ABOUT US

Welcome to ViP IT TIPS and TRICKS here you got more information about IT Tips and Tricks....So Must click on http://vipittips.blogspot.com

COMPUTER

Welcome to ViP IT TIPS and TRICKS here you got more information about IT Tips and Tricks....So Must click on http://vipittips.blogspot.com

HACKING

Welcome to ViP IT TIPS and TRICKS here you got more information about IT Tips and Tricks....So Must click on http://vipittips.blogspot.com

DOWNLOADS

Welcome to ViP IT TIPS and TRICKS here you got more information about IT Tips and Tricks....So Must click on http://vipittips.blogspot.com

TIPS AND TRICKS

Welcome to ViP IT TIPS and TRICKS here you got more information about IT Tips and Tricks....So Must click on http://vipittips.blogspot.com

TUTORIALS

Welcome to ViP IT TIPS and TRICKS here you got more information about IT Tips and Tricks....So Must click on http://vipittips.blogspot.com

OTHER STUFFS

Welcome to ViP IT TIPS and TRICKS here you got more information about IT Tips and Tricks....So Must click on http://vipittips.blogspot.com

Sunday, May 11, 2014

Copy data from USB without letting the victim know.

Hey Guys , Here I got an Awesome Trick for you :-
Sometimes you want to copy data from usb
without letting the victim know , Now the question is How ???
Here is the Answer :-
With this , you can copy files to a Hidden folder , Without Letting the victim know , You only have to insert the usb it will Copy Data automatically From USB to your PC On Inserted 
We sometime wish that if someone insert
his/her USB Into your pc then its data
automatically copy in to your system in
hidden Form.
There is no need of software for this , we will
make it possible with the help of some Dos
commands.
So lets get started, Follow the below steps.
1. open cmd
2. type copy con filename.bat
3. now type "xcopy
i: f:\copied /h /s /c /q /i" remove " "
4. type Exit
5. press f6
6. now it will create a batch file named
filename.bat
xcopy is a command which is used to copy
file and folder
i: is the name of your pen-drive drive name
replace with your drive name
f:\copied is the name of folder where you
wish to copied data is to be placed replace
with your own folder or path
/h is used to copy hidden files also
Now copy this file into desktop now
whenever someone insert his/her USB into
your system then click on this file his data is
automatically copied into the folder specified
by you.

Thursday, May 8, 2014

Wifi Hacking - WEP (Using Kali Linux).

Wifi Hacking - WEP (Using Kali Linux)

Firstly, create a wireless network to crack. Don't use this method on others. It is illegal. Then proceed with the steps below.


1. Find out the name of your wireless adapter.
Alright, now, your computer has many network adapters, so to scan one, you need to know its name. So there are basically the following things that you need to know-
lo - loopback. Not important currently.
eth - ethernet
wlan - This is what we want. Note the suffix associated.
Now, to see all the adapters, type ifconfig on a terminal. See the result. Note down the wlan(0/1/2) adapter.

2. Enable Monitor mode
Now, we use a tool called airmon-ng to create a virtual interface called mon. Just type
"airmon-ng start wlan0"
Your mon0 interface will be created.

3. Start capturing packets
Now, we'll use airodump-ng to capture the packets in the air. This tool gathers data from the wireless packets in the air. You'll see the name of the wifi you want to hack.
"airodump-ng mon0"

4. Store the captured packets in a file 
This can be achieved by giving some more parameters with the airodump command
"airodump-ng mon0 --write name_of_file"
Now the captured packets will be stored in name_of_file.cap
You have to wait till you have enough data (10000 minimum)

5. Crack the wifi
If all goes well ,then you'll be sitting in front of your pc, grinning, finally you've got 10000 packets (don't stop the packet capture yet). Now, you can use aircrack-ng to crack the password. (in a new terminal)
"aircrack-ng name_of_file-01.cap"
The program will ask which wifi to crack, if there are multiple available. Choose the wifi. It'll do its job. If the password is weak enough, then you'll get it in front of you. If not, the program will tell you to get more packets. The program will retry again when there are 15000 packets, and so on.
Note : This will not work with WPA-2.

Share.... :)

Wednesday, May 7, 2014

Hack Into Gmail And Facebook Using Kali Linux.!

Hack Into Gmail And Facebook Using Kali Linux! 

1. Open the backtrack terminal use the ifconfig command to find your IP address.

2. On the terminal type cd /pentest/exploits/set

3. You will need to have the Social Engineering Toolkit (SET) for this one.

4. Start this us and then choose the second option, which says ‘Website Attack Vectors’.

5. In the next part, you have to select the fourth option, which says ‘Tabnabbing Attack Method’.

6. Choose the second option, which is ‘Site Cloner’.

7. Now you have to enter the URL of the website that you want to clone or hack into. In this case the URL will be www.gmail.com. The SET will automatically create the clone. Press enter in order to continue.

8. The URL now needs to be converted into the Google URL. For this use goo.gl and send the link address to you’re the person you want to attack. This you can do in a myriad number of ways like email, chat etc.

9. When your victim will open their internet browser for Gmail, they should get a message saying that the page is still loading. As soon as they open a new tab, the fake clone that we made will start functioning.

Saturday, May 3, 2014

Learn To Hide Files Behind The Images.

Learn To Hide Files Behind The Images

In order to do this you should have basic understanding of command line.

1. 
Select an image to be used for hiding file behind the image.

2. 
Now select file to hide behind the image and make it in .RAR format. With the help of the WinRAR

3. 
And most important is that paste both the files on desktop. You may do this anywhere instead of desktop if you have some basic understanding of command line.

4. 
Now open cmd by going to Start > Accessories > Command Prompt and type following commands in it.

cd desktop


5. CD stands for change directory by typing above command you change your directory to desktop. After that type command given below.

Copy /b imagename.jpg + filename.rar finalimage.jpg


6. *Replace imagename.jpg with the name of image you want your file to be hidden behind. Don't forget to add image format (Eg: .jpg,.png,.gif)
*Replace
 filename with name of your file you want to hide. It must be in .rar format.Finally Replace finalimage.jpg with whatever name you want your final imagewith hidden files should be. This is the image where your file will be hidden.

7. Now when you will try to open this newly created image it will open as normal image, but to open you hidden file you need follow steps given below.
How to access the hidden file ? 
To access your hidden file you need to open the newly created image in winrar. Just follow simple steps given below to do that.

    1. Open winrar
    2. Now locate your image and open it or simply drag your image in winrar.
    3. Extract the file and done.




Thursday, May 1, 2014

How to become an Ethical Hacker.


I often get a number of people ask more for guidance about how they can become an ethical hacker. I also receive even more requests about how to become a black hat hacker. The latter requests are ignored.

So the long and short of it is that it’s easy to be a script kiddie and load up Armitage or Fast-track and fire every exploit known to man at a target. But what’s the point at firing Linux exploits at a Windows box!. 

If you want to get into the IT security world as a white hat you must be competent in the following areas:
  1. Networking 
  2. Programming 
  3. Databases
Once you have a fairly good knowledge of the above points THEN it would a good idea to learn about hacking. So now you have a good understanding of the fundamentals of IT, you can now understand how to break some of the underlying vulnerabilities within computer architecture. 
The following activities should help you with this:

Read books about hacking (Here are some good examples of some)
  • Hacking: The Art of Exploitation, 2nd Edition 
  • The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy (Syngress Basics Series)
  • Metasploit: The Penetration Tester’s Guide 
  • BackTrack 5 Wireless Penetration Testing Beginner’s Guide 
  • CEH Certified Ethical Hacker All-in-One Exam Guide 
  • Google Hacking for Penetration Testers 
  • The Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws
Undertake various online courses
  1. CEH 
  2. OSCP 
  3. SANS SEC560
Communicate and follow other fellow IT security enthusiasts through the following mediums