Posts

Showing posts from June, 2016

HACK COMPUTER WITH TROJAN HORSE [ CREATE BACKDOOR ]

Image
A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems. Once activated, Trojans can enable cyber-criminals to spy on you, steal your sensitive data, and gain backdoor access to your system. These actions can include: Deleting data Blocking data Modifying data Copying data Disrupting the performance of computers or computer networks Unlike computer viruses and worms , Trojans are not able to self-replicate. Backdoor A backdoor Trojan gives malicious users remote control over the infected computer.  They enable the author to do anything they wish on the infected computer – including sending, receiving, launching, and deleting files, displaying data, and rebooting the computer.  Backdoor Trojans are often u

Man In middle attack [ MIMT ]

Image
It is the most powerful technique to steal data from the network. in this attack the attacker is situated between the router and the lan users.so it is called man in middle attack the attacker can observe and record all transactions. This form of attack is successful for both HTTP and HTTPS communications. For man-in-the-middle attacks to be successful, the attacker must be able to direct the customer to their proxy server instead of the real server. Lets look at what kind of MITM attacks can be used and under what scenario. Here is a list of Different type of MITM attacks LOCAL AREA NETWORK: - ARP poisoning DNS spoofing STP mangling Port stealing For performing the mimt attack we will use the tool names "cain and abel DOWNLOAD CAIN AND ABEL TOOL " Then follow the given images and enjoy hacking I have used this attack and got passwords of router login and many website account that i am sharing here ...... if the above link for