This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

My Journey on Hacking

Before starting up with this topic, I would like to say, I don't do any of the hacking activities for financial gain (I earn and take payment only if I am involved in legal activities). I have most of the leaked data but I have nothing to do with anyone's info. I keep them only to extract encrypted passwords to make an application & let people know which passwords not to use (its just like cyber security services).

In addition to this, everyone involved in Ethical Hacking or Hacking or Cyber Security have a pseudonym & we must use it to hide our true identity.

Now, coming to my journey…

When I was in Intermediate (K12) in 2006/7, one of my classmate asked other classmate whether he know about hacking. With the curiosity, I asked him what is hacking. If they gave minimum info about what it is, I wouldn’t have researched about it at all but they replied by saying its hard to explain / you are noob & cannot understand it. So, I felt sad as I didn’t get what I want to know. And when I got back home, I started searching online about hacking and all, I started learning like crazy because everything was so new as I got my 1st computer just few days before. I just started understanding about basics of networking, Linux was so new for me at that time, started learning about how network infrastructure works, started learning basic programming. Daily I start learning something new & even today I learn something new. Thanks to those two friends who replied me rude when I asked about hacking because after I started learning, I hacked into their Orkut account (I think) and gave them their passwords. Their shocking expression made me happy because its not only result of my learning but its payback to talk rude.

Then after K12, there was a long holiday between K12 & Engineering Degree, so I started learning more about hacking and at that time I came across dark web. When all my friends were having fun outside & making girlfriends, I was having amazing time learning.

I would say, Hacking is equal to OCEAN. There is no end to learning because there is no end to changes in existing software development.

When can we stop learning about hacking?
Its when all softwares, all operating systems, all internet & intranet infrastructure, all satellites, all vehicles, all sensors, all electronics, all wireless technologies, all IoT devices etc. get 100% secured & 100% vulnerability free, that will be the end of hacking & learning hacking, so now you know when you will have 100% knowledge. I say it’s never.

When I joined engineering, I was quiet and used to hack into friends’ accounts & say them their password (no harm). Then in 2008, I created this blog & started writing whatever I learnt before & whatever I was learning at that time. So, I feel in love with writing. Also, I started grabbing hacking tools from DarkWeb & used to post on globalhackerstools.blogspot.com (now its unavailable). I was so happy that I started getting more than 4000-5000 views per day on this blog site.

Then I came to know about google adSense, so as I am already eligible due to site traffic, my account got approved so soon. This was my first money making option from online. You will soon be able to understand why I am still writing these blogs (it’s not for adSense, lol).

I used to do marketing of my blog even in college by writing blog link everywhere possible but unfortunately, I was nicknamed as hacker in college either due to my activities on others accounts or due to this blogging link. But most of them don’t know my real name, they used to call me as hacker which I am not.

After college in 2011, I started hacking into most popular social networking website accounts after finding some vulnerabilities & in that process I unfortunately got connected to my ex. And after her, I started concentrating more on my career than having fun with hacking.

Then I started my business and wasn’t active in these activities but things are not going to be the same. I want to convert my fun into profession. So, I got Ethical Hacker Certification in 2012 (I think) & started providing penetration testing services & also I started getting sub contracts of big projects. In 2014, I started with another business, brokeup with my ex, stopped pen-test services and due to a long gap, programming is out of my mind. In 2015, I again got involved in hacking social networking website accounts but this time its for growing my business just by connecting with unknowns who are also interested in business. In same year, I got connected to my 2004-05 crush & became friends. From then I was more into work than hacking activities.

Again, now in 2021, I got here just to get rid of my stress & depression. I think we must do some positive activities which make us feel good & excited. Getting connected with other hackers, checking about new CVEs and all activities related to Hacking is my Stress Buster (at present). I don’t know when I will quit this again.

I hate those who are involved in ransomware activities, they rip company’s fortune. I hate all those hackers who are taking advantage of their skills. If all / most of them get involved in some technology, we would have been into much advanced world.

If you want to HACK, then hop onto Journals, grab them and start working on the development.


RockYou2021 8.4 Billion Passlist is a garbage

I am so embarrassed with this garbage called RockYou2021. I don't know who created it but, they are just random words. Its better you create your wordlist than using this.

I downloaded 2 zipped files, one is 8.7GB & the other is 4.5GB

After unzipping, its a huge 93GB TXT file

The real question is, will we be able to open it? LOL, no, I don't know really but I basically use EmEditor to open any text file which is in GBs but as I am using i7-7700k with 4.5Ghz speed processor, 32GB RAM, RTX 2060 GPU, this file is freezing my computer after 45GB of file load & I don't think I should wait further to view whole file.

Any use?
There are possibilities that this could be useful but mostly its just a random generated wordlist.

As per me, whatever the passwords are decrypted from leaked data would be better than using this. However I am not involved in cracking passwords as I don't have time for such shit.

Well, after checking with this file, I am deleting it which saves my disk by total of 104GB

Wanna peak into some security cameras?

 Wanna peak into some security cameras? Here is a list

http://66.192.13.197:8081/view/viewer_index.shtml?id=25
http://166.247.177.143:8080/
http://141.211.212.124/view/view.shtml?i...jpg&size=1
http://166.251.210.238:81/cgi-bin/guestimage.html
http://107.0.231.40:8083/view/index.shtml
http://47.49.38.178/#view 
http://66.94.163.131/en/index.html
http://50.122.69.182/
http://166.161.207.229/view/viewer_index.shtml?id=3024
http://108.222.132.93:8082/
http://166.241.55.31:81/cgi-bin/guestimage.html
http://166.166.212.11/view/viewer_index.shtml?id=14
http://98.102.110.114:82/view/viewer_index.shtml?id=269
http://166.165.35.36/view/viewer_index.shtml?id=232
http://209.240.57.239:8082/en/index.html
http://50.199.221.39/view/viewer_index.shtml?id=3871
http://108.161.217.10:88/view/viewer_index.shtml?id=284
http://128.223.164.214/view/view.shtml?id=94&imagepath=/mjpg/video.mjpg&size=1
http://173.13.113.38:8081/view/view.shtml?id=80&imagepath=/mjpg/video.mjpg&size=1
http://74.142.49.38:8000/view/viewer_index.shtml?id=11083
http://74.142.49.38:8001/view/viewer_index.shtml?id=2515
http://141.213.139.234/view/view.shtml?id=3554&imagepath=/mjpg/video.mjpg&size=1
http://70.61.121.222:5000/view/viewer_index.shtml?id=198
http://199.1.195.69/view/index.shtml
http://81.250.104.168:8081/cgi-bin/guestimage.html
http://77.195.79.67:8080/stream.html
http://80.15.105.84:8081/view/index.shtml
http://88.125.63.15:8080/view/viewer_index.shtml?id=257
http://82.65.210.152/home/homeS.html
http://86.193.127.205:8080/
http://78.219.129.63:10000/control/userimage.html
http://77.152.202.13/control/userimage.html
http://80.14.77.21:8082/cgi-bin/guestimage.html
http://217.128.13.193:82/control/userimage.html
http://82.127.80.153:10000/live.htm
http://109.18.19.97:2000/cgi-bin/guestimage.html

http://77.150.192.39:88/top.htm

http://41.41.233.243:8080/

http://93.95.173.49:8080/

http://83.234.97.117/view/index.shtml

http://95.25.156.209:8090/

http://92.101.149.203/

http://188.234.250.121/view/viewer_index.shtml?id=2759

http://212.26.235.210/view/index.shtml

http://91.199.196.151/view/index.shtml

http://75.144.124.21:1024/view/viewer_index.shtml?id=11030

http://176.139.87.16:8082/view/viewer_index.shtml?id=6591

http://217.128.36.206/view/view.shtml?id=8500&imagepath=/mjpg/video.mjpg?camera=1&size=1

http://217.128.111.137:8081/view/view.shtml?id=0&imagepath=/mjpg/1/video.mjpg&size=1

http://188.170.32.6:82/view/view.shtml?id=297&imagepath=/mjpg/video.mjpg?camera=1&size=1

http://84.130.192.135:8080/cgi-bin/guestimage.html

http://91.33.113.113:8082/cgi-bin/guestimage.html

http://91.56.175.137:8080/cgi-bin/guestimage.html

http://87.144.115.132/control/userimage.html

http://91.60.221.131:85/cgi-bin/guestimage.html

http://79.218.190.133/control/userimage.html

http://91.65.157.135:8080/

http://79.192.19.143:8083/en/index.html

http://79.192.19.143:8081/en/index.html

http://79.192.19.143:8082/en/index.html

http://188.193.63.112/#view

http://80.129.100.109:8084/control/userimage.html

http://92.218.63.115:10000/GetImage.cgi?CH=0

http://84.156.172.131:8080/control/userimage.html

http://91.39.206.113:8090/control/userimage.html

http://146.52.148.115/

http://84.154.52.86:8000/cgi-bin/guestimage.html

http://91.6.252.101:82/cgi-bin/guestimage.html

http://79.204.69.109/view/index.shtml

http://46.87.25.76:83/view/viewer_index.shtml?id=332

http://217.85.209.95:81/view/index.shtml

http://46.87.25.76:81/view/viewer_index.shtml?id=9290

http://79.239.184.68:8081/control/userimage.html

http://134.3.202.69:81/live/index.html?Language=9

http://84.180.84.56/control/userimage.html

http://78.43.226.26/control/userimage.html

http://84.129.244.8/view/viewer_index.shtml?id=1002

http://91.14.57.19:1024/img/main.cgi?next_file=main.htm

http://139.30.102.203:8080/

http://87.167.99.188/cgi-bin/guestimage.html

http://91.60.186.177:82/view/viewer_index.shtml?id=179

http://79.196.225.194:8080/

http://79.207.51.77:90/view/viewer_index.shtml?id=713

http://46.95.80.74/view/viewer_index.shtml?id=2553

http://185.89.39.70/control/userimage.html

http://93.200.202.53/control/userimage.html

http://217.86.194.35:8080/control/userimage.html

http://77.22.100.19:88/view/viewer_index.shtml?id=3760

http://77.22.100.19:81/view/viewer_index.shtml?id=4615

http://77.22.100.19:91/view/viewer_index.shtml?id=68

http://80.140.57.178:81/control/userimage.html

http://91.9.73.160:10000/live.htm

http://188.136.117.174/view/viewer_index.shtml?id=14110

http://156.67.224.173/cgi-bin/guestimage.html

http://217.235.232.150:81/control/userimage.html

http://87.175.249.136:8080/

http://185.152.246.17:83/control/userimage.html

http://91.184.171.191:81/view/viewer_index.shtml

http://185.152.247.15:8080/cgi-bin/guestimage.html

http://188.192.205.52/control/userimage.html

http://37.10.110.12:5000/control/userimage.html

http://217.251.103.12:90/cgi-bin/guestimage.html

http://109.192.121.4:2000/cgi-bin/guestimage.html

http://84.162.69.164/view/viewer_index.shtml?id=3828

http://87.144.118.135/cgi-bin/guestimage.html

http://87.128.105.199:88/view/viewer_index.shtml?id=187

http://77.235.169.131/control/userimage.html

http://178.69.16.130:82/view/view.shtml?id=7325&imagepath=/mjpg/video.mjpg&size=1

http://217.232.146.120:82/view/view.shtml?id=703&imagepath=/mjpg/video.mjpg&size=1

http://37.247.81.113:81/view/view.shtml?id=26&imagepath=/mjpg/video.mjpg?camera=1&size=1

http://37.247.81.113:86/view/view.shtml?id=17&imagepath=/mjpg/video.mjpg?camera=1&size=1

http://84.169.205.16:2000/view/view.shtml?id=121&imagepath=/mjpg/video.mjpg&size=1

http://87.175.249.57:8001/view/viewer_index.shtml?id=1063

http://77.64.173.153:8001/view/viewer_index.shtml?id=946

http://91.62.176.209/view/view.shtml?id=927&imagepath=/mjpg/video.mjpg&size=1

Learn Social Engineering

 I know you can't reac all those 407 pages of PDF to do social engineering activities. I too learnt from online. LOL, it's based on how social you are with people / victims to gather information from them.

I am not going to write whole info over here, I just found a pdf on internet.

Well, to be frank, I write these blogs just to relax myself while at work & I work almost 16 hours a day including Sundays.

Check This PDF

How passwords are cracked

Well, here are the possibilities

  1. Social Engineering by knowing about person and answer to questions when resetting password of any account
  2. Breached Data: Websites get hacked every single day & if there is an account in one of the hacked website database, its easy to get your password. But obviously there is an issue here, now a days websites are using encrypted password hashes means when you enter a password to register in website, that password goes through an algorithem and converts into long hash (set of random numerics & alphabets) and this encrypted password cannot be reversed. And whenever you login next time, that password which you enter gets encrypted with same algorithem and check whether saved hash is same as logging in password. So, there is one possibility to decrypt password which is called brute force. If password is retrieved after brute forcing, and same password is used elsewhere, then you can understand that your password is hacked.
  3. Phishing: This is a method to make you victim by making you feel like you are logging in to real website and stealing your login details. Assume that you received some threatening mail from your bank about your amount getting withdrawn, most of you are going to click whatever button you find there to check what went wrong which could be a phishing page (looks so similar to real banking page), you are probably going to enter your real username & password & those details will be sent to attacker. So here is the way most criminals practice.
  4. Bruteforce: As said in previous method, bruteforce is always final option which also consumes a lot of time & storage space. I will be explaining about it in simple way below because your password could be at risk.
Suppose I used a password as abcde & as many websites use different type of password encryption algorithems, these below are its converted encrypted hashes


Encryption Type Encrypted Password
DES:         $1$/NEhPgP7$KktqPXE5tiBeE6/Z5xuyH.
MD5:         ab56b4d92b40713acc5af89985d4b786
sha1:         03de6c570bfe24bfc328ccd7ca46b76eadaf4334
sha224:     bdd03d560993e675516ba5a50638b6531ac2ac3d5847c61916cfced6
sha256:         36bbe50ed96841d10443bcb670d6554f0a34b761be67ec9c4a8ad2c0c44ca42c
sha384:         4c525cbeac729eaf4b4665815bc5db0c84fe6300068a727cf74e2813521565abc0ec57a37ee4d8be89d097c0d2ad52f0
sha512:         878ae65a92e86cac011a570d4c30a7eaec442b85ce8eca0c2952b5e3cc0628c2e79d889ad4d5c7c626986d452dd86374b6ffaa7cd8b67665bef2289a5c70b0a1
ripemd128: a0a954be2a779bfb2129b72110c5782d
ripemd160: 973398b6e6c6cfa6b5e6a5173f195ce3274bf828
ripemd256: 81d8b58a3110a9139b4ddeccb031409e8af023067cf4c6f0b701dab9ecc0eb4e
ripemd320: a94dc1bc825db64e97718305ce36bfef32cc5410a630999678bcd89cc38c424269012ec8c5a95830
whirlpool: 5d745e26ccb20fe655d39c9e7f69455758fbae541cb892b3581e4869244ab35b4fd6078f5d28b1f1a217452a67d9801033d92724a221255a5e377fe9e9e5f0b2
snefru:         8d2891fc6020d7dc93f7561c0cfdde26426192b3e364a1f52b634482009dc8c8
snefru256: 8d2891fc6020d7dc93f7561c0cfdde26426192b3e364a1f52b634482009dc8c8
gost:         b18cfd04f92dc1d83325036bc723d36db25ede41ae879d2545fc7f377b700899
crc32:         f44d5ba3
crc32b:     8587d865
fnv132:         0e2fc14a
fnv164:     1f6062c561d33a4a
joaat:         b98559fc
haval128,3: 51d4032478aa59182916e6c111fa79a6
haval160,3: 8d7c2218bdd8cb0608ba2479751b44bb15f1fc1f
haval192,3: 4a106d88931b60df1ba352782141c473e79019022d65d7a5
haval224,3: 177da8770d5bf50e1b5d82dd60df2635102d490d86f876e70f7a4080
haval256,3: 3913ab70f6219eefe10b202de5991efdbc4a808203bd60bbfbfc043383ae8f90
haval128,4: 61634059d9b8336feb32ca27533ed284
haval160,4: f74b326fe2ce8f5ba151b85b16e67b28fe71f131
haval192,4: 88a58d9011ca363a3f3cd113ffeaa44870c07cc14e94fb1b
haval224,4: 3eef5dc9c3b3de0f142db08b89c21a1fdb1c64d7b169425dba161190
haval256,4: 8f9b46785e52c6c48a0178edc66d3c23c220d15e52c3c8a13e1cd45d21369193
haval128,5: 11c0532f713332d45d6769376dd6eb3b
haval160,5: 53734616dd6761e2a1d2bd520035287972625385
haval192,5: cddf16e273a09e9e2f1d7d4761c2d35e1dd6ee327f1f5afd
haval224,5: d8cbe8d06dc58095ec0e69f1c1a4d4a90893aae80401779ceb6646a9
haval256,5: c464c9a669d5b43e4c34808114dce4ecc732d1b71407e7f05468d0b15bff7e30
tiger128,3: bfd4041233531f1ef1e9a66d7a0cef76
tiger160,3: bfd4041233531f1ef1e9a66d7a0cef76a3e0fe75
tiger192,3: bfd4041233531f1ef1e9a66d7a0cef76a3e0fe756b36a7d7
tiger128,4: 7fd0e2faec50261ef48d3b87c554ee73
tiger160,4: 7fd0e2faec50261ef48d3b87c554ee739e8fbd98
tiger192,4: 7fd0e2faec50261ef48d3b87c554ee739e8fbd98f9a0b332

So, to crack MD5 hash as ab56b4d92b40713acc5af89985d4b786, I need to go through all possible words. Also I need to try all dictionary words. If I don't get through all these, I finally bruteforce by generating wordlist by mixing [a-z][A-Z][0-9][special_characters] while including word length, say as word lenght starting from 6 to 15 and generating that wordlist which needs hard disk space.
What if I say you that there is no need for you to get breach data so you can collect password hashes or no need for you to generate any wordlist at all, because this is 2021 and we got 24,108,940,757 words which are been used till now, this is going to be very easy to crack a password right. If you found that password is not from 24 Billion word list, you need to go back and generate wordlists yourself.

Wanna have access to those 24 Billion wordlists / passlists? Here you go.

DDoS is a bitch which can takedown basic websites

 DDoS is a bitch which can takedown basic websites

I hate you guys if you do this. I don't want you to do this if the website isn't yours or if its not for educational purpose.

And I am not gonna spoonfeed you with each and every line of commands to under in terminal or command prompt. Its a python script, I am giving link to it directly so those who understand what they are doing will do it mostly.

https://raw.githubusercontent.com/IkzCx/ProgramsForDDos/6242138f4a1fbbcb24c329f47282e7a73fc3864c/Saphyra.py

Chrome 0-Day Bug Under Active Attacks

 Attention readers, if you are using Google Chrome browser on your Windows, Mac, or Linux computers, you need to update it immediately to the latest version Google released earlier today.

Google on Wednesday rolled out an urgent update for Chrome browser to address 14 newly discovered security issues, including a zero-day flaw that it says is being actively exploited in the wild.

Tracked as CVE-2021-30551, the vulnerability stems from a type confusion issue in its V8 open-source and JavaScript engine. Sergei Glazunov of Google Project Zero has been credited with discovering and reporting the flaw.

Although the search giant's Chrome team issued a terse statement acknowledging "an exploit for CVE-2021-30551 exists in the wild," Shane Huntley, Director of Google's Threat Analysis Group, hinted that the vulnerability was leveraged by the same actor that abused CVE-2021-33742, an actively exploited remote code execution flaw in Windows MSHTML platform that was addressed by Microsoft as part of its Patch Tuesday update on June 8.

The two zero-days are said to have been provided by a commercial exploit broker to a nation-state actor, which used them in limited attacks against targets in Eastern Europe and the Middle East, Huntley said.

More technical details about the nature of the attacks are to be released in the coming weeks so as to allow a majority of the users to install the update and prevent other threat actors from creating exploits targeting the flaw.

With the latest fix, Google has addressed a total of seven zero-days in Chrome since the start of the year —

Chrome users can update to the latest version (91.0.4472.101) by heading to Settings > Help > About Google Chrome to mitigate the risk associated with the flaw.