Hacking

You might also like

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 3

ANKIT FADIA

[HACKING GURU]

BOOKS OF ANKIT WADIA ARE


1] Guide to ethical hacking. 2] Networking security: a hackers perspective. 3] The ethical guide to corporate security. 4] Mobile hacking. 5] Windows hacking 6] E-mail hacking.

HE ORGANIZE THE LECTURE ON FRIDAY 13 JULY AT 11.00 AM. SOME POINTS DISCUSSED BY THEM ARE ... 1] Proxy software:

Proxy software give protection you from to accessing or know IP number of your computer. When anyone knows your IP then anyone can access your data from your PC or Laptop. It can download from net freely. The website is www.anonymizer.com . Be connected with this website before you want connected with your favorites websites. There are one more website is www.anonymizer.ru.com . Then go through any Russ ion website because more websites of Russia are free and attacker feels that you are accessing any website from Russia.

MORE WEBSITES OF DOWNLOADING PROXY SOFTWARE WWW.SAMAIR.RU/PROXY.COM This website provides much more address of other website which contains addresses of much more website. TO PROTECT FROM ILLEGAL SMS Open email header. When you open it you will seen that number of lines but dont confused. Find the lines started from word RECEIVED.Now delete the lines other than lines of received word .Then delete all received lines which are upper one .Now remain only on received lines .Now find the IP number containing this line. And this IP number of computer sends the illegal SMS to you. The software used that time is Neotrace professional software. NOW WE WILL INTRODUCE THE DANGROUS SOFTWARE NAMED AS TROJAN. This software uses for control the other computer which is net connected and user (victim) of this computer unknown about this. The version 1.70 of this software allows you following option to control victims computer. 1] OPENCDROM: This option opens the CDROM of the victims computer. 2] SHOWIMAGE: This option displays the image on victims computer that we want. 3] SWAPMOUSE: This option change the clicking of victims mouse i.e. right click into left click and left click into right click. 4] SCREENDUMP: This option takes photo of their computer screen and displays it on our computer. 5] PLAYSOUND: This option used for to play sound on victims computer.

6] EXITWINDOWS: This option used to close .shut down or restart the victims computer. 7] LISTEN: From the use of this option we can get password, credit card number and also others important numbers. 8] GOTOURL: From this option we can open the website of any person without entering their password or identifying the password. 9] KEYMANEGER: This option is useful to press any key of the keyboard of victims computer. 10] FILEMANEGER: This option is used to access, downloading, delete the any file of the victims.

THE WEBSITES TO DOWANLOADING THE TROJAN SOFTWARE ARE 1] WWW.PACKETSTORMSECURITY.ORG Their versions are 1] Net bus. 2] Girlfriend. 3] backorrifice. TO FIND THE PASSWORD OF THE YOUR FRIENDS OR ANYONE BROTUSCNAMEOF SOFTWARE IS USED.

THE SITES OF ANKIT FADIA ARE 1] WWW.HACKINGMOBILEPHONES.COM 2] WWW.FADIA.ANKIT@GMAIL.COM

You might also like