Tuesday, 28 March 2017

Simple Cool Tricks With Chrome Developer Tool

As you probably know, there is a button on the right-click menu of Google Chrome and IE 10+ called ''Inspect element''. This the developer tool. And you can have a lot of fun with it. I'll give you two examples on how to use it in this tutorial

1. Change the text of a webpage:


You can have fun on webpages just by changing the value of a <span> (a text label). For example, go on the 4shared.com site (a free file sharing site). Then create an account if you don't have one (or just connect with Google, Facebook or Twitter). When you are done, upload something that is heavy (more than 100 MB) by dragging and dropping it on the home page of 4shared. Then you can see an uploading status window on the screen. So right-click on the percentage and click on ''Inspect element''. Now you can see a little window that appears on the bottom of the web browser. There are to ways : either you got the number or you got the % symbol. If you got the number, try to find the symbol below. Then double-click on it and type what you want (Eg: '',000,000 dollars in my bank account'')


2. Get a Non-Crypted password in JS/PhP code:

Some sites are not very safe and just verify the password directly in the PhP/JS code. Then, even if it become rare, you can get the password. Just follow these steps :

  1. Find the login form on the website you want to hack
  2. Right-click on it and then click on ''Inspect element''
  3. Search on the window that appeared ''<form'' and then ''action=''
  4. After it, there is a URL, If it ends by ''.js'', just copy it and paste it in the URL bar of your browser
  5. If it ends by ''.php'', type ''view-source:'' before pasting the URL
  6. Then search something like ''password'' in the code.
WARNING: This method works better with JS than with PHP. Sometimes, there is no URL after ''action='' but just a JS function. Then you have to press Ctrl+U to see the source and search for ''password'' in the whole code.


Monday, 27 March 2017

How To Browse Internet without Data Plan ?

What if you can browse your internet without Data plans in 2017? After reading this headline, you will be like OMG! I can browse the internet without the Internet Data plans. But firstly understand it carefully, you can not download or upload anything without the web.
So, let me introduce the newly launched app in Android play store. The application is named as an Offline browser. In nowadays, the Data plans are bigger than daily life goods. Cause people depends upon the Internet totally. Everything is online like Booking, Ebooks and News Papers. That’s why today I have listed a browser for using the internet without any data recharge.
If you have a smartphone, then you have everything in your hand. Without the internet, your life is food without test guys. The call is the only option left on the web to do.
After spending all of your data, if you want to access to site or blog then you need an internet data plans. But today Here at http://hackhendrix.blogspot.in/ we will believe in tricks and tips. That’s why below I have written an article to use website with the Internet. How you can do that thing below is the method to using the Internet without Data Plans.

Browse Sites without Internet Data Plan

Here is the trick revealed by me:
Requirements:
  1. Only you have to do is download the Offline Browser application from the Android play store freely.

Browse Internet without Data Plan

Instructions:
  1. Download the above-given app from play store and install on your Android device.
  2. After downloading the app, open it and Tap on the Add Button in the dashboard of Application.
  3. After clicking on the Add Button, you will get a page as I have given below.
  4. Put the link to the website you want to access that in offline mode. And put anything in the title box.
  5. Now, click on the Download button and wait for some time and you will get all files of that sites in your local storage
  6. Now you can turn off the data and access the sites from your offline browserwithout any data plan.



You can save many sites and blogs in your offline directory to access when you have not any plan activated on your device guys.
On the computer, there is much software which is used to access the websites in offline mode. In another article, I will briefly explain the PC trick for the Offline website access.
If you found this article helpful then share and subscribe to our posts.

10 Hacking Apps To Turn Your Android Into A Hacking Device

10 Hacking Apps To Turn Your Android Into A Hacking Device 2016
Mobile devices is now very common now a days and mobile devices has changed the way of bi-directional communication. There are many operating system for mobile devices available but the most common and the best operating system for mobile is Android, it is an OS means you can install other applications (software’s) on it. In Android application usually called apps or android apps.
The risk of hacking by using mobile devices is very common and people are developing and using different apps (application) for their hacking attack. Android has faced different challenges from hacking application and below is the list of application for android hacking.

1. Spoof App

Here is an app that spies at heart could use – SpoofApp. It allows you to use a fake Caller ID – a number that you are free to specify yourself, in order to protect your privacy or to pull a prank on someone. Sounds like fun, doesn’t it? Well, Apple didn’t think so, which is why it never allowed the app to enter its App Store. Google, however, didn’t mind, which is why SpoofApp was available on the Android Market for about two and a half years. However, it was banned from there last year as it allegedly was in conflict with The Truth in Caller ID Act of 2009.This can be useful in social engineering. 


2. FaceNiff

Requirements: Android 2.1+ (rooted)
Overview: FaceNiff is an Android app that allows you to sniff and intercept web session profiles over the WiFi that your mobile is connected to.
It is possible to hijack sessions only when WiFi is not using EAP, but it should work over any private networks (Open/WEP/WPA-PSK/WPA2-PSK). It’s kind of like Firesheep for android. Maybe a bit easier to use (and it works on WPA2!). Please note that if webuser uses SSL this application won’t work.
Legal notice: This application is for educational purposes only. Do not try to use it if it’s not legal in your country. I do not take any responsibility for anything you do using this application. Use at your own risk


3. Penetrate Pro

Requirements: Android 2.1+ (rooted)
Overview: The most of the times you scan the Wi-Fi networks available around, they’re protected with key. Penetrate is an app that help you out with that. If the routers of that Wi-Fi networks are encrypted with WEP/WPA it will bring you the keys to access them. This seems a sort of cracking, but the developers says it isn’t, because it’s supposed to get the keys for penetration testing and you should use it only with permission from network owners. Well, apart from those regardings, it does what it says. Check the developer description to know which routers are supported.
Take in account that if you have an antivirus installed in your device, it will warn you about this app. The developer says it’s normal because it’s a security-related tool. Penetrate isn’t a danger for your phone.
This is the paid version (€1.99) that contains no ads, some more features and sponsors further development. What’s more, it allows you to use 3G to get the password instead of using dictionaries that you will have to download in the free version.
Penetrate works properly with the range of routers supported. We’re missing more though. Despite the apparent use for which it was developed this application, we all know the “regular” use. And if you’re looking for it, give it a chance. It’s a great app.


4. Anti-Android Network Toolkit

Requirements: Android 2.1+ (rooted)
Anti-Android Network Toolkit is an app that uses WiFi scanning tools to scan networks. You can scan a network you have the phone connected to or you can scan any other nearby open networks. Security admins can use Anti to test network host vulnerabilities to DoS attacks and other threats.


5. Andosid

AnDOSid is the application which is used for DOS attacks from Android mobile phones.


6. Nmap For Android

Nmap is a network scanner tool which gives the entire information of the ip address and website. There is a version of Nmap for Android users too, with the help of this app hackers can scan the IP’S through mobiles.

7. The Android Network Toolkit

The Android Network Toolkit is an complete tool kit for the pen testers , where hackers can find expo lots using the mobile and penetrate or attacks the ip’s according to their vulnerabilities.
 8. SSHDroid- Android Secure Shell


Secure shell or SSH is the best protocol that provides an extra layer of security while you are connecting with your remote machine.SSHDroid is a SSH server implementation for Android.
This application will let you to connect to your device from a PC and execute commands (like “terminal” and “adb shell”).

 10. WiFi Analyzer

WiFi Analyzer is one of the most popular applications in the Android Marketplace, which is really a testament to how wildly useful this tool is for both the average user and the more technically inclined. In the most basic of terms, WiFi Analyzer is a tool to scan the area for WiFi networks and determine which channel is the least populated so you can adjust your own hardware to a less congested part of the spectrum.

Follow me to know more................

Android App Development – A Blessing For Diversified Business Needs


To say that with the advancement in technology, businesses are looking for new and improved methods to reap its benefits won't be an understatement. Nowadays, the mobile platforms are surging as customer's preferences and their behaviour are spilling into the business workforce. Users admire to access the business apps and info via mobile technology.

The adoption of rapidly expanding mobile technology across the world has facilitated several businesses to manage their jobs with ease and maintain a superior presence in the marketplace. Many businesses have reaped its benefits for boosting their productivity and delivering outstanding performance.

Observing the current stats and analytics, it can be said that Android is the most popular and admired platform in the mobile realm. It has evolved over the years and interestingly blossomed into a top leading mobile OS with the consistent support of Google that helps keep it updated with the latest technicalities and development.

Since Android Application Development Services being a free, open-source mobile platform encourage developers to conveniently contribute to the Android development and enhance its features with superior and advanced functionalities. There are over 1 million Android apps in the Google Play store, around 71% mobile developers are contributing in its development and more than 1 billion active Android users; hence, it can be depicted that how huge is the customer base of this platform. It thus, allows businesses to easily target a wider group of audiences and promote their products and services.


There are truckloads of Android applications that are created to meet certain objectives; it includes the application catering the need of numerous domains like:

  • For Entertainment: There are fun applications, gaming apps, media apps, etc.
  • For smart Education: There are apps to support e-learning and smart classrooms, etc.
  • For Businesses: There are enterprise applications either for better inter-resource relationship, improved productivity, easy client management, enhanced performance, or simply for marketing business products and services, etc.
As far as business apps are considered, Android apps can serve and improve the value of diversifies business verticals including travel, tourism, stores, hotels, schools, and many more. Many businesses have headed towards these efficient platforms to endeavours their organizational goals and pave the path towards their success.
Let's have a look at how Android has proven to be beneficial for numerous business domains.

1. For educational institutions:

Android has defined education beyond classrooms with its utile features. There are innumerable mobile users who are looking for a proficient method to execute Smart education. And for this reason, several schools and colleges have adopted sharing student info via some web based or application based system.

It not only offers easy access to the information across but also facilitates the students with expert's guidance and support to solve their queries 24x7. You provide embed appropriate presentations, lecture videos to allow students to easily grab the information.

2. For Enterprises:

Whether you want your employees to manage the project with efficient tools or want to create a reliable and worthy customer relationship, developing a suitable Android application is a viable choice. You may integrate Sap for easier billing process or can create an app for monetization and attracting potential consumers by marketing products and services of the business. You can reap great benefits to your business by developing an efficient application.

3. For Hotels:

app for hotels
Today, most of the travellers, carry their handy Smartphones and love to browse for the information on the go. They want to access the information as and when desired; this is why, the hospitality industry is seeking the benefits of Android development to ensure better services and convenient access to the required info to their potential customers.

With the instantaneous and updated information, travellers will be able to make last minute bookings anytime and anywhere; and thus, you can ensure an increased number of customers while building a better customer relationship to garner improved customer satisfaction. Accentuate your hotel visibility to millions of Smartphone users with applications.

4. For Restaurant:

app development restaurant
Improve your restaurant visibility, attract customers and accentuate your profits. Yes, you can accomplish all these at once, by developing an efficient Android application that users can use to easily, get your restaurant menu, map to locate it, contact info, etc. It thus will help numerous loyal and potential customers get the requisite data conveniently from a handy device on the go.

5. For Retailers or other stores:

People are moving to the online store as they are offering the users to shop with the comfort of their home or on the go. Creating an attractive, highly functional and user-friendly application can help you increase the sales and profits of your brick-and-mortar store with ease. Mobile apps can allow you to reach your potential customers to ensure quick purchase and easy profits.

Conclusion:

Developing an appropriate, innovative and functional application can efficiently cater the needs of businesses (for other diverse domains). Seek an expert Android developer and create a lucrative and unique application to endeavors your organizational goals with ease.

12 Simple Steps To Become A Hacker

Hacking is an engaging field but it is surely not easy. To become a hacker one has to have an attitude and curiosity of learning and adapting new skills. You must have a deep knowledge of computer systems, programming languages, operating systems and the journey of learning goes on and on. Some people think that a hacker is always a criminal and do illegal activities but they are wrong. Actually many big companies hire hackers to protect their systems and information and are highly paid. We have prepared a list of 12 most important steps necessary to become a hacker, have a deeper look

1. Learn UNIX/LINUX


UNIX/LINUX is an open source operating system which provides better security to computer systems. It was first developed by AT&T in Bell labs and contributed a lot in the world of security. You should install LINUX freely available open source versions on your desktops as without learning UNIX/LINUX, it is not possible to become a hacker.

2. Code in C language 



C programming is the base of learning UNIX/LINUX as this operating system is coded in C programming which makes it the most powerful language as compared to other programming languages. C language was developed by Dennis Ritchie in late 1970’s. To become a hacker you should master C language.

3. Learn to code in more than one Programming Language


It is important for a person in the hacking field to learn more than one programming. There are many programming languages to learn such as Python, JAVA, C++. Free eBooks, tutorials are easily available online.

4. Learn Networking Concepts


Another important and essential step to become a hacker is to be good at networking concepts and understanding how the networks are created. You need to know the differences between different types of networks and must have a clear understanding of TCP/IP and UDP to exploit vulnerabilities (loop holes) in system.
Understanding what LAN, WAN, VPN, Firewall is also important.
You must have a clear understanding and use of network tools such as Wireshark, NMAP for packet analyzing, network scanning etc.

5. Learn More Than One Operating Systems 


It is essential for a hacker to learn more than one operating system. There are many other Operating systems apart from Windows, UNIX/LINUX etc. Every system has a loop hole, hacker needs it to exploit it.

6. Learn Cryptography



To become a successful hacker you need to master the art of cryptography. Encryption and Decryption are important skills in hacking. Encryption is widely done in several aspects of information system security in authentication, confidentiality and integrity of data. Information on a network is in encrypted form such as passwords. While hacking a system, these encrypted codes needs to be broken, which is called decryption.

7. Learn more and more about hacking


Go through various tutorials, eBooks written by experts in the field of hacking. In the field of hacking, learning is never ending because security changes every day with new updates in systems.

8. Experiment A Lot


After learning some concepts, sit and practice them. Setup your own lab for experimental purpose. You need a good computer system to start with as some tools may require powerful processor, RAM etc. Keep on Testing and learning until you breach a system.

9. Write Vulnerability (Loop hole program)


Vulnerability is the weakness, loop hole or open door through which you enter the system. Look for vulnerabilities by scanning the system, network etc. Try to write your own and exploit the system.

10. Contribute To Open Source Security Projects


An open source computer security project helps you a lot in polishing and testing your hacking skills. It’s not a piece of cake to get it done. Some organizations such as MOZILLA, APACHE offer open source projects. Contribute and be a part of them even if your contribution is small, it will add a big value to your field.

11. Continue never ending Learning 


Learning is the key to success in the world of hacking. Continuous learning and practicing will make you the best hacker. Keep yourself updated about security changes and learn about new ways to exploit systems

12. Join Discussions and meet hackers 


Most important for a hacker is to make a community or join forums, discussions with other hackers worldwide, so that they can exchange and share their knowledge and work as a team. Join Facebook groups related to hacking where you can get more from experts.

Wednesday, 15 March 2017

Unblock a Blocked Website: Five Different Ways

Why are certain sites blocked? Different countries block anything to do with popular culture, sexual issues, women's resources, or politics. In addition, companies, schools, and various organizations block sites to cut down on security breaches and boost productivity. However, sometimes you just need to get somewhere on the Web. The following methods can help you get around common online roadblocks.

Sites blocked at school, sites blocked at work

You're at school and/or work, and you need to get to a website, but you find it's been blocked. How do you handle this situation? More importantly, how do you do it without possibly getting into trouble? 
First of all, most schools, universities, and workplaces block websites for legitimate reasons - not just to cramp your style. Many schools and workplaces do a "blanket" blocking of websites they deem inappropriate for school and work use, and sometimes, this tends to block sites that are perfectly reasonable in an educational or professional setting.There are sites on the Web that present threats to network security, are inappropriate for a school setting, or cause distractions in the learning environment. The fact that a legitimate learning site might be blocked from student access - and does not pose a threat to the school's security - is most likely grounds for readdressing. In other words, it never hurts to simply ask. 
On the other hand, if you are attempting to visit a site that has zero educational value and is known purely for aiding procrastination, you are probably out of luck. Best to wait and go onto those sites on a computer that is not at school or work. 

The site is blocked? Here's what you can do

The first thing you need to do is talk to someone in authority to see if the block can be lifted from a specific website. Officials usually will work with you, if the website has legitimate educational or professional purposes. Understand - as stated earlier - that if the site has little educational value, your request will probably fall on deaf ears. 
However, if this option is not available, you can unblock blocked sites with the tips in this article that are safe, cause no harm to the host computer, and (most likely) will not get you into trouble. NOTE: Use these methods at your own risk, especially in a school or work setting. No one but yourself is responsible for what may happen if you attempt to unblock a site that has been blocked for a legitimate reason! Most of the time, your best bet is to simply wait until you get home and use your own private computer. Schools and universities, as well as professional workplaces, usually have very good reasons behind their site-blocking policies, and take a very dim view of students and employees who try to get around them. Be very careful and use common sense when making this decision. 

Why is Facebook blocked?

One of the most popular social networking sites on the Web today is Facebook, a site that you can use to connect with other people in your circle. However, sometimes Facebook is blocked, meaning you can't get to it from where you access the Web. This could be for many reasons:
  • The country you reside in blocks Facebook for political, cultural, or religious reasons
  • Your workplace blocks Facebook for security reasons
  • Your school or university blocks Facebook for educational reasons
Whatever what might be your situation, there are several ways you can access the site.

Try using an IP address:

Don't type in "facebook.com"; try using Facebook's IP address (the numerical signature of any site on the Internet). You can locate the IP address of any site using a WHOIS tool, such as Whois Domain Tools.

Access the mobile version of the site:

Facebook is accessible via m.facebook.com; this URL is available from any Web-enabled device, whether that be a computer, smartphone, or tablet device.

Use a proxy:

A Web proxy basically shields your identity from any site you're trying to access, acting as a substitute IP address so your personal IP address is hidden. Anonymouse and Hide My Ass are both examples of free Web proxies.

What if I want to block other people from finding me on Facebook?

Many people have concerns about privacy on Facebook, and for good reason: the popular site is notorious for changing security settings that don't necessarily benefit the user. If you would rather not have your private Facebook information accessible to the public at large, read How to Block People From Finding You on Facebook, a quick tutorial on how to make your Facebook profile private.
NOTE: Violation of most terms of use by corporations can be grounds for immediate termination; in addition, universities and schools have rules that prohibit the non-educational use of the Web. Use these methods at your own risk.

1.Use an IP address instead of typing in the domain name

Instead of typing in a specific domain name, try typing in the IP address instead. AnIP address is the signature address/number of your computer as it is connected to the Internet. You can find the IP address of any site by using IP address tools such asNetcraft, or Whois Domain Tools.
2.Use the mobile Web

You can sometimes access the mobile version of the site that has been blocked. Use the mobile web on your phone OR computer (sites will look different that what you're used to on your computer, but you'll be able to see them). 



3.USe Google Cache to find an older version of a site


Google's cache, the way the Web page looked when Google’s spiders indexed it, is a great way to see a site that has been blocked (if you don't mind looking at an older version of the site). Simply navigate to Google's home page and use this command:

cache:www.websearch.lifewire.com
This will show you this site (or any site you want) as it looked when Google last looked at it.

4.Use an anonymous web proxy
An anonymous Web proxy hides your identity from the sites that you visit on the Web. When you use a Web proxy to visit a blocked site, your IP address (see item number one on this list) is basically hidden, and the anonymous Web proxy substitutes its own IP address for your own. This means that if you live in a country that restricts certain sites, you will be able to visit them with an anonymous Web proxy's substitute IP address, since it will tell the powers that be that you are actually in another country (and no longer subject to their policies). Most free Web proxies will also encode the URLs that you visit, making your search history virtually untraceable.
5.Use an anonymous HTTP proxy


An anonymous HTTP proxy is similar to an anonymous Web proxy (mentioned in this list): it's an actual server that acts as a go-between between the searcher and the site that they are trying to access.
Basically, when you use an anonymous proxy and enter in the URL that you'd like to visit anonymously, the anonymous proxy retrieves the pages BEFORE they are delivered to you. This way, the IP address and other browsing information that the remote server sees does not belong to you - it belongs to the anonymous proxy.
There are many public access anonymous proxy servers on the Web that can be used by anyone who needs to unblock blocked sites. Simply type "anonymous Web proxy" into your favorite search engine and several should come up; because of the nature of these proxies, their links change extremely often.