Thursday, 26 May 2016

How To Hack Accounts Passwords -Password Breaking Tools

How To Hack Accounts Passwords -Password Breaking Tools 2016

1.Password hashes:

Passwords that you type in your computer operating systems are stored somewhere on the disc in the form of hashes.These hashes are not in clear text therefore to access these hashes root/sysadmin privilages are required.In windows operating system these hashes are stored on the local disc in the SAM file,while in linux stores these hashes in /etc/shadow file.Hence to encrypt out the password out of these hashes the root access is required and therefore the password can only be cracked by this process only if the operating system can be in your control for some time or you can use the system by your own.






a)Dictionary:

Using dictionary attack to find the password out of hashes is the simplest and fastest method.It just runs through dictionary of words and tries each one of them to check whether it works or not.It could seem to be impossible if it has to be done manually as one cannot try so many passwords at a time but the best thing is that your computer can do so in just a minute or even less to find up the password.Use this trick and find out the password from the hashes where some programs available on internet will help you find the correct password out of the bundle of text of hashes.

b)Rainbow table:

Most systems now a days uses hashes to store the password but as we know these hashes are encrypted files.To crack up the encryption is to take the dictionary file that we has found in above step and hash it again and then compare it with the hash file that was accessed previously from the system.That takes a lot of time and uses intense CPU but this process checks the password that we got through dictionary of hash file to be correct.

2.Using Software to hack:

There are many softwares available on the internet that do help you to crack the various accounts.These softwares uses some commands and some information to find the encrypted pasword and then crack it.Some softwares can even hack the accounts in few minutes which is great but every password cannot be cracked by this method.Still this method is used mostly to crack the accounts as it the easiest method to do so.You just has to provide the required information and the rest of process will be done by softwares only.

Here are some of the best hacking software used till date:

a)John The Ripper:

The world’s best known tool to crack up the passwords that can crack up the password for linux operating system strictly using the command line.It uses built in default password cracking technology and attempts to crack password first by dictionary attack and if that fails it then tries combined dictionary words and still if that does not works it tries the hybrid attack of dictionary words with special characters and words.At last if that all does nothing then it uses its special brute force feature that will be enough to find the required account password.

b) Ophcrack:

It’s a free rainbow table-based password cracking tool for Windows and is among the most popular password cracking tools and can also be used on linux and mac systems.It crackes LM and NTLM hashes.Although this program can crack the password only if you have the hash file of the operating system without that it is of no use.Still it can probably crack most accounts.


How To Hack Accounts Passwords -Password Breaking Tools 2016

3.Online account hacking:

Accounts can be hacked using online hacking tools that uses some information about the account and using that it can crack up the accounts.Online tools are pre programed to do so and can be the easiest way to hack passwords if you are familier with some of the information of account.Following are some of the best online hacking tools that you can use:

a)Brutus:

Many consider it to be the fastest online password hacking tool and is also free and available for both Linux and Windows.It supports password cracking in HTTP,POP3,FTP,SMB,Telnet and other types such as IMAP,NNTP,Netbus,etc.Brutus is open source tool and is best for doing online hacking of many types of accounts.

b) THC-Hydra:

Probably the most widely used online hacking tool that is capable of hacking web form authentication and when it is used with other tools like Tamper Data,it can become a powerful and effective tool for cracking nearly every type of online password authentication mechanism.

4.Password cracking Hardware:

These are special type of machines designed only to perform some type of operation to hack up the data or the accounts of the system when connected to it.These machines or these type of hardware is amazingly powerful and can perform any task in about 1 million of time that general hardware may take.These hardwares can be available on rent for hacking systems or accounts.Some of the best password cracking hardware are:

a)Botnet:

These machines are simply a function of brute force computing power and these machines are basically used for cracking the passwords in very very less time than that of general computers.The same can be done to network also and it can access about network of one million machines.

b)ASIC:

These are application specific devices that can work about to hack any system or account.These machines can work faster than over 100 CPU working togather.

5)Hidden Softwares:

Look like if you are using someone else computer or smartphone and your account was found to be hacked after some days but you remember to log out all the sessions on that system.You could be amazed to know that your login could be recorded on the computer or smartphone by some sort of software or application that remains hidden to other people and can record their passwords and account data also.Here are some softwares that can do up the same trick:

a)Keyloggers:

Keyloggers is a specifically designed software that can record the account logins and send it to a file at a particular location in your storage.That records contain the account details and their passwords also.This software is very popular to hack the accounts if your device is used by others to access their accounts.

b)KeyCounter:

Similar software that also uses the recorded information like Keyloggers.This also is another popular software that is used to hack the accounts using hidden recording of the login details and password.

An African Hacker Stole $2 Million Worth of Airline Tickets Through Phishing

An African hacker, Eric Donys Simeu, 32, of Cameroon pulled off a massive phishing scam that saw him making off with over $2m (£1.38m) worth airline tickets. According to the US Justice Department, Simeu sent out numerous targeted phishing emails between July 2011 and September 2014 to employees of various air travel firms.

The emails were specifically sent to impersonate official communications, in order to trick the victims into opening fake websites and logging in with their official details. The hacker targeted those employees with access to GDS (Global Distribution System) network, which is generally used by air travel and tourism firms to access airline severs to buy or sell flight tickets.
According to the US officials he obtained the GDS login credentials for two companies which includes one from Atlanta, Georgia, and another from Southlake, Texas. After logging into the GDS network he issued numerous airline tickets, which he either used for his personal travels or resold to customers in West Africa at a fraction of their real price.
Simeu was arrested by the French police in September 2014 when attempting to use one of his own fraudulent air tickets to travel from Casablanca, Morocco, to Paris. The US finally extradited Simeu and the case is still being investigated by the FBI and the Justice Department.

Bangladesh Probes 2013 Hack for Links to Central Bank Heist




Bangladesh police are reviewing a nearly forgotten 2013 cyber heist at the nation's largest commercial bank for connections to February's $81 million heist at the country's central bank, a senior law enforcement official said on Wednesday.
The unsolved theft of $250,000 (roughly Rs. 1.67 crores) at Sonali Bank involved fraudulent transfer requests sent over the Swift international payments network. It is not widely known outside of Bangladesh, and in fact was treated as a cold case until Bangladesh police revived the investigation after thieves in February also used the Swift network to steal $81 million from Bangladesh Bank.
Sonali Bank said it had informed Swift about the 2013 heist at the time and also unsuccessfully tried to recover the money from the recipients in Turkey, said one bank source.
Thieves in the 2013 robbery used tactics similar to those used by the yet-to-be-identified criminals in the Bangladesh Bank heist using the Swift money-transfer system to divert bank funds, said a senior bank official. Authorities are now reviewing the case to see if there are any links that can help them track down the criminals behind the Bangladesh Bank heist.
At Sonali Bank, hackers installed key-logger software on a computer to gain passwords to other systems, then sent fraudulent transfer requests over Swift, said the senior bank official who is part of its IT operations.
Police arrested two employees who had responsibility for initiating and approving money transfer instructions, but they were later freed without being charged.
Sonali Bank Managing Director Pradip Kumar Dutta told Reuters that the attackers remain at large and no money has been recovered.
"We could not find out what happened," the official said.
The Sonali Bank cyber heist is the fourth documented case involving fraudulent SWIFT messages and the earliest known case to surface. It is not known whether any of the robberies, including the two attacks on Bangladesh banks, are related.
The two other cases that have come to light are a $12 million (roguhly Rs. 80 crores) theft from Banco del Austro in Ecuador in January and an attack on Vietnam's Tien Phong Bank in December that was not successful. The Sonali Bank theft was reported by Bangladesh media at the time, but has faded from public memory. Police said they only recently became aware of similarities with the central bank heist. "This is an interesting issue that we've come to know," said the senior police official, who declined to be identified further. "We'll have to look into it."
News of these attacks has tested faith in the security of Swift, a key conduit for global financial transactions that is used by more than 11,000 banks and other institutions. Regulators and banks have already implemented reviews of Swift security measures to determine whether other banks could be vulnerable to similar attacks. Swift spokeswoman Natasha de Teran declined to comment on the Sonali case.
"We are actively looking into other possible instances of such fraud, but we will not comment on individual entities," she said.
Bangladesh's Anti Corruption Commission, which investigated the Sonali case, did not have an immediate comment.

Hackers Link Over 2,500 Twitter Accounts to Sex Websites: Symantec


More than 2,500 Twitter accounts have been compromised to tweet links to adult dating and sex websites, global cyber-security leader Symantec said on Tuesday.
There were a number of high-profile accounts caught up in the hacking, including ones belonging to the band Chromeo, a journalist working for The Telegraph, stand-up comedian Azeem Banatwala, Houston Texans wide receiver Cecil Shorts III and the late New York Times reporter David Carr, the report added.
The attackers changed the profile photo and the basic information of the accounts to promote adult sites.
"Rather than tweeting or direct-messaging users, the attackers used these compromised accounts to like tweets and follow other users, hoping to capitalise on users being curious enough to investigate their Twitter profiles," the report noted.
If users visit the compromised profile, they will see tweets - with sexually suggestive photos and shortened links - that claim to offer free sign-ups to watch "hot shows" over webcam or dates and sexual encounters.
Symantec believes the culprit responsible for these compromises earns $4 for each person who signs up for the adult dating site.
The company also noted some steps to secure the Twitter accounts.
It asked users to create strong and unique passwords or use a password manager if you want to create and securely store your passwords.
"Instead of relying on just a password, consider enabling Twitter's Login Verification that requires you to enter a code that is sent to your mobile phone. This adds an extra layer of security," the company said.