

Computer Management
compmgmt.msc

Date and Time Properties
timedate.cpl

DDE Shares
ddeshare

Device Manager
devmgmt.msc

Direct X Control Panel (if installed)
directx.cpl

Direct X Troubleshooter
dxdiag

Disk Cleanup Utility
cleanmgr

Disk Defragment
dfrg.msc

Disk Management
diskmgmt.msc

Disk Partition Manager
diskpart

Display Properties
control.exe desktop

Display Properties
desk.cpl

Display Properties (w/Appearance Tab Preselected)
control.exe color

Dr. Watson System Troubleshooting Utility
drwtsn32

Driver Verifier Utility
verifier

Event Viewer
eventvwr.msc

File Signature Verification Toolsigverif
Findfast
findfast.cpl

Folders Properties
control.exe folders

Fonts
control.exe fonts

Fonts Folder
fonts

Free Cell Card Game

freecell
Game Controllers

joy.cpl

Group Policy Editor (XP Prof)
gpedit.msc

Hearts Card Game
mshearts

Iexpress Wizard
iexpress

Indexing Service
ciadv.msc

Internet Properties
inetcpl.cpl

Java Control Panel (if installed)
jpicpl32.cpl

Java Control Panel (if installed)
javaws

Keyboard Properties
control.exe keyboard

Local Security Settings
secpol.msc

Local Users and Groups
lusrmgr.msc

Logs You Out Of Windows
logoff

Microsoft Chat
winchat

Minesweeper Game
winmine

Mouse Properties
control.exe mouse

Mouse Properties
main.cpl

Network Connections
control.exe netconnections

Network Connections
ncpa.cpl

Network Setup Wizard
netsetup.cpl

Nview Desktop Manager (if installed)
nvtuicpl.cpl

Object Packager
packager

ODBC Data Source Administrator
odbccp32.cpl

On Screen Keyboard
osk

Opens AC3 Filter (if installed)
ac3filter.cpl

Password Properties
password.cpl

Performance Monitor
perfmon.msc

Performance Monitor
perfmon

Phone and Modem Options
telephon.cpl

Power Configuration
powercfg.cpl

Printers and Faxes
control.exe printers

Printers Folder
printers

Private Character Editor
eudcedit

Quicktime (If Installed)
QuickTime.cpl

Regional Settings
intl.cpl

Registry Editorregedit
Registry Editor
regedit32

Removable Storage
ntmsmgr.msc

Removable Storage Operator Requests
ntmsoprq.msc

Resultant Set of Policy
rsop.msc

Resultant Set of Policy (XP Prof)
rsop.msc

Scanners and Cameras
sticpl.cpl

Scheduled Tasks
control.exe schedtasks

Security Center
wscui.cpl

Services
services.msc

Shared Folders
fsmgmt.msc

Shuts Down Windows
shutdown

Sounds and Audiommsys.cpl
Spider Solitare Card Gamespider
SQL Client Configuration
cliconfg

System Configuration Editorsysedit
System Configuration Utility
msconfig

System File Checker Utility
sfc

System Properties
sysdm.cpl

Task Manager
taskmgr

Telnet Client
telnet

User Account Management
nusrmgr.cpl

Utility Manager
utilman

Windows Firewall
firewall.cpl

Windows Magnifier
magnify

Windows Management Infrastructure
wmimgmt.msc

Windows System Security Tool
syskey

Windows Update Launches
wupdmgr

Windows XP Tour Wizard
tourstart

Wordpad
write

Thanks for reading
Keep sharing

Send message to Friends through Command Prompt | Hacking Point

Chat with Friends through Command Prompt - Hacking Point


Send message to Friends through Command Prompt

Hello friends yoU Can send message With Command Prompt  to your friends


1) All you need is your friend's IP Address and your Command Prompt

2) Open Notepad and write this code


@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A




3) Now save this file  as "     Messenger.Bat    ".

4) Now open the saved file  
  Messenger.Bat

6) Computer will ask for USER : >

  
7) type the IP Address of the computer you want to contact and press enter

8) Now all you need to do is type your message and press Enter.

Message is Sent

Enjoy
Thanks for reading
Keep sharing

Advantages & Benefits of blogging | love blogging | Hacking point


Following are some of the benefits of Blogging

1. Get a Better Job:

Now-a-days it is the age of computer and the one who operates computer and have much skills in blogging are preferred more in any private or government jobs.

2. Start a New Business:

Sometimes a blog starts out as a hobby only to become a full-time business.
That’s what happened to a person namely Pat Flynn, who created a blog simply to share his thoughts and insights on architecture. When Flynn was laid off from his job, he decided to take his blog a little bit more seriously and about one year later the blog had become a $100,000 per year business.

3. Get More Clients to Your Existing Business:

Static websites don’t attract many new clients or customers. But a regularly updated blog can produce a constant stream of good leads from all around the world.

4. Become a Better Writer:

The only way to become a better writer is to write pages and pages, day after day. That’s exactly what an active blogger spends his or her time doing. The more you blog, the more you write and the better writer you become.

5. Become a Published Author:

The publishing business isn’t what it used to be and publishers are less likely than ever before to take a chance on an unknown author.
They would much rather give a contract to an author with a built-in audience of readers and that’s where having a blog comes in. So keeping a blog isn’t just a good way to become a better writer, it may be your fastest path to becoming a published writer.

6. Get Immediate Feedback:

An author has to wait months between finishing his/her book and reading the reviews, but bloggers get to read their readers’ comments the same day they click ‘publish’.
This makes blogging a great way to get feedback on an idea that you want to develop further. Having an outside perspective and a little bit of constructive criticism is invaluable.

7. Learn More About a Group of People:

Bloggers spend most of their time sharing their ideas and insights with their readers. But if you listen, you’ll find that your readers share a lot with you too. And the author becomes more familar to the thoughts of others mean we can say blogging makes a man "psychologist"

8. Gain Influence:

What’s the best way to change the world? You could become a politican, activist, or volunteer.
Or you could become a blogger. A successful blogger gains a wide audience of people who trust and respect them.

9. Establish Yourself as an Expert in Your Field:

Anybody can start a blog on any subject they like. So you don’t get a lot of respect just for saying, “I have a website about that.”
But over time, as you write more posts and share more of your expertise, you’re website will change from ‘just another blog’ into a powerful demonstration of your knowledge in a field. When somebody visits your site and sees the insights you’ve shared on a subject, along with the community of people who respect and seek that insight, it will be clear that you’re genuinely an expert in the field.

10. Build a Network:

First of all, valuable and interesting blog posts attract readers who will then comment on your site and send you personal messages through your contact page. Many of your readers will be asking for help, but others will be looking to help you.
A blog is also a good platform for reaching out to others.

11. Learn In-Demand Skills:

Easy-to-use blogging platforms like WordPress and Blogger have made it so that a person doesn’t need to have a grasp of computer programming in order to start a blog.

But through the process of blogging, most people learn some HTML and CSS simply because it’s easier to make minor improvements to your site by yourself than it is to hire somebody each time. That’s good news because fluency in web design, HTML, and CSS are highly valued skills in this day and age.

12. Improve Your SEO (Search Engine Optimization):

Ultimately, search engines want to deliver results that are helpful to their users. When you write a series of in-depth  valuable articles around a topic, Google takes notice.
Each high-quality blog post that you publish is another opportunity to get traffic from search Engine.

13. Collect Emails:

There’s a lot of talk about social media today, but email is still the most reliable way to communicate online. People check their email regularly and they’re used to receiving important updates.
Getting somebody to give you their primary email isn’t easy, but once you have it you have a direct connection with that person. You’ll then be able to get their attention whenever you find something that you think will benefit them or if there’s something important regarding your business or blog that you want to inform them about.

14. Stay Knowledgable in Your Field:

If you’re looking for an incentive to keep up to date on all of the latest information on a certain subject, starting a blog is a great start. Your weekly quest to put up new content will lead you to always be searching for new information and sharing it with your readers.

15. Sell a Product:

A blog can make for a great virtual store. Many of the online users sell their products such as softwares, music symphony and paintings and these are easily sell and there is no need of talking to any shop keeper

17. Express Yourself:

This one is pretty simple: a blog is an expressive medium that can contain words, images, and sounds. Whether your blog is formal business affair or a personal

18. Help Others:

Every good blog helps its readers. Hacking point does this by offering free information about Ethical Hacking and cyber security. Anyone can secure their web applications and there is no need of hiring any Ethical Hacker.
The power of a blog to educate, inspire, and bring like-minded people together makes blogging a great way to help people.

19. Build Trust Online:

Trust is a rare and valuable commodity online. You can’t buy trust. It has to be earned by demonstrating your commitment to your readers, time and time again.
As it turns out, that’s exactly what good bloggers do by regularly posting valuable, honest articles on their blogs. The more people whose trust you’ve earned, the easier it will be to accomplish your goals online.

20. Take Control of Your Online Identity:

Whether you’re a person or business, there’s probably lots of information about you online. When somebody searches for you online, you want to make sure that they get an accurate and complete picture of who you are and what you’re all about.
Starting a blog that covers all the bases is a great way to control your online identity and make sure that the top result on Google makes a the right first impression.



Top 10 Amazing Facts about Wikipedia | Hacking point

Top 10 Amazing Wikipedia Facts - Hacking point

Top 10 Amazing Facts about Wikipedia

Little Introduction to Wikipedia:
Wikipedia is considered as the largest online source to get information for any product, well we won’t say just information but in depth analysis report of any thing existing on earth could be found on Wikipedia and thats amazing . One can easily go onto wikipedia and get information about anything, or googling anything possibly brings wikipedia page as top results, so its pretty easy to be discovered by anyone.

Awesome Wikipedia Facts

Hye friends, today we are providing you with Top 10 facts about wikipedia that will for sure amaze you and will give in depth analysis about their base.
  1. Wikipedia was founded on January 15 (2001) by Jimmy Wales and Larry Sanger.
  2. Wikipedia is a Non-Profit Organization. So its not aimed to earn any profit from people by distributing valuable knowledge. So it does not serve any advertisement, so you can have a popup free experience.
  3. If you want then you can easily Sign-Up and become an editor for Wikipedia, hence creating and modifying articles but that requires some permissions.
  4. Wikipedia articles are served in 285 languages, so person coming from any country can read its articles in his own native language.
  5. The English Language Wikipedia has more then 3+ Million Articles.
  6. Only 35 employees operate the whole Wikipedia Library.
  7. Wikipedia Headquarters are located in San Francisco.
  8. And its servers are hosted in Florida.
  9. Wikipedia site has more then 6884 million page view each year.
  10. Contributors on Wikipedia have written more then 22 million articles.
So these were some amazing facts about wikipedia the awesome encyclopedia that helps millions everyday.
Thanks for reading
Keep sharing ;) 

Top 5 Mozilla Firefox Addons a Hacker Must Have | Hacking Point

Top 5 Mozilla Firefox Addons a Hacker Must Have - Hacking Point

Top 5 Mozilla Firefox Addons a Hacker Must Have

We all know that Mozilla Firefox is a browser which is loved by security experts and hackers. Mozilla has more that 450 million world wide users and is written in majorly in c,c++,javacript, XSS, XBL. The reason why it is so popular amongst security expert’s is because it is open source and has a number of extension’s available which make work of penetration testing easier and faster.
Following are the most important addons eveyone must have:

    Top 5 Mozilla Firefox Addons a Hacker Must Have - Hacking Point

  1. Greasemonkey: Greasemonkey is a very popular firefox add-on which allows running 3rd party scripts which increase the efficiency of browsing. All you have to install the add on it just search for it and click on “add to firefox” button. Then all you have to do is start adding a number of scripts to this add on. Some famous scripts for greasemonkey are script to autobuffer/download youtube videos, script to change color of facebook, script for bypassing survey’s and many more. Scripts can be downloaded for free from userscripts.org.
  2. HackBar: HackBar is like a toolbar but it comes very handy while testing for web vulnerabilities like SQL, XSS etc. Loading,Splitting and Execution of URL can be done using this toolbar. When testing for SQL and XSS vulnerabilities the codes/queries can be injected into the URL quickly using this toolbar. Features like encoding and encryption also come handy in many situations. Toolbar consists of many inbuilt string too.Top 5 Mozilla Firefox Addons a Hacker Must Have - Hacking Point
  3. Firebug: Firebug is a mozilla extension which is very useful to developers and hackers. This add on allows you to see coding of the page you are on. Moreover, firebug filters the coding of the page and you can select if you want to see only the html, CSS, scripts, cookies of the page. This toolbar can be used for understanding the coding and further exploiting bugs.top 5 mozilla extensions for a hacker
  4. Acunetix Web Scanner Toolbar: Acunetix Toolbar gives all the features which are present in famous “Acunetix Vulnerability Scanner”. You can simple load a page and test vulnerabilities in it. A number of options for filtering,optimizing the scan are also provided and you can also scan for a specific type of vulnerability you are looking for.
top 5 mozilla extensions for a hacker
   5.  Cookie Manager: Cookie manager add on allows you to manage all the cookies which you collect while browsing web and edit them. Cookie manager is used in various attacks like session hijacking, cookie stealing etc.

What is Backtrack & How to Use it? | Hacking Point

What is Backtrack & How to Use it? - hacking point

What is Backtrack & How to Use it?
Hello friends! This is the very first article of a series of articles which the Hacking Point Team will be posting on one of the Best tools used in Ethical Hacking and cyber security purpose and that is “Backtrack”. We hope you will enjoy reading. Do show your Love by commenting and sharing. Thanks in advance :) .
Backtrack is Linux Based Penetration Testing Operating system which provides many built in tools which are used for vulnerability scanning, exploitation and penetration testing. Apart from using metasploit framework on backtrack there is a complete series of “Exploitation Tools”. The tools in Backtrack are divided into following broad categories :
  • Information Gathering
  • Vulnerability Assessment
  • Exploitation Tools
  • Privilege Escalation
  • Maintaining Access
  • Reverse Engineering
  • RFID Tools
  • Stress testing
  • Forensics
  • Reporting Tools
  • Services
  • Miscellaneous

You can Download Backtrack From Here  

Thanks

Top most powerful SQL Injection tools | Hacking point

Top most powerful SQL Injection tools- Hacking point

Top Most Powerful SQL Injection Tools

We hope that you already know about SQL Injection. Lets have a little introduction to SQL Injection "An SQL injection attack is a code injection attack that is used to exploit web applications and websites databases. It is one of the most common methods for hackers to get into your computer system. Learning such attacks are important for security purpose, so that you could secure yourself. Here are 11 of the top most powerful tools that helps in performing SQL Injection attacks.

1. BSQL Hacker

This is a useful tool for both experts and beginners that automates SQL Injection attacks on websites.

2. The Mole

This is an SQL Injection tool that uses the union technique or the boolean query-based technique.

3. Pangolin

This is a penetration testing tool developed by NOSEC. It is aimed at detecting and exploiting SQL injection vulnerabilities on websites.

4. Sqlmap

This is an open source penetration testing tool that security professionals can use. Like the BSQL Hacker tool, this one also automates SQL Injection attacks.

5. Havij 
(Click here to Download free Havij cracked version)
This is an automated SQL injection tool that can be used by penetration testers in order to detect vulnerabilities in web applications and exploit them.

6. Enema SQLi

This is a dynamic penetration testing tool for professionals. It is an auto-hacking software.

7. Sqlninja

This is a tool targeted at exploiting SQL injection vulnerabilities. It uses the Microsoft SQL server as its back end.

8. sqlsus

Written using the Perl programming language, this is an open source penetration testing tool for MySQL Injection and takeover.

9. Safe3 SQL Injector

This is a powerful penetration testing tool, which automates the process of detecting and exploiting SQL Injection vulnerabilities.

10. SQL Poizon

This tool includes php , asp , rfi , lf dorks that can be used for penetration testing.

11. SQL Power Injector.

That helps the penetration tester to find and exploit SQL injections on a web page.
 
Copyright © 2013 Hacking Point | Learn Ethical Hacking and Cyber Security
Powered byBlogger