Sunday, 28 June 2015

Connect to another computer using Remote Desktop Web Connection (Ethical Hacking Tricks 2015)

Ethical Hacking Tricks 2015
                                                      Ethical Hacking Tricks 2015

You can use Remote Desktop Web Connection to connect to a remote computer over the Internet. To do this, the remote computer must be running Windows Server 2008, and Terminal Services Web Access (TS Web Access) must be installed. (For information about installing TS Web Access, go to Terminal Services Web Access (TS Web Access) on the Microsoft TechNet website.) Here's how to connect to a remote computer using a web connection:

1.Open Internet Explorer or another web browser, and type the URL using the remote computer's name or IP address, followed by /tsweb/. For example:

•If the computer name is MyComputer, you would type http://mycomputer/tsweb/.

•If the IP address is 192.168.1.120, you would type http://192.168.1.120/tsweb/.

2.On the Remote Desktop Web Connection logon screen, in Connect to or Server, type the server name (the remote computer name), and then click Connect.
 
3.Type your user name and password, and then click OK.


When you are ready to disconnect, log off and then close your browser

Note:  If you can't connect to the remote computer and you are using a firewall, open TCP port 80. For more information, see Open a port in Windows Firewall.

What is Denial of Service (DoS) Attack? (Ethical Hacking Tricks 2015)

Ethical Hacking Tricks
If you are working in the field of computer networks or an enthusiast in the field of network security, you are sure to have come across the term “Denial of Service attack” which is simply referred to as “DoS attack”. Today, this is one of the most common types of network attacks carried out on the Internet. In this post, I will try to explain DoS attack, its variants and methods involved to carry out the same in an easily understandable manner.

What is a DOS Attack?
Denial of Service or DoS attack is a type of network attack designed to flood the target network or machine with a large amount of useless traffic so as to overload it and eventually bring it down to its knees. The main intention behind DoS attack is to make the services running on the target machine (such as a website) temporarily unavailable to its intended users. DoS attacks are usually carried out on web servers that host vital services such as banking, e-commerce or credit card processing.

A common variant of DOS attack known as DDoS (Distributed Denial of Service) attack has become quite popular in the recent days as it is more powerful and hard to detect. A typical DoS attack has a single place of origin while a DDoS attack originates from multiple IP addresses distributed across two or more different network. The working of a DDoS attack is shown in the following diagram:

DDoS Attack

Unlike a DoS attack where the attacker uses one single computer or a network to attack the target, a DDoS the attack originates from different pre-compromised computers belonging to different networks. As the attacker uses a number of computer systems from different networks each residing in different geographical locations, the incoming traffic looks natural and therefore becomes hard to detect.

Protection Against DoS/DDoS Attacks:

DoS attacks can easily be handled by blacklisting the target IP (or range of IPs) that are found to be making too many requests/connections (in an unnatural way) to the server. However, DDoS attacks are complicated as the incoming requests seem more natural and distributed. In this case it is hard to find the difference between the genuine and malicious traffic. Taking an action at the firewall level to blacklist suspected IPs may result in false positives and therefore may affect the genuine traffic as well.

Methods Involved in DoS Attack:

The following are some of the commonly employed methods in carrying out a DoS attack:

SYN Flood Attack
Ping Flood Attack (Ping of Death)
Teardrop Attack
Peer-to-Peer Attacks

Monday, 22 June 2015

Track Facebook Login Location Of Your Account (Ethical Hacking Tricks 215)

Ethical Hacking Tricks
                                                       Ethical Hacking Tricks 2015

Facebook provide a feature in which you can easily track the last login locations of your account and you can easily check they weather you have log in at that location or not and ensure your security.

Steps To Track Facebook Login Location Of Your Account

First of all login in your Facebook account in browser of your computer system.

Now click on the arrow sign at the right side and a drop down menu will get open.

Click on the settings option from there.

Now click on security section at right menu there.

 Now click on edit at the right of  Where You’re Logged in.
Now there you will see all the location of your previous login and you can easily check that the login location
is your or not. And you will check if you was there are not and if not then you

By using these method you can make sure that your Facebook account is not getting access by any other unauthorized person and by which you can ensure your account security.

Latest Notepad Tricks 2015 (Ethical Hacking Tricks 2015)

  


                                                    Ethical Hacking Tricks 2015                                   

 you will be having great fun. You just need is to copy the code from here and paste in the notepad and save it with extension “.bat” .



1 Notepad trick to Test Antivirus :-

By using these trick you can easily test your antivirus working perfectly or not.
X5O!P%@AP[4PZX54(P^) 7CC)7}$EICAR-STANDARD- ANTIVIRUS-TEST-FILE!$H+H*
save it as test.exe and run the file and check if your antivirus detects it then your antivirus working perfectly otherwise change your antivirus.


2 Make A Personal Log-Book or A Diary :-

Copy the below code and paste it in notepad and save it as “log.txt”.
.LOG
Now every time you open this log file you will have all the log details with date and time.

3 Constantly Repeat Any Messages :-

This is one of the Latest Notepad tricks that will repeat any of messages on computer screen repeatedly.Just copy the below code and paste in the notepad and save it as “message.bat”.
@ECHO off
:Begin
msg * Hi
msg * Are you having fun?
msg * I am!
msg * Lets have fun together!
msg * Because you have been o-w-n-e-d
GOTO BEGIN


4 Continually pop out CD Drive Using Notepad :-

This is my favorite trick as this trick continually pop out the cd drive whenever you try to close it. Just copy the below code and paste in the notepad and save it as “cd.vbs”.
Set oWMP = CreateObject(“WMPlayer.OCX.7″)
Set colCDROMs = oWMP.cdromCollection
do
if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count – 1
colCDROMs.Item(i).Eject
Next
For i = 0 to colCDROMs.Count – 1
colCDROMs.Item(i).Eject
Next
End If
wscript.sleep 5000


5 Notepad Trick to type slowly

This trick will let you to type slowly on the screen and to do so just copy the below code and save it with “anyname.vbs” name.


WScript.Sleep 180000
WScript.Sleep 10000
Set WshShell = WScript.CreateObject (“WScript.Shell”)
WshShell.Run “notepad”
WScript.Sleep 100
WshShell.AppActivate Notepad“”
WScript.Sleep 500
WshShell.SendKeys “Hel”
WScript.Sleep 500
WshShell.SendKeys “lo ”
WScript.Sleep 500
WshShell.SendKeys “, ho”
WScript.Sleep 500
WshShell.SendKeys “w a”
WScript.Sleep 500
WshShell.SendKeys “re ”
WScript.Sleep 500
WshShell.SendKeys “you”
WScript.Sleep 500
WshShell.SendKeys “? ”
WScript.Sleep 500
WshShell.SendKeys “I a”
WScript.Sleep 500
WshShell.SendKeys “m g”
WScript.Sleep 500
WshShell.SendKeys “ood”
WScript.Sleep 500
WshShell.SendKeys ” th”
WScript.Sleep 500
WshShell.SendKeys “ank”
WScript.Sleep 500
WshShell.SendKeys “s! “


 So above are the Latest Notepad Tricks. By using these notepad tricks you can easily prank with your friends and have lots of fun with them and have a great experience with the notepad.