Wednesday, 27 April 2016

Change this Facebook Privacy Setting That Could Allow Hackers to Steal Your Identity New Method 2016 By Sufyan Hacker

Posted by Sufyan Hacker  |  at  08:51:00


Tuesday, 19 April 2016

The top ten hackers of all times according to Anonymous hacktivist group

Posted by Sufyan Hacker  |  at  03:00:00


The top ten hackers of all times according to Anonymous hacktivist group.

Anonymous lists the top 10 best-ever hackers of all times

The online hacktivist group, Anonymous has named a British computer whiz Gary McKinnon as the most dangerous hacker of all time. Anonymous is a hacking collective that has a website nominally associated with the group, which describes it as “an Internet gathering” with “a very loose and decentralized command structure that operates on ideas rather than directives.” The group became known for a series of well-publicized hackings and distributed denial-of-service (DDoS) attacks on government, religious, and corporate websites.
The group who have released an album of the top 10 best-ever hackers, wrote: “Although sufferers of Asperger’s tend to have difficulty in social situations, they have usually proven to be outright geniuses in one particular subject.”
“For Gary? It is computers.
“In 2002 he made a strange message appear on US army computer screens.
“It read: ‘Your security system is crap, I am Solo. I will continue to disrupt at the highest levels.”
Let’s have a look at the top 10 best hackers of all times:

10. Kevin Poulsen

Kevin Poulsen 2014.png
Branded the “Hannibal Lecter of computer crime” in the 80s by Los Angeles police, Kevin Lee Poulsen is an American former black hat hacker and a current digital security journalist. His most notorious hack was a takeover of all of the telephone lines for Los Angeles radio station KIIS-FM, guaranteeing that he would be the 102nd caller and win the prize of a Porsche 944 S2. He has also exposed more than 740 sex offenders online.
Caught by the FBI in 1991, he pled guilty to counts of mail, wire and computer frauds and also exposing info on a secret business run by the FBI. He was given 51 months in prison (then the longest sentence ever given for hacking). He was also banned from using computers or the Internet for 3 years after his release.

9. Albert Gonzales

Albert Gonzalez is an American computer hacker and computer criminal who is accused of masterminding the combined credit card theft and subsequent reselling of more than 170 million card and ATM numbers from 2005 through 2007—the biggest such fraud in history.

8. Vladimir Levin

Vladimir Leonidovitch Levin is a Russian-born Jewish individual famed for his involvement in the attempt to fraudulently transfer USD 6.7 million via Citibank’s computers into his own personal accounts. Only £270,000 of the cash was recovered.

7. Robert Tappan Morris

Robert Tappan Morris.jpg
Robert Tappan Morris is an American computer scientist and entrepreneur. He is best known for creating the Morris Worm in 1988, considered the first computer worm on the Internet.
On November 2, 1988, Morris released a “worm” that took down 10 per cent of the internet, crippling 6000 computer systems. Morris was prosecuted for releasing the worm, and became the first person convicted under the then-new Computer Fraud and Abuse Act.

6. Michael Calce

Michael Calce, who went by the online name Mafiaboy when he launched a massive cyberattack at the age of 15, now works as a security consultant for companies trying to protect their online systems.
Michael Calce, whose internet alias is MafiaBoy, launched a series of highly publicized denial-of-service attacks (DDoS) in February 2000 against large commercial websites, including Yahoo, Amazon, Dell, eBay, CNN, FIFA, and E*TRADE. He also launched a series of failed simultaneous attacks against 9 of the 13 root name servers.
Caught and convicted in Montreal’s youth court, he was sentenced to eight months in an open custody programme with one year of probation and restricted internet use.

5. David Smith

We owe our thanks to Smith for creating and distributing the infamous “Melissa” virus. Even though Smith claims that the virus was never meant to do harm, the virus is said to have infected up to 20% of computers worldwide.
Around March 26, 1999 Melissa was put in the wild by David L. Smith of Aberdeen Township, New Jersey. (The virus itself was credited to Kwyjibo, who was shown to be macrovirus writers VicodinES and ALT-F11 by comparing MS Word documents with the same globally unique identifier — this method was also used to trace the virus back to Smith.) On December 10, 1999 Smith pleaded guilty and was sentenced to 10 years and fined US $5,000. The arrest was the result of a collaborative effort involving (amongst others) the FBI, the New Jersey State Police, Monmouth Internet and a Swedish computer scientist.

4. Adrian Lamo

Adrian Lamo.png
Adrian Lamo is a Colombian-American threat analyst and former hacker. He first gained media attention for breaking into several high-profile computer networks, including those of The New York Times, Yahoo, and Microsoft, culminating in his 2003 arrest. He used everything from libraries to coffee shops to avoid getting caught.

3. George Hotz

George Hotz.jpg
The acclaimed “jailbreak artist” will forever be connected with the April 2011 PlayStation breach. He is noted for his technical efforts and publicity with reverse engineering the PlayStation 3 video game console, and for subsequently being sued by and settling with Sony. However, releasing his hacking methods to the general public made his world a total mess.

2. Jonathan James

Jonathan Joseph James was an American hacker who was the first juvenile incarcerated for cybercrime in the United States. The South Florida native was 15 years old at the time of the first offense and 16 years old on the date of his sentencing. He died on May 18, 2008, of a self-inflicted gunshot wound.
With an amazing talent for hacking, he successfully broke into high security systems such as NASA and the department of defence aged just 15 and stole more than £1.1million of software. He also hacked into the Defence Threat Reduction Agency and intercepted more than 3000 internal messages while assembling usernames and passwords.

1. Gary McKinnon

Gary McKinnon.jpg
Labelled as the best-ever “black hat” hacker by Anonymous, Gary McKinnon is a Scottish systems administrator and hacker who was accused in 2002 of perpetrating the “biggest military computer hack of all time,” even though he himself states that he was merely looking for evidence of free energy suppression and a cover-up of UFO activity and other technologies potentially useful to the public.
He was accused of hacking into 97 United States military and NASA computers over a 13-month period between February 2001 and March 2002, causing a total of over £500,000 in damage
The US authorities stated he deleted critical files from operating systems, which shut down the United States Army’s Military District of Washington network of 2,000 computers for 24 hours. McKinnon also posted a notice on the military’s website: “Your security is crap”.
After the September 11 attacks in 2001, he deleted weapons logs at the Earle Naval Weapons Station, rendering its network of 300 computers inoperable and paralyzing munitions supply deliveries for the US Navy’s Atlantic Fleet. McKinnon was also accused of copying data, account files and passwords onto his own computer. US authorities stated the cost of tracking and correcting the problems he caused was over $700,000.
He faced trial in the US and up to 70 years in jail if convicted. On 16 October 2012, after a series of legal proceedings in Britain, Home Secretary Theresa May withdrew her extradition order to the United States under human rights laws amid fears that he would kill himself.



Monday, 18 April 2016

Facebook Cookie Stealing And Session Hijacking 2016 By Sufyan Hacker

Posted by Sufyan Hacker  |  at  04:51:00

Facebook Authentication Cookies

The cookie which facebook uses to authenticate it's users is called "Datr", If an attacker can get hold of your authentication cookies, All he needs to do is to inject those cookies in his browser and he will gain access to your account. This is how a facebook authentication cookie looks like:
Cookie: datr=1276721606-b7f94f977295759399293c5b0767618dc02111ede159a827030fc;

How To Steal Facebook Session Cookies And Hijack An Account? 
Its For You Narender Yadav
An attacker can use variety of methods in order to steal your facebook authentication cookies depending upon the network he is on, If an attacker is on a hub based network he would just sniff traffic with any packet sniffer and gain access to victims account.

If an attacker is on a Switch based network he would use an ARP Poisoning request to capture authentication cookies, If an attacker is on a wireless network he just needs to use a simple tool called firesheep in order to capture authentication cookie and gain access to victims account.

In the example below I will be explaining how an attacker can capture your authentication cookies and hack your facebook account with wireshark.

Step 1 - First of all download wireshark from the official website and install it.

Step 2 - Next open up wireshark click on analyze and then click on interfaces.

Step 3 - Next choose the appropriate interface and click on start.

Step 4 - Continue sniffing for around 10 minutes.

Step 5 - After 10minutes stop the packet sniffing by going to the capture menu and clicking on Stop.

Step 6 - Next set the filter to http.cookie contains “datr” at top left, This filter will search for all the http cookies with the name datr, And datr as we know is the name of the facebook authentication cookie.

Step 7 -  Next right click on it and goto Copy - Bytes - Printable Text only.

Step 8 - Next you’ll want to open up firefox. You’ll need both Greasemonkey and the cookieinjector script. Now open up and make sure that you are not logged in.

Step 9- Press Alt C to bring up the cookie injector, Simply paste in the cookie value into it.

Step 10 - Now refresh your page and viola you are logged in to the victims facebook account.

Note: This Attack will only work if victim is on a http:// connection and even on https:// if end to end encryption is not enabled.


The best way to protect yourself against a session hijacking attack is to use https:// connection each and every time you login to your Facebook, Gmail, Hotmail or any other email account. As your cookies would be encrypted so even if an attacker manages to capture your session cookies he won't be able to do any thing with your cookies.


Friday, 8 April 2016

Facebook is hiding your messages in a ‘secret’ inbox, here is how to read them 2016 Sufyan Hacker

Posted by Sufyan Hacker  |  at  02:11:00

Here’s how you can read your ‘secret’ Facebook messages

Did you know there is a “secret” Facebook Messenger inbox that stores messages that you probably didn’t know existed and may contain certain important messages you would like to read, but had no idea you had received it.
It turns out you don’t always get a notification to alert when messages arrive from people with whom you are not friends with on Facebook, meaning they are nearly always missed. In other words, it basically works as a spam inbox.
If Facebook decides something is probably spam, some messages are diverted to a special folder ‘filtered requests’ in the ‘Message Requests’ inbox, where it can lay around unread. Facebook only notifies you if it senses you might know the sender, otherwise everything else is assumed to be spam.
Previously, it was revealed a secret Facebook folder marked as ‘other’ could contain important messages users have never seen. It used to be the case that the messages would sit in there until you checked.
To view all these filtered messages, follow the steps below:
  1. Open up Facebook Messenger on your phone
  2. Hit the “Settings” icon in the top right corner
  3. Select “People”
  4. Select “Message Requests”
  5. Below the messages that appear there, hit the link saying “See filtered messages”
All of the messages Facebook deemed as spam will automatically appear and in chronological order. Since, you won’t be getting notifications about the filtered messages, it may still be worthwhile to check every now and then to ensure that you do not miss out any important message.


Thursday, 7 April 2016

How To Install And Run Bash On Ubuntu On Windows 10 Right Now 2016 By Sufyan Hacker

Posted by Sufyan Hacker  |  at  06:29:00

windows 10 bash shellShort Bytes: Microsoft has finally allowed the Fast Ring Insiders to install and run Bash on Ubuntu on Windows 10. This has been made possible with the help of latest Windows 10 Anniversary Update Preview Build 14316. Read more to know how to enable Linux subsystem and run Bash on Ubuntu on Windows 10.

At last week’s Build 2016 Developer’s Conference, Microsoft announced that it’ll be bringing tons of new features to Windows 10 users later this summer. These updates will be a part of Windows 10 Anniversary Update.
During the announcement, Microsoft focused on a key change in Windows 10 in the form of new Ubuntu binaries to allow you to install and run Bash on Ubuntu on Windows 10. About this announcement, Mark Shuttleworth, Canonical founder, said — “In our journey to bring free software to the widest possible audience, this is not a moment we could have predicted.”
Fulfilling its promise, Microsoft has released a new Windows 10 Insider build to the Fast Ring channel in the form of version 14316. For those who don’t know, the Windows 10 Fast Ring is the Insider channel that receives the first pre-release build of Windows 10.
Before going ahead and looking at the steps to install Bash on Ubuntu on Windows 10, make sure that you are a part of the Fast Ring.
Well, if you aren’t a part of the circle and you wish to join the Windows 10 Insider Fast Ring, here’s what needs to be done:

How to join Windows 10 Fast Ring to get Bash on Ubuntu on Window 10?

I’ll assume that you’re running Windows 10. To check if you are a part of Windows 10 Fast or Slow Ring, just click on the Windows logo on your desktop and go to Settings.
  • Now, click on Update & security icon on the windows to open the Windows Update page.
  • Locate Advanced options on this page and find the Get Insider builds section. Look for the section labeled Choose how you get your Insider builds and switch from Slow to Fast.
windows 10 developer mode

Update your Windows 10 OS to get Insider Build Version 14316:

Now the next step is to run the normal Windows Update by clicking Check for updates. This step will prompt your Windows 10 installation to check for the latest Windows 10 Fast Ring build.
Download the update and schedule a time for installation.

How to enable Developer Mode and Linux Subsystem on Windows 1o?

Now you are running Windows 10 build 14316, so, it’s time to launch the Windows 10 Developer mode to install any signed app and use advanced development features. This feature is a new addition and you need to enable this setting to run Bash on Windows 10.
  • To enable Developer mode in Windows 10, open Settings and go to Update & Security.
  • Locate For Developers option in left tab and select Developer Mode.
bash on ubuntu on windows 10 developer mode
  • Now select Turn Windows features on or off after searching in the Start Menu.
bash on ubuntu on windows
  • As the next step in our process of running Bash on Windows 10, you need to locate Windows Subsystem for Linux (Beta) and check the box to enable it.
bash on ubuntu on windows 10 linux subsystem
  • Wait till the feature is installed on your Windows 10 PC. Now, reboot your system and proceed with how to install and run Bash on Ubuntu on Windows tutorial.

How to install and run Bash on Ubuntu on Windows 1o?

Once you’ve enabled Developer Mode and Linux Subsystem on Windows 10, it’s to download Ubuntu binaries and install them on your Windows 10 PC.
  • To do this, you need to open a Command Prompt window. Now type bash and hit enter. This will show the following message:
 – – Beta feature – –
This will install Ubuntu on Windows, distributed by Canonical and licensed under its terms available here:
Type “y” to continue
bash on ubuntu on windows 10 installation
  • Well, the next obvious step is to enter y to continue. This will ask Windows 10 to download Bash from Windows Store in few minutes.
  • Now, to run Bash on Ubuntu on Windows 10, you need to open a new Command Prompt window and type bash and hit enter. So, now you are right inside in the Unix Bash shell.
bash on ubuntu on windows 10 running
  • You can see the Ubuntu version by hitting lsb_release command.
bash on ubuntu on windows 10 ubuntu version
Alternatively, you can use Bash on Ubuntu on Windows 10 by using the new desktop app:
bash on ubuntu on windows
Here it is:
bash on ubuntu on windows

Did you find this tutorial helpful? Or, are you facing any problem? Let us know in comments below.


Tuesday, 5 April 2016

How to Reset a Router Password to Factory Settings 2016 Sufyan Hacker

Posted by Sufyan Hacker  |  at  00:37:00

This guide teaches you how to hard reset a router. Hard resetting a router restores the router to its factory default settings. The most common reason to hard reset a router is to reset the router user name and password.

Problem: Can't LogIn To Router - Forgot Router Password

Uh oh, you forgot your router user name and password. Lost passwords and user names are a common problem. Luckily there is a simple solution.

Solution: Reset Router Password to Factory Settings

Performing a hard reset on your router will reset your router to its factory default settings. This means that the router user name and password will be reset to their default settings also. After hard resetting your router you should be able to log in using the default user name and password for your router.

TroubleShooting Steps

Wait! Before hard resetting your router, we suggest that try a few troubleshooting steps that might get you logged in. Follow these three steps to troubleshoot.
  1. Check Router IP Address

  2. Make sure that you are using the correct IP address to log in to your router. If you are unsure of your router's IP address then please take a look at our How to Find Your Router's IP Addresses page.
  3. Try Logging In Using the Default UserName and Password

  4. If you are unable to login to your router, try logging in to your router using your router's default user name and password. The default router user names and passwords for each router can be accessed on our default user name and password page.
  5. Hard Reset the Router

  6. If the steps above were not enough to get you logged in to your router then it's time to hard reset your router. Please note that hard resetting your router will reset all of your router's settings to their default settings. Your router might use a different default IP address than the IP address you are currently using. If you have trouble after hard resetting your router, please refer to TroubleShooting Step #1.

How to Hard Reset a Router

On the back or bottom of your router you should find a small pin sized reset button.
how to reset a router
  • While your router is plugged in, press and hold your router's reset button for 30 seconds. You may have to use a paperclip or pin to press your router's reset button.

  • You should notice your router's lights flicker and flash. That is an indication that your hard reset is taking effect.

  • After you've held your router's reset button down for 30 full seconds, allow the router to reboot. (Just leave your router alone for a few minutes and allow it to gather itself.)

  • Finally, try logging in to your router once more. Remember that you must now use the default user name and password for your router. If you still are having difficulty logging in to your router, go back to TroubleShooting Step #1 and rinse and repeat.
If you were able to log in to your router then congratulations! Thank you for letting be of service to you. Check out our selection of free guides. From networking to gaming, p is your computer information source.


How to find your router’s IP address and login info 2016 By Sufyan Hacker

Posted by Sufyan Hacker  |  at  00:30:00

router ip address

Tired of being the only wireless network in your apartment building without a clever name like “Wu-tang LAN,” or “Bill Wi the Science Fi?” Are you done going without a password that protects uninvited guests from accessing your internet connection?
Most routers come with a default IP address and login credentials, which vary from one manufacturer to the next. If you haven’t bothered to go in and make changes to your network settings, you may find that you can still access the admin panel using that information.
After you’ve gained access to your router’s settings, you can change how your network is displayed, who can access it, and make sure your connection is secure. It would also be a great time to change that default username and password so that no one else can use this guide to change the access protocols back.
Most Linksys routers have the same default settings as the popular WRT54G, a router that’s known for its powerful versatility, and its ability to be flashed with custom firmware. The admin panel can be accessed on most Linksys routers by navigating to in the address bar of your Web browser, and by logging in with the default username and password. They are both “admin” without the quotation marks.
If you’re using a Linksys router designed specifically for Comcast, or you’re renting one from them, the username may instead be “comcast,” and the password may be “1234.” You’ll want to make sure to change the passwords of your router the first time you log in, lest you leave yourself susceptible to anyone on your Wi-Fi network accessing your router’s admin settings page.


For almost all Belkin routers, the default IP will be, which is slightly different from many other manufacturers. Due to the method in which login credentials are set up, chances are you won’t have to enter anything in the username and password fields when trying to access the admin panel. By default, Belkin routers have no password on the admin account. The username field should either be blank, or may require you to type in “admin” instead.
You’ll definitely want to change the username and password if you have a Belkin router.  It’s simple for someone with access to your network to make changes in the admin panel that could cause holes in security, or allow them to install malware, and hacking software.


While a number of Netgear routers may have the login credentials printed on the bottom or back of the device, Netgear has made it easy to access your admin panel even if it’s not written down. If you’re using a Netgear router, simply entering in the address bar of your Web browser allows you to change settings, and turn on wireless security. The login username will almost always be “admin,” while the password will either be “password,” or “1234” if you’re on an older device.
While having a text URL can be easy to remember, it also makes your router’s settings more vulnerable. If someone has access to your network, they don’t need to determine its IP address. For this reason, it’s particularly important to change the default login to prevent unwanted changes to network settings.


Almost all Asus routers use a standard as the default IP, making it easy to access simply by typing that IP address into your browser. The username and password should be “admin” on almost all models and firmware revisions. These default passwords can help if you’ve never changed the settings before, but it’s recommended that you change them the first time you access the admin panel to prevent unauthorized access by anyone who’s able to access your Wi-Fi network.

Other routers

Regardless of your router brand or model, there is a surefire way to find its IP address even if it isn’t operating on the default settings. If you’re running Windows 7, you can open a command prompt by typing “command” into the search field in the Start menu, and clicking the top result. In the window that opens, type “ipconfig” to bring up a page with information on your network’s connection.
Router IP Cmd 
The field marked “Default Gateway” shows the IP address of whatever router you’re connected to at the time. For almost all routers, you can enter this IP address in your Web browser’s URL bar to open the admin panel.
If you’re running Mac OS X, this information can be found in the System Preferences application. Under Network, select the tab that corresponds to your current connection (wired or wireless), and the IP address of your router will appear as “Router,” or “Default Gateway,” depending on the version of your operating system.
There are many different companies that make routers, and if yours isn’t listed here, RouterPasswords has compiled a large database of default usernames and passwords sorted by make and model. If you find that you aren’t able to log in to the admin panel with one of these, then your login credentials may have been changed at some point.
You can get around this by performing a factory reset on your router. The process that involves doing this depends on the model you have, but instructions can be found in the router’s documentation, along with the default settings that will allow you to reconnect and update settings after the reset is completed.
If you can’t find the official documentation, simply Googling “manual” or “pdf” along with the make and model of your router should help you find it in no time.
Don't forget to like ou FB PAGE


Get our latest posts directly in your email inbox.Click on RSS

Google+ Badge


Copyright © 2016 Hacking Tips and Tricks Designed By Sufyan Hacker
back to top
' type='text/javascript'/>