Monday 23 October 2017

What is Deepnet or Darknet?

Image result for darknet


Many people keep on asking me "What is Deepnet or Darknet?"


Therefore, the normal search engine can not access the site formed Deepnet. This includes sites where its robots.txt is set to prevent Google and other search engines from indexing them on the Internet in order to exclude them from the search. They can be private personal website, intranet and so on.

However, Darknet (the term is often used interchangeably with Deepnet) is not just an index for preventing search engines. Darknet on the site is anonymous, that you can not know who the site is, access to such a Darknet site when the owner. Unlisted site owners can still be traced back to who purchased the domain name and so on. Sites in Darknet are sites that use the Tor (The Onion Router) network. The basis of the Tor network is to include so many nodes where the origin can not track where the data is coming or from.

Ordinary browsers can not open the top domain name for .onion's Darknet site because they are not normal domain names, but a string of random characters followed by .onion. These domain names are created by onions when you use an onions or Tor network hosting anonymous sites. So if you try to access a Web site in Darknet, the DNS server does not have any clues to the content, and you will receive an error that the site has not found. Only the onion server knows how to fix these domain names.

Darknet is part of the Internet that hosts anonymous sites that may or may not provide legal content.

You will need a Tor browser to view these sites. Read our comments on the TOR browser to learn more about the onion router and how it works.

Who uses Darknet or Deepnet? Is it dangerous?
This may be as simple as a group of friends who are discussing serious problems, or as dangerous as an assailant's service. May be the journalists who want to work, the possibility of being sentenced to imprisonment, or who may be drug traffickers and weeds. If there is no fear of being caught, the informant who exports the information has this information, and there is also a child pornography on the website.

Most of the underworld was abused by criminals. This is because it provides almost complete anonymity. Where they sell services such as paying for murder (assassin service), all types of pornography, prostitutes, drug traffickers, weed sellers. That's why Darknet is considered dangerous.

Often some links will not tell you where they are leading unless you access them from a reliable Darknet directory. It is possible that you click on the link to some discussion and put it on an assassin's page. If there is any problem, the police will knock on the door.

Why the authorities can not ban Darknet?
The TOR network was originally created by an American military base and communicated anonymously. They are still reproduced in the underworld government files, rather than open to the public. There are anonymous intranet to store these files, and those who have the password can access these files. Since the federal government and other governments themselves are using Darknet, they do not think that the TOR will be shut down.

This is a free hand for criminals, journalists, informants, etc. They can create and host anonymous sites that only provide anything but can not search from the surface network (or the normal network - possibly the site is not indexed), nor can the mainstream browser open these sites because they do not depend on the traditional DNS server The All Darknet / Deepnet has a .onion domain, accessible only through the TOR browser, and some projects can use the TOR network. But the easiest way to get into Darknet is the TOR browser.

Dear friends, kindly give your opinion or experience if you have ever surf deep web or black-market..
NOTE: please there should be restriction of word due to some kids and immature being.

ALERT!!!: New fast IOT botnet threat to break the internet

BOTNET TARGETING COMPUTER

Just a year after the biggest IoT-based malware in the future, a huge Internet crash was launched by launching a massive DDoS attack - a year ahead, security researchers are warning a new fast growing IoT botnet.
Researchers first discovered "IoT_reaper" by the odd tiger 360 company in September, and the new malware no longer relied on cracked passwords; instead, it exploited vulnerabilities in various IoT devices and swallowed them into botnets.

IoT_reaper Malware currently includes the following nine previously disclosed vulnerabilities in the IoT device vulnerability of the following manufacturers:


  1. Dlink (router)
  2. Netgear (router)
  3. Linksys (router)
  4. Goral (camera)
  5. JAWS (camera)
  6. AVTECH (camera)
  7. Vacron (NVR)

Researchers believe that IoT_reaper malware has infected nearly 200 million devices and has grown 10,000 new devices at an extraordinary rate every day.

This is very worrying, because last year the use of large-scale DDoS attacks Mirai removed the DNS provider Dyn, only 10 million infected devices.
In addition, the researchers pointed out that malware also includes more than 100 DNS resolvers, enabling it to start DNS amplification attacks.

"Currently, this botnet is still in its early stages of expansion. But the author is actively modifying the code, which deserves our vigilance." Qihoo 360 researchers say.

At the same time, CheckPoint researchers have warned that the same IoT botnet, called "IoTroop", has been infected with hundreds of thousands of organizations.

"It is too early to guess the intentions of the threat actors behind it, but with previous Botnet DDoS attacks essentially taking down the Internet, it is vital that organisations make proper preparations and defence mechanisms are put in place before attack strikes." researchers said.

According to CheckPoint, IoTroop malware also exploited vulnerabilities in wireless network camera devices such as GoAhead, D-Link, TP-Link, AVTECH, Linksys, Synology.

At this time, do not know who created this, why, but DDoS threat pattern is soaring, and may reach tens of megabytes of size.
"Our research suggests we are now experiencing the calm before an even more powerful storm. The next cyber hurricane is about to come." CheckPoint researchers warned.

You need to be more vigilant about the security of your smart devices. In our previous article, we have provided some essential, somewhat practical, solutions to protect your IoT
devices.
SOURCE: https://thehackernews.com/2017/10/iot-botnet-malware-attack.html

Termux: The android terminal emulatior


Termux is an Android terminal emulator and Linux environment application that works directly without taking root or setting up. Automatically install the smallest base system - you can use the APT package manager to provide additional packages.

Termux is also a terminal emulator is a program that makes your Android phone like an old computer terminal. It is useful for accessing the built-in Linux command line shell for each Android phone. This allows you to run various Linux command line utiliti

USES OF TERMUX APP!!

Secure Access. Use OpenSSH's ssh client to access the remote server. Termux combines standard packages with precise terminal emulation in a beautiful open source solution.

Feature packed are selected between Bash, Fish or Zsh and nano, Emacs or Vim. Through your SMS inbox. Access the API endpoint and use rsync to store a backup of the contact list on the remote server.

Customizable. By installing the APT package management system from Debian and Ubuntu GNU / Linux you want to install. Why not start with Git and sync your dotfiles?


Explorable. Are you sitting on the bus and want to know which parameters tar accepts? The packages provided in Termux are the same as the packages on Mac and Linux - install the man pages on your phone and read them in a conversation and experiment in another session.


Friday 20 October 2017

How to hack a Facebook account online?

Image result for hack facebook online


Hackers Facebook / Facebook Hackers are one of the most popular hot topics on the Internet, like Gmail hackers. We have prepared a detailed list of how hackers in a few minutes easily hijack someone's Facebook account, how can we prevent this situation? For your information, this is more than 4000 words of the article, there are a lot of useful information, so most people can not read the full article. We have downloaded all of the following technical PDFs for offline downloads, so you can store them on your phone or computer anytime, anywhere.

As FB white hat hackers, I often get the following questions from people:

Is there an online Facebook cracker?
Where can I get FB hacker software?
Is there a free Facebook password finder?
How can i easily hijack someone's Facebook account?


As far as I know, there is no such tool. You will not be able to find it anywhere. However, if you use Google, you will find that many sites claim that they provide free hacking tools online or offline, but you can not download the password file in the case of a completed survey. Even after an annoying completion of the investigation process, you have nothing to get. These things are just for making money. Do not waste your valuable time searching for such hacking tools.

If you want to know how hackers hijack someone's Facebook account, please read the techniques listed below. The most successful of all these techniques is PHISHING. Phishing allows users to easily steal Facebook account passwords in just a few minutes.

Check out this fishing guide to learn more about PHISHING!


Some of the techniques listed below do not apply to FBs, but to all everyday Internet sites such as Google, Twitter, Yahoo, and so on.

BEWARE!!! :- ATM malware is being sold on Dark Web market

ATM malware

ATM malware is available for sales on Dark site market which can  drain available cash on the ATM machine.


In May 2011, Kaspersky Security researchers noted that a forum was advertised with ATM (ATM) malware for specific vendor ATMs.

Since May 2017, malware has been sold on the AlphaBay Dark Web market, but since mid-July the US authorities have canceled AlphaBay, their administrators have started a new standalone site.

At the time of the study, the cost of the kit was $ 5,000. The AlphaBay description covers details such as required tools, targeted ATMs vendors, and tips and tricks for malware operations.

sources : https://latesthackingnews.com/2017/10/17/atm-malware-sold-dark-web-market-can-make-atms-drain-available-cash/


ALERT!: 25% of the Federal Government Mails are Fraud.



The research shows a study released Thursday by architect Agari.

Agari represents more than 400 federal websites, including the Ministry of Health and Human Services and the Department of Veterans Affairs, the Census Bureau and the Senate's real website, to support e-mail fraud.

Although the e-mail lists a word that is "from", the e-mail order does not verify that the message is actually sent to the address listed in the "of" field.

There are updated rules that can automatically verify e-mail, called DMARC. The order will double check whether the listed sender sends a communication, allowing the forged e-mail to be destroyed or sent to spam. The Department of Homeland Security (DHS) this week issued a directive that requires all federal agencies to complete DMARC.


In the case of
Agari and other providers can process DMARC and Agari according to DMARC-certified statistics.

Of the 335 million government e-miles studied by Agari, more than 85 million were fake.

Agari records that only 18% of federal domains have DMARC. Also, more than half of them will not take the DMARC's choice, ask the email provider to delete the fraudulent e-mail or publish it to the spam folder.

Take the time to comment on this article.
Related Posts Plugin for WordPress, Blogger...