Saturday 27 June 2015

Benefits Of Rooting Android Devices And How To Root Without Computer

Root_android_easily & benefits - picateshackz.com

To root or not to root? It's a question that most people don't ever ask themselves, because Android devices are powerful and customizable from the get-go, and rooting can be risky.

But it's not that risky. And if you want to really unlock the full potential of your device—if you want to be able to control everything, backup everything, customize everything, and do all sorts of fun things like install custom ROMs and get Android Lollipop ahead of the pack—you'll need to root your phone.

I'm not saying you have to root your Android device…but I am saying you might be a goody two-shoes if you don't.

Benefits of Rooting Android Devices

Automate everything

Powerful root-only apps like Tasker can turn your dream of a super-smartphone into a reality. Tasker uses the "if this, then that" mentality to make your phone a genius -- for example, you can use Tasker to automatically silence your phone at night, turn on your Wi-Fi when you're at home, or open up an app when you connect to your car's Bluetooth.

Lollipop, here I come!

Android phone makers have a habit of not releasing updates in a timely manner. Or at all, sometimes. So why are you still waiting for the latest OS when you could simply root your phone and get it right now? Patience is for people who don't know how to root.

Faster than the speed of…your CPU

Contrary to what the phone-makers want you to believe, your Android device could definitely be faster. And you can take speed matters into your own hands with apps like SetCPU, which is only available after you root. What's a little battery life lost when you have more power?

Better battery life

You know how you can overclock your device's CPU for ultra-speedy app-switching (who doesn't want to multitask like Sonic the Hedgehog)? Well you can also use SetCPU to underclock, or slow down, your CPU for when you need that extra 29 minutes of battery life.

Bye-bye, bloatware

Nuking factory-installed bloatware beats disabling it any day.

Really, really back up your stuff

OK, so Google does a pretty good job of keeping your mail, contacts, calendar, apps, and other Google-y things in order. But if you want to truly backup everything, as in, if you want to take a literal snapshot of your device and stick it somewhere safe, you'll need the root-onlyTitanium Backup. Satisfy your hoarding tendencies!

Customize all the things!

Android is pretty customizable, even without rooting your phone. But with a root you can literally customize everything. Vibration strength? Precise screen color calibration? Gesture control? There's a (root-only) app for that.


Store apps wherever the hell you want to

Use a root-only app like FolderMount to store apps, not just files, on your microSD card. Now your device has infinite (read: 128GB) of real usable storage!


Rooting your Android Device gives you Super User access for your mobile by rooting your android device even you can uninstall built-in apps, now i am going to show you 2 easy ways to root your android device easily without computer.


Method 1:(Framaroot)

Framaroot is android app it can easily root your android device now its not available in play store so click here to download the app and install it.



android_easy root_picateshackz

After installing open the app and choose Install Supersu from drop down menu show above.

android_easy root_picateshackz
It show number of exploit methods to root your android device choose anyone of the method my first preference is Boromir if it fails try other exploit methods.


android_easy root_picateshackz



Within seconds it show the result after that you need to restart your device to install Supersu which manage root access and you need net connection to download it.



UnRoot

If you need to unroot your android device simply select Unroot option from the drop down menu of framaroot give below.


android_easy root_picateshackz

This method help to root and unroot your android device in easy way it mostly works for most of the android device if it not works follow the method 2.



Method 2:(Kingroot)


Kingroot app gives you to one touch root access, Click here  to download the app.


Install and open the Kingroot app.



android_easy root_picateshackz


Tap the START ROOT option to root your android device the rooting process is like given below.


android_easy root_picateshackz

After rooting you will get the confirmation screen like given below.

android_easy root_picateshackz


Now your android device is rooted enjoy the superuser access on your android..........




Thursday 25 June 2015

Become A Hacker: Types Of Cyber Attacks And Must Know Facts

learn to hack_types of cyber attacks_picateshackz.com

Nowadays, every other college or school student wants to be a hacker. Due to media hype, the term hacker is considered both cool and criminal at the same time. Now, since my blog is basically about my journey into hacking, I receive many emails on how to become a hacker. "I'm a beginner in hacking, how should I start?" or "I want to be able to hack my friend's Facebook account" are some of the more frequent queries. 

In this article I will attempt to answer these and more. I will give detailed technical instructions on how to get started as a beginner, how to evolve as you gain more knowledge and expertise in the domain and also describing the different types of cyber attacks and must know facts about hacking. Hacking is a skill. And you must remember that if you want to learn hacking solely for the fun of hacking into your friend's Facebook account or email, things will not work out for you. You should decide to learn hacking because of your fascination for technology and your desire to be an expert in computer systems.

"Being a hacker is lots of fun, but it's a kind of fun that takes lots of effort. The effort takes motivation."



The hacker mindset

In order to become a hacker, you must start thinking like one. We encounter all kinds of technology in our real life. Look at them from a hacker's perspective by thinking of ways to hack them. Hacking is not only about computers. It is also about how you use logic and ingenuity to solve the problems you encounter in your day today life. Nothing is really hack-proof. Auto-rickshaw meters, electronic voting machines, electronic doors, biometric systems, cars and even a yatch have all been hacked in the past. Whenever you encounter any technology, think about how it can be exploited to perform another action. You should possess a natural curiosity for solving puzzles and taking up challenges.

Read my previous post to know more: Understand The Hacker MindsetTo Become A Real Hacker




Know your technology

Becoming a hacker is no easy task. It will not happen in days or weeks. It will take you many months and  even years to reach to the level where you can call yourself a hacker. The main reason for this is that being a hacker requires a lot of technical know-how. If you want to hack a computer, it only seems logical that you first know how it works, right? You should be familiar with the ins and outs of computers and know a little bit about everything in the IT domain. For this, you need to learn many things. This learning phase is when most aspiring hackers will give up.
General IT knowledge:
·         Learn how to install Windows and Linux. Use VirtualBox or VMware to           practice this.
·         Learn networking concepts like IP address, subnets, TCP/IP, OSI model,           LAN,WAN
·         Functions of switch, router, firewall, access point etc
·        What is DNS, DHCP, SNMP, ARP, NAT?
·         What is HTTP, FTP, Telnet, RDP, SSH, POP, SMTP, SSL, NetBios?
  
      These bullet points are just bare minimum concepts, and you have to learn them thoroughly. For instance, you need to know how data travels through the OSI layers, and the role of each layer in the data transfer.      I would recommend taking a networking course  such as CompTIA's N+ certification. 




Programming  Languages

Programming knowledge is necessary, although not mandatory to become a hacker. Some of the world's best hackers started out as programmers. If you know programming, you will be able to dissect code and analyze it. You will be able to write your own scripts or your own hacking tools. So, which programming language should you learn then? HTML and JavaScript are languages of the internet. So make sure you learn them first. they are also incredibly easy to grasp and learn.  If your are enrolled in an undergraduate computer science degree, you will most probably be learning C,C++ and Java. These three major languages are good and you should keep learning them, but for a hacker, Python is the best language. "Why?" You ask. Because python is an extremely powerful language and it easy to learn at the same time. With Python you can achieve your results with minimal coding, and it does not need to be compiled. That means, just as you finish writing a script, you can immediately run it without having to compile it. And later on in life, if you decide to become a programmer instead of a hacker, Python can develop GUI applications also. In fact, a large part of YouTube is written in Python.
 Another language you should learn is PHP. PHP is also free and open source. It is a server side scripting language, meaning, login pages and other web based forms are handled by PHP. Knowledge of ASP. NET will also be helpful. You should also know MySQL commands and syntax. This knowledge will be vital later when you perform SQL injection attacks against websites. Download XAMPP package and start practicing PHP and MySQL
Another important thing to note is that most colleges will not teach you advanced programming concepts. File handling and Network socket programming are two very important concepts you should familiarize yourself with, regardless of the language.


Read my previous post to know more: Programming Languages For Hackers And Learn It From Most 6 Helpful Websites



Open Source

The hacker community is a big supporter of Open Source software. You should contribute to open source projects when you can. In order to improve your programming skills, you can start an open source project and work on it. Download the source code of popular open source projects and study the code. Sourceforge and Github are excellent starting points. Alternatively, start your own project and post the source code online. This will help you get recognition.


Linux

The Windows operating system may be easy and convenient for most users, but it is certainly not suited for hackers. With the exception of few windows only tools, most hacking tools run best under Linux environment. I have given a list of top ten popular hacking tools, and most out of those 10 tools run best under Linux. You can use any Linux distribution like Ubuntu or Fedora, but BackTrack and Kali are two major Linux distros specifically designed for hackers. They come loaded with all the popular hacking tools, saving you from the trouble of downloading them yourself. If you are not comfortable with leaving windows as yet, you can use VirtualBox to install BackTrack in your system, or you can dual boot your operating systems.
Information Technology is a huge field. If you look at your college or university, your professors know about programming concepts and theory, the System Administrator knows about networks and systems, the website developers know web programming and designing. You, as a hacker, must know all these things and more.

Even under the domain of hacking, there are many sub categories like web application security, network security, digital forensics, reverse engineering etc. Nobody can be good at everything. After you have adequate knowledge and experience in "general" hacking, you can choose a speciality and become an expert in it.


Must Read: An Introduction To Hacker’s OS: Kali Linux Setup Tutorial



Different Types of Cyber Attacks

learn to hack_types of cyber attacks_picateshackz

A cyber attack, in simple terms, is an attack on your digital systems originating from malicious acts of an anonymous source. Cyber attack allows for an illegal access to your digital device, while gaining access or control of your digital device.
A different types of cyber attacks can be defined as an offensive tactic to gain an illegal control or access to your digital device, called the target system, initiated by a person or a computer against a website, computer system or a single digital device as well as a whole, which poses a serious threat to computer systems, information stored, financial structures and the entire network itself. Cyber attacks work towards compromising the integrity of the digital device and the information stored in it.

1. Backdoors – Backdoor is a type of cyber threat in which the attacker uses a back door to install a keylogging software, thereby allowing an illegal access to your system. This threat can turn out to be potentially serious as it allows for modification of the files, stealing information, installing unwanted software or even taking control of the entire computer.
2. Denial-of-Service Attack – A denial-of-service or a DOS attack generally means attacking the network to bring it down completely with useless traffic by affecting the host device which is connected to the internet. A DOS attack targets websites or services which are hosted on the servers of banks and credit card payment gateways.
3. Direct-access Attack – A direct-access attack simply means gaining physical access to the computer or its part and performing various functions or installing various types of devices to compromise security. The attacker can install software loaded with worms or download important data, using portable devices.
4. Eavesdropping – As the name suggests, eavesdropping means secretly listening to a conversation between the hosts on a network. There are various programs such as Carnivore and NarusInsight that can be used to eavesdrop.
5. Spoofing – Spoofing is a cyber attack where a person or a program impersonate another by creating false data in order to gain illegal access to a system. Such threats are commonly found in emails where the sender’s address is spoofed.
6. Tampering – Tampering is a web based attack where certain parameters in the URL are changed without the customer’s knowledge; and when the customer keys in that URL, it looks and appears exactly the same. Tampering is basically done by hackers and criminals to steal the identity and obtain illegal access to information.
7. Repudiation Attack – A repudiation attack occurs when the user denies the fact that he or she has performed a certain action or has initiated a transaction. A user can simply deny having knowledge of the transaction or communication and later claim that such transaction or communication never took place.
8. Information Disclosure– Information disclosure breach means that the information which is thought to be secured is released to unscrupulous elements who are not trustworthy.
9. Privilege Escalation Attack – A privilege escalation attack is a type of network intrusion which allows the user to have an elevated access to the network which was primarily not allowed. The attacker takes the advantage of the programming errors and permits an elevated access to the network.
10. Exploits – An exploit attack is basically a software designed to take advantage of a flaw in the system. The attacker plans to gain easy access to a computer system and gain control, allows privilege escalation or creates a DOS attack.
11. Social Engineering – An attack by a known or a malicious person is known as social engineering. They have knowledge about the programs used and the firewall security and thus it becomes easier to take advantage of trusted people and deceive them to gain passwords or other necessary information for a large social engineering attack.
12. Indirect attack – Indirect attack means an attack launched from a third party computer as it becomes more difficult to track the origin of the attack.
13. Computer crime – A crime undertaken with the use of a computer and a network is called as a computer crime.
14. Malware – Malware refers to malicious software that are being designed to damage or perform unwanted actions into the system. Malware is of many types like viruses, worms, Trojan horses, etc., which can cause havoc on a computer’s hard drive. They can either delete some files or a directory or simply gather data without the actual knowledge of the user.
15. Adware – Adware is a software that supports advertisements which renders ads to its author. It has advertisements embedded in the application. So when the program is running, it shows the advertisement. Basically, adware is similar to malware as it uses ads to inflict computers with deadly viruses.
16. Bots – Bots is a software application that runs automated tasks which are simple and repetitive in nature. Bots may or may not be malicious, but they are usually found to initiate a DoS attack or a click fraud while using the internet.
17. Ransomware – Ransomware is a type of cyber security threat which will restrict access to your computer system at first and will ask for a ransom in order for the restriction to be removed. This ransom is to be paid through online payment methods only which the user can be granted an access to their system.
18. Rootkits – A rootkit is a malicious software designed in such a way that hides certain process or programs from normal anti virus scan detection and continues to enjoy a privilege access to your system. It is that software which runs and gets activated each time you boot your system and are difficult to detect and can install various files and processes in the system.
19. Spyware – Spyware, as the name suggests, is a software which typically spies and gathers information from the system through a user’s internet connection without the user’s knowledge. A spyware software is majorly a hidden component of a freeware program which can be downloaded from the internet.
20. Scareware – Scareware is a type of threat which acts as a genuine system message and guides you to download and purchase useless and potentially dangerous software. Such scareware pop-ups seem to be similar to any system messages, but actually aren’t. The main purpose of the scareware is to create anxiety among the users and use that anxiety to coax them to download irrelevant softwares.
21. Trojan Horses – Trojan Horses are a form of threat that are malicious or harmful codes hidden behind genuine programs or data which can allow complete access to the system and can cause damage to the system or data corruption or loss/theft of data. It acts as a backdoor and hence it is not easily detectable.
22. Virus – A computer virus is a self replicating program which, when executed, replicates or even modifies by inserting copies of itself into another computer file and infects the affected areas once the virus succeeds in replicating. This virus can be harmful as it spreads like wildfire and can infect majority of the system in no time.
23. Worm – Just like a virus, worm is a self replicating program which relies on computer network and performs malicious actions and spreads itself onto other computer networks. Worms primarily rely on security failures to access the infected system.
24. Phishing – Phishing is a cyber threat which makes an attempt to gain sensitive information like passwords, usernames and other details for malicious reasons. It is basically an email fraud where the perpetrator sends a legitimate looking email and attempts to gain personal information.
25. Identity Theft – Identity theft is a crime wherein your personal details are stolen and these details are used to commit a fraud. An identity theft is committed when a criminal impersonates individuals and use the information for some financial gain.
26. Intellectual Property Theft – Intellectual Property theft is a theft of copyrighted material where it violates the copyrights and the patents. It is a cybercrime to get hands onto some trade secrets and patented documents and research. It is basically a theft of an idea, plan and the methodology being used.
27. Password Attacks – Password attack is a form of a threat to your system security where attackers usually try ways to gain access to your system password. They either simply guess the password or use an automated program to find the correct password and gain an entry into the system.
28. Bluesnarfing – Bluesnarfing is a threat of information through unauthorized means. The hackers can gain access to the information and data on a Bluetooth enabled phone using the wireless technology of the Bluetooth without alerting the user of the phone.
29. Bluejacking – Bluejacking is simply sending of texts, images or sounds, to another Bluetooth enabled device and is a harmless way of marketing. However, there is a thin line between bluejacking and bluesnarfing and if crossed it results into an act of threat.
30. DDoS – DDoS basically means a Distributed Denial of Service. It is an attempt to make any online service temporarily unavailable by generating overwhelming traffic from multiple sources or suspend services of a host connected to the internet.
31. Keylogger – A keylogger is a spyware that has the capability to spy on the happenings on the computer system. It has the capability to record every stroke on the keyboard, web sites visited and every information available on the system. This recorded log is then sent to a specified receiver.


38 Things That You Should Understand While Learning To Hacking



learn to hack_types of cyber attacks_picateshackz

1. There is no software that can hack Facebook passwords (except key logging and phishing) same with e-mail account hacking.

2. Kernel is the main component of most computer operating systems; it is a bridge between applications and the actual data processing done at the hardware level. The kernel's responsibilities include managing the system's resources (the communication between-hardware and software components). Usually as a basic component of an operating system, a kernel can provide the lowest-level abstraction layer for the resources (especially processors and I/O devices) that application software must control to perform its function. It typically makes these facilities available to application processes through inter-process communication mechanisms and system calls.

3. Linux is a computer operating system which is based on free and open source software. Although many different varieties of Linux exist, all are Unix-like and based on the Linux kernel, an operating system kernel.

4. An exploit (from the verb to exploit, in the meaning of using something to one’s own advantage) is a piece of software, a chunk of data, or sequence of commands that takes advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized). This frequently includes such things as gaining control of a computer system.

5. A shell is a piece of software that provides an interface for users of an operating system which provides access to the services of a kernel. However, the term is also applied very loosely to applications and may include any software that is "built around" a particular component, such as web browsers and email clients that are "shells" for HTML rendering engines. The name shell originates from shells being an outer layer of interface between the user and the internals of the operating system (the kernel).

6. PHP is a general-purpose server-side scripting language originally designed for web development to produce dynamic web pages. For this purpose, PHP code is embedded into the HTML source document and interpreted by a web server with a PHP processor module, which generates the web page document. It also has evolved to include a command-line interface capability and can be used in standalone graphical applications.

7. JQuery is a cross-browser JavaScript library designed to simplify the client-side scripting of HTML. It was released in January 2006 at BarCamp NYC by John Resig. Used by over 49% of the 10,000 most visited websites, jQuery is the most popular JavaScript library in use today.

8. A network host is a computer connected to a computer network. A network host may offer information resources, services, and applications to users or other nodes on the network. A network host is a network node that is assigned a network layer host address.

9. In mathematics and computer science an algorithmis an effective method expressed as a finite list of well-defined instructions for calculating a function Algorithms are used for calculation, data processing, and automated reasoning. In simple words an algorithm is a step-by-step procedure for calculations.

10. There are many websites that can be searched for vulnerablities and can be hacked but if you are a real hacker then you should select the website and then try to hack it.

11. A router is a device that forwards data packets between computer networks, creating an overlay internetwork. A router is connected to two or more data lines from different networks. When data comes in on one of the lines, the router reads the address information in the packet to determine its ultimate destination. Then, using information in its routing table or routing policy, it directs the packet to the next network on its journey. Routers perform the "traffic directing" functions on the Internet. A data packet is typically forwarded from one router to another through the networks that constitute the internetwork until it gets to its destination node.

12. computer networks, a proxy server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers.

13. BB5 unlocking in Nokia phones is not possible to install unsigned OS in Nokia (not simlock).

14. The Metasploit Project is an open-source computer security project which provides information about security vulnerabilities and aids in penetration testing and IDS signature development. Its most well-known sub-project is the Metasploit Framework, a tool for developing and executing exploit code against a remote target machine. Other important sub-projects include the Opcode Database,shell code archive, and security research.

15. There is not a method to decrypt nokia MCUSW file and change it because if we do it then the check sum is changed than that of phone and its not installed
Symbian can be hacked by using ROM patcher and hellox

16. Free hosting websites don't allow to use rapid leech script and other forums.

17. Unix (officially trademarked as UNIX, sometimes also written as Unix) is a multitasking, multi-user computer operating system originally developed in 1969 by a group of AT&T employees at Bell Labs, including Ken Thompson, Dennis Ritchie, Brian Kernighan, Douglas McIlroy, and Joe Ossanna. The Unix operating system was first developed in assembly language.

18. A scripting language, script language, or extension language is a programming language that allows control of one or more applications. "Scripts" are distinct from the core code of the application, as they are usually written in a different language and are often created or at least modified by the end-user. Scripts are often interpreted from source code or bytecode

19. Cross-site scripting (XSS) is a type of computer security vulnerability typically found in Web applications that enables attackers to inject client-side script into Web pages viewed by other users. A cross-site scripting vulnerability may be used by attackers to bypass access controls such as the same origin policy.

20. A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended
users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the concerted efforts of a person, or multiple people to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely

21. Getting access to router doesn't provide you access to network.

22. A Media Access Control address (MAC address) is a unique identifier assigned to network interfaces for communications on the physical network segment. MAC addresses are used for numerous network technologies and most IEEE 802 network technologies including Ethernet. Logically, MAC addresses are used in the Media Access Control protocol sub-layer of the OSI reference model.

23. Ankit fadias seminars are crap and its courses too.

24. Social engineering is the art of manipulating people into performing actions or divulging confidential information. While similar to a confidence trick or simple fraud, the term typically applies to trickery or deception for the purpose of information gathering, fraud, or computer system access; in most cases the attacker never comes face-to-face with the victim.

25. Rooting is a process that allows users of mobile phones and other devices running the Android operating system to attain privileged control (known as "root access") within Android's Linux subsystem with the goal of overcoming limitations that carriers and manufacturers put on some devices. It is analogous to jailbreaking on devices running the Apple iOS operating system.

26. Tethering means sharing the Internet connection of an Internet-capable mobile phone with other devices. This sharing can be offered over a wireless LAN (Wi-Fi), or over Bluetooth, or by physical connection using a cable. In the case of tethering over wireless LAN, the feature may be branded as a mobile hotspot. The Internet-connected mobile phone acts as a portable router when providing tethering services to others.

27. Malware, short for malicious software, consists of programming (code, scripts, active content, and other software) designed to disrupt or deny operation, gather information that leads to loss of privacy or exploitation, gain unauthorized access to system resources, and other abusive behavior.The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code.

28. A honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer, data, or a network site that appears to be part of a network, but is actually isolated and monitored, and which seems to contain information or a resource of value to attackers.

29. A cache is a component that transparently stores data so that future requests for that data can be served faster. The data that is stored within a cache might be values that have been computed earlier or duplicates of original values that are stored elsewhere. If requested data is contained in the cache (cache hit), this request can be served by simply reading the cache, which is comparatively faster. Otherwise (cache miss), the data has to be recomputed or fetched from its original storage location, which is comparatively slower. Hence, the more requests can be served from the cache the faster the overall system performance.

30. A Trojan horse, or Trojan, is software that appears to perform a desirable function for the user prior to run or install, but (perhaps in addition to the expected function) steals information or harms the system. The term is derived from the Trojan Horse story in Greek mythology.

31. Overclocking is the process of operating a computer component at a higher clock rate (more clock cycles per second) than it was designed for or was specified by the manufacturer.

32. The MD5 Message-Digest Algorithm is a widely used cryptographic hash function that produces a 128-bit (16-byte) hash value., MD5 has been employed in a wide variety of security applications, and is also commonly used to check data integrity.

33. An assembly language is a low-level programming language for computers, microprocessors, microcontrollers, and other programmable devices. It implements a symbolic representation of the machine codes and other constants needed to program a given CPU architecture.

34. A hash function is any algorithm or subroutine that maps large data sets to smaller data sets, called keys. For example, a single integer can serve as an index to an array (associative array). The values returned by a hash function are called hash values, hash codes,hash sums, checksums or simply hashes.

35. In computer security and programming, a buffer overflow, or buffer overrun, is an anomaly where a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory. This is a special case of violation of memory safety.

36. Buffer overflows can be triggered by inputs that are designed to execute code, or alter the way the program operates. This may result in erratic program behavior, including memory access errors, incorrect results, a crash, or a breach of system security. They are thus the basis of many software vulnerabilities and can be maliciously exploited.

37. Remote File Inclusion (RFI) is a type of vulnerability most often found on websites. It allows an attacker to include a remote file, usually through a script on the web server. The vulnerability occurs due to the use of user-supplied input without proper validation. This can lead to something as minimal as outputting the contents of the file, but depending on the severity .

38. SQL often referred to as Structured Query Language is a programming language designed for managing data in relational database management systems (RDBMS). Originally based upon relational algebra and tuple relational calculus, its scope includes data insert, query, update and delete, schema creation and modification, and data access control.SQL injection or SQLi is a code injection technique that exploits a security vulnerability in some computer software. An injection occurs at the database level of an application (like queries). The vulnerability is present when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and unexpectedly executed. Using well designed query language interpreters can prevent SQL injections.



Final words

Now, let's talk about actual hacking. Here is a basic guide on how to become a hacker, Read and learn more hacking tutorials from that post and become an actual hacker (Only in legal ways).

Tuesday 23 June 2015

UniBot - A Complete Tutorial For Making A Functional Configuration

UniBot - Making A Functional Configuration- picateshackz.com

This is the only article giving you the complete UniBot tutorial for making a functional configuration, 
Don't know how else to start, so I'll start with FAQ about this tool:

What is UniBot?
- UniBot is a unique program that is used for quick and easy creation of HTTP bots, without knowledge of any programming language and without any torment from designing GUI. It can be found here: http://mikisoft.me/programs/unibot (Virus scan)

For what is it actually used?
- You can create whatever thing comes to your mind, but most of them are some simple bots on which you will substantially lose time creating it in some IDE.

Does that mean I can create any type of bot?
- Yes, if you are skilled enough. You can create for example bots for voting or commenting, or you can make some bot that will rip out specific content from pages on some site, etc.

I have opened the program and nothing seems to be clear to me.
- That's why I decided to make this tutorial because interface of the program looks complicated, but once you begin to understand everything that I have presented in the following, it should be much clearer (at least I hope so).

So, let's start...

--- User interface ---


As you have seen if you've already downloaded and run the program, the interface may seem a little hard to understand, but don't be afraid. The following picture should cover most of the things that you'll need to know:





index - each index contains of one HTTP request (GET or POST) or solving logical statements (If-Then)
strings - that is data which is gathered before or after the execution of the request, depending on where the string is actually used (on this topic I'll write most because it's very important to know)
If clauses - a place to test strings if they meet certain conditions, and on that basis to decide what next to do (ie. which is next index or to stop the execution of the process)
results - a place where the string results are shown (if that is enabled in their options)

--- Indexes ---


Like I said, indexes must contain at least one request or logical statement for solving. We'll focus on the first.
As you know, the definition of each Internet bot is to assemble and send a specific HTTP requests, in order to achieve a specific goal. So in this program there are indexes, that present a separate templates of certain requests by which program is headed. As can be seen, each index can have a name for easier orientation.
To complete the formation of a HTTP request, there are two important items: POST data and additional headers, which are starting to appear mostly from the second request by gathering the results of the strings. Don't be confused because I only mention HTTP requests - HTTPS is supported, too.

--- Strings ---


This is the key point of the program, so you should pay special attention in order to learn to make bots after finishing this.

We'll begin with the facts:
- strings usually occur after execution of the first request
- each string should contain at least one command
- command that determines what will be the result must be valid and in accordance with the request that was previously sent
- most of the strings are essential for the continuation of the process
- they're executed depending on where they are used - before or after sending request
- their usage is %name% (where "name" is a name of the string)
- the string will not be executed if it isn't public and if there is no place in the index where it is used


If you understand this then we go into analysis of a string that contains one command:

Code:
'Hey!'+rpl('Hello, world!','world','Miki')
Now let's analyze its parts:

'Hey!' - everything that is under normal apostrophe represents a constant, and this constant is located at the beginning of the string so that will be the first thing printed into it

+ - character for merging command with constant, or with another command

rpl('Hello, world!','world','Miki') - it can be assumed that this is the command for replacing specific text, so in this case in the text "Hello, world!" it replaces "world" with "Miki"

The overall result would be:

Hey!Hello, Miki!
These are actually some of the most basic things you need to know if you want to go into the world of programming, but I wouldn't call this real programming because you must know a lot more than working with strings. Anyway, moving on...

If you haven't heard of regular expressions, then you should first look at them because they are very important for the formation of the string result. I will not talk about that, because you have a lot of examples and explanations all over the Internet.
The basic command for executing them (which looks like previous) is as follows:

Code:
rg(source,regex,replacement)
Example:
Code:
rg('Hey!Hello, Miki!',', (.*?)!','$1')
Result:
Miki

Independent commands:

These are commands that are processed even if they're located in the constants ie. under apostrophes.

First and most important command is: [src]
In its place there will be a complete page source (after completing request of course), with response headers at the beginning.

Second important command is: [nl]
Considering that the commands and the constants are written only in one line, I had to find a way to print the constants in multiple lines, so in place of this command a new line separator will be printed.

Third: [rnd]
In its place will be put random generated characters (upper and/or lower case letters, numbers and symbols), or a number from a given range.
To determine the range of characters that will be included, between the last letter and ] you have to add some of these letters:
U - since the default setting is to include only lowercase letters, this command specifies that onlyuppercase letters are considered
M - mixed-case: mixed uppercase and lowercase letters
L - includes only letters
D - includes only numbers
S - includes only symbols
The last three letters that define a range of characters can be combined, so we have the following example to generate random email addresses:

'[rndLD]@gmail.com'
Result would be:
6g4fog9bdl1fajn@gmail.com
As you can see, there is a default number of characters to be printed, and it's 15. To change this, again at the end we add number of characters that we want to be printed:
'[rndLD8]@gmail.com'
Result:
q6pxd1hp@gmail.com
As I mentioned above, there is another thing about this command - and that is to generate a random number from the specified range. Its usage is very simple:
Code:
'[rnd5-10]'
Obviously, this will generate some number between 5 and 10.

Fourth: [inp]
In the place of this command will be the user input, which usage is equivalent to the command above (except the U and M letters that are unnecessary in this case), so I will not say anything more about this.


String options:

After defining the string, the button next to it ("...") will be enabled which represent the options for that string. Click on it to get the following little window, where we choose which options will be used:




Crucial - it is important for the continuation of the process
Public - it is available in the other indexes for modification and usage
Array - after processing the string, if more than one result occurs (when using regex or input), this option applies the template to each of them separately (by making sub-threads), but if the option is disabled then only the first result is used
Output - this is the option that will show the string results in the main window

--- If clauses ---


The next are If clauses, which of course are not required if there is a HTTP request in a given index. If both are included, then the request will be executed first with all the strings that are with it, and then the If clauses with its strings. (After that the public strings that haven't been put in the HTTP request nor the If clauses will be executed.)
It is a simple principle of making them, so everyone could understand it without explanation (even better if he knows the mathematical logic, ie. the basics of programming). What I will mention is the operation depending on the results of an entire If clause, which will of course be one of the two possible outcomes - in the case where the If clause is true and the case where it is false. For the both cases, the options are the same.
We see on the right side option "Change proxy" - if the seconds to wait are not defined, it changes current to the next proxy address before proceeding to the next index ("Go to") or finishing process ("Finish"). If there is no available proxy address and the seconds are defined, then the process will not be stopped because seconds to wait will be chosen as alternative.

And that's it.

--- Additional stuff ---

Removing indexes:

You don't have to manually modify configuration file to delete indexes, instead of that do this:
1. If a given index contains only a request, then delete the URL field and you will be asked whether you want to delete the entire index.
2. If a given index contains only an If clause, then delete it. If it contains more than one, in the very first field type [clear] and hit Enter.
3. If a given index contains both, then use ways from above to delete them.


Proxy and thread settings:




Same proxy for each thread - every thread will act independently with a proxy list
Do not retry with another proxy - do not retry request if proxy is bad


Other (dependent) string commands:

u(text) - converts the text to uppercase
l(text) - converts the text to lowercase
b64(text) - encrypts the text with Base64
md5(text) - encrypts the text with MD5
<file> - loads the given file as text (by positioning to the folder where is the program itself)


multipart/form-data POST requests with files:


Code:
POST /?action=analyze HTTP/1.1
Host: samplesite.org
Content-Type: multipart/form-data; boundary=------280841152422961
Content-Length: 6818
------280841152422961
Content-Disposition: form-data; name="DataType"

file
------280841152422961
Content-Disposition: form-data; name="ImageFile"; filename="picture.jpg"
Content-Type: image/jpeg

ÿØÿà(...)
For the request above, we type this into the Post field:
Code:
['DataType':'file';'ImageFile':<picture.jpg>]

String builder:


In the field for entering string commands, (if it's not blank then before everything) type [build]and hit Enter.


Tutorial for making a functional configuration


Note: You'll need Google Chrome or Mozilla Firefox browser.

Let's say we want to make a bot that will give a vote here:


Provide a Visual Basic 6 Community edition - to allow free download of the VB6 programming language – Visual Studio

First of all, we open UniBot and paste that URL into the first index:



Then we open the browser and go to incognito/private browsing mode to be sure that none of the cookes exist.
After that, we open developer console (Ctrl+Shift+I), select Network tab and then navigate to the above URL.
We'll see something like this:



Now, we go to the top of the list on the right where is developer window and select the first item. A new window will show below, so we select "Headers" tab and then focus on "Response Headers":



For us the important thing will be "Set-Cookie" parameters, so we see that they're two unusual (ID cookies):

__cfduid
_session_id


The response headers are also part of the [src], so we have to extract that two values from it using two regex commands below:

Code:
rg('[src]','__cfduid=(.*?);')
Code:
rg('[src]','_session_id=(.*?);')

We put these commands where they belong:

Then we have to make these strings to be public, because we'll use them in another index. For the each of them, go to options ("...") and check "Public":

Now we'll focus on the browser window and clear the items in the list by clicking here:


After that, we should give a vote and catch that request. Click on the "Vote" button on the page and select a number of votes. We will now see this:


You can see that the first item and after it another one in the list is a POST request. We click on the first and select again "Headers", but we now focus on the "Request Headers" and notice these things:


There is some another parameter (CSRF token) that we haven't catched, and it must be in the page source if it wasn't in the very first response header from above. We open up the page source (Ctrl+U) and find it's value:


We have now a problem with forming a command to extract that value from source. It can't be like this:

Code:
rg('[src]','<meta content="(.*?)"','$1')
Since there are two meta content tags, the result would be the first:
Code:
authenticity_token
We solve this by pointing out to start from the second result. Since the first result is 0 then for the second result command will be:
rg('[src]','<meta content="(.*?)"','$1',1)
We repeat the steps for making a public string from above, and we got now the current (but not final) look of the first index:

If you have done all of this, you can select the second index:


We'll now back to the browser window and right click on the first item from the list, and select to copy link address:


The URL is now copied into our clipboard. We paste it into the URL field in UniBot:


Now, we back on the "Request Headers" in the browser below list, to look for the POST data that was sent:


We'll form it like this for the Post field in UniBot and ignore "debug" parameters:

Code:
site2=1&forum_id=121579
It will now look like this:


Also, we must include as additional headers cookies (in strings "cfduid" and "sessionuid") that we have extracted earlier, and the CSRF token:


Now we'll back on the browser. We will focus on the "Response Headers", to see yet another unusual cookies (ID and for authentication):


Again, we repeat the previous steps for making public strings with these commands:

Code:
rg('[src]','_uservoice_uid=(.*?);')
Code:
rg('[src]','auth_token=(.*?);')
And after you have done all of that, the second index finally should look like this:


Now, we click in the browser on the "votes.json" item in the list and focus on its "Request Headers". We'll see this:


Again, we find it's content in page source:


We'll use this command to extract it:

Code:
rg('[src]','client_key: "(.*?)"','$1')
We back to the first index and put that command into a new string, so it should look like this:


Don't forget to make that string also to be public!

Now, we back on the browser window again and copy link address of the "votes.json" from the list, and then paste it into the third index:


Because it's also a POST request, me must fill the Post field too. In the browser we focus again on the "Form Data" (below "Request Headers"):


As we have seen eariler, we form request like this:

Code:
uninitialized=true&to=3&oauth_signature_method=HMAC-SHA1&oauth_consumer_key=%oauthkey%
As usual, we fill the additional headers with needed data (but this time we add "uid" and "auth" string into the cookies), and we got this:


Note: You can make all strings to be Crucial, if you want to see if commands for them work correctly.

And that's it! You can now test the config or pass it to someone to do it for you if you don't want to search for proxy, since you've voted already from your IP (I don't know will it work if you remove the votes in the browser, since it's another session).