Thursday, 19 May 2016

Google launches Android N Developer Preview 3 with VR and seamless update Download Here!

Posted by Sufyan Hacker  |  at  03:20:00

Google launches Android N Developer Preview 3 with VR and seamless update

Google launches beta version of Android N Developer Preview 3

Google has just released Android N Developer Preview 3, a build that would be the first “beta quality” which would be made available later said the search giant at the keynote at Google’s I/O developer conference. You can download the new preview from here, and start testing your apps on this platform. You can get the factory images very soon on the devices mentioned here:
  • Nexus 5X
  • Nexus 6
  • Nexus 6P
  • Nexus 9 (Wi-Fi only and LTE models)
  • Nexus Player
  • Pixel C
  • General Mobile 4G (Android One)
According to Google, the DP3 should be stable enough to use as a daily driver. Major additions not only include VR Mode’, ‘Sustained Performance’, and ‘Keyboard Shortcuts’, among other development-centric things, smaller changes across the board, but also squashes several bugs and adds many new features for developers and users alike. Particularly, Sustained Performance sounds like great for gaming and other extreme applications that task the hardware with extended sessions at near-peak performance. This granular information is intended to help developers create apps that avoid performance fluctuations over time.
Also, another addition is VR mode, a new mode within Android that will manage CPU and GPU usage while you are using Google Cardboard or other VR platforms and apps. This makes it so that other apps on your phone doesn’t use up all the power you need to make for a low-latency VR experience. Google says this brings 100ms of latency on the Nexus 6P during Cardboard usage down to 20ms, which is a really important difference.

Further, the other new addition is a seamless update process that can download OTA updates in the background when they are available. In other words, Google will basically apply the update the next time you reboot your phone and bring it on the latest software, without you having to follow a series of menu clicks in the Settings menu. The updates are rolling out as version NPD35K and is already popping up on devices who are a part of the Android Beta program.


Tuesday, 17 May 2016

Top web hacking techniques of 2016 By Sufyan Hacker

Posted by Sufyan Hacker  |  at  04:04:00


Top web hacking techniques of 2015

Here are the top 10 hacking techniques discovered in 2016

In continuation of the same series we today bring out the 10 top hacking techniques used by hackers in 2016.


Hacking was a term that originated in 1990s and is associated with the unauthorized use of computer and network resources. By definition, hacking is the practice of altering the features of a system, to accomplish a goal which is not in scope of the purpose of its creation.
Hacking is more commonly used in context of “Computer Hacking” where threat is posed to security of the computer and other resources. In addition, hacking has few other forms which are less known and talked about .e.g. brain hacking, phone hacking etc.
Hacker” was a term used to denote a skilled programmer who had competency in machine code and operating systems. Such individuals were proficient in solving unsatisfactory problems and often interpreted competitors’ code to work as intelligence agents for small software companies.
There are three types of hackers, white hat or ethical hackers, grey hat hackers and black hat hackers. You can read about the different types of hackers here. We dont usually have to worry about ethical hackers but need to keep an out for the grey hat and black hat hackers who are usually cyber criminals.
In 2015, there were a dozen big time vulnerabilities discovered by researchers. However, a few of those were actually exploited in the wild.

Here are the top 10 hacking techniques discovered in 2015 :

#1 FREAK Attack

Freak attack is a SSL/TLS Vulnerability that would allow attackers to intercept HTTPS connections and force them to use weakened encryption. The vulnerability was first reported in May, 2015 and can be read here.
Researchers: Karthikeyan Bhargavan at INRIA in Paris and the miTLS team. You can get further details about Freak attack research here.

#2 LOGJAM vulnerability

Logjam vulnerability was discovered in October, 2015. It was another TLS vulnerability that allows man-in-the-middle attacks by downgrading vulnerable TLS connections to 512-bit encryption.
A researcher team of David Adrian, Karthikeyan Bhargavan, Zakir Durumeric, Pierrick Gaudry, Matthew Green, J. Alex Halderman, Nadia Heninger, Drew Springall, Emmanuel Thomé, Luke Valenta, Benjamin VanderSloot, Eric Wustrow, Santiago Zanella-Béguelin, and Paul Zimmermann discovered this vulnerability and you can read additional information about it here.

#3 Web Timing Attacks

Web Timing attacks have been revealed many years back but this is the first time that researchers showed how it can be executed. Black Hat talk on how to tweak timing side-channel attacks to make it easier to perform remote timing attacks against modern web apps.

The lead researchers of web timing attack are Timothy Morgan and Jason Morgan.

#4 Evading All* WAF XSS Filters

Security researcher Mazin Ahmed discovered that it is  it is possible to evade cross-site scripting filters of all popular web-application firewalls. Once exploited the hackers can do pretty much anything they want.
The research paper can be read here.

#5 Abusing CDN’s with SSRF Flash and DNS

Now a days almost all big websites use content delivery networks (CDN). Research highlighted at Black Hat looking at a collection of attack patterns that can be used against content delivery networks to target a wide range of high availability websites.
The two Researchers, Mike Brooks and Matt Bryant discovered this hacking technique.

#6 IllusoryTLS

IllusoryTL is an attack pattern that can wreck the security assurances of X.509 PKI security architecture by employing CA certificates that include a secretly embedded backdoor. The vulnerability was discovered by a security researcher, Alfonso De Gregorio.

You can get additional information about illusorytls here.

#7 Exploiting XXE in File Parsing Functionality

Cyber criminals can exploit the XXE in file parsing functionality. A Black Hat talk examining methods in exploiting XML Entity vulnerabilities in file parsing/upload functionality for XML-supported file formats such as DOCX, XSLX and PDF.
The security researcher who discovered this vulnerability was Will Vandevanter.

#8 Abusing XLST

The vulnerability in XLST was known for a long time but security researcher Fernando Arnaboldi demonstrated it for the first time at the Black Hat conference.

Research and proof-of-concept attacks highlighted at Black Hat that show how XSLT can be leveraged to undermine the integrity and confidentiality of user information.

#9 Magic Hashes

Security researchers, Robert Hansen and Jeremi M. Gosney discovered a vulnerability in the way PHP handles hash comparisons.
Looks into a weakness in the way PHP handles hashed strings in certain instances to make it possible to compromise authentication systems and other functions that use hash comparisons in PHP.
You can get further information about magic hashes here.

#10 Asynchronous Vulnerabilities

Security researcher James Kettle presented a research at 44CON delves which explains how to use exploit-induced callback methods to find vulnerabilities hiding in backend functions and background threads.


Monday, 16 May 2016

Follow this 7 step guide to create your first Android App 2016 By Sufyan Hacker

Posted by Sufyan Hacker  |  at  08:39:00

Become an Android Developer : Here is how you can create your first Android App

Android is no doubt a great platform for users as well as developers. Thanks to Android Studio and continuous support from Google. And in case you were thinking to begin creating Android apps but did not have much idea of the know-how, you can follow this article to get your doubts clarified.

Programming Language

Android apps are developed in Java. You do not need to be an expert, but you should be good in specific areas, e.g. you need to have good knowledge of AWT and Swing for developing a GUI for your app. Getting easy with following topics before starting will make the development phase more enjoyable.
>> Event Handling.
>> Swing.
>> Constructors.
>> JDBC.
>> Classes, Objects and Methods.
>> Packages.
>> Abstraction.
>> Polymorphism.
>> Inheritance.
You’ll also need to learn basics of the Extended Markup Language(XML).

Places to Learn From

You can Learn Basics of Java and Android Development from these websites.
1. TreeHouse
2. Tutorials Point
3. Udacity( Android development for beginners)

Steps to get an app built

1. Ideation

First of all an idea is required to be worked on. You’ll need to have a clear view of what your app will be for and what it will do. A good idea will be to start small and gradually add sophistication. Don’t make it so boring that you don’t want to make it but try to avoid any complex functions as far as possible. Ideally, the app will only require one ‘screen’ (activity) and will involve some simple interactions so that something happens when the user presses a button. Consider it a challenge to make something that’s genuinely useful with the minimum amount of code.

2. Choosing your IDE

The most common way to build Android apps is to use Android Studio and Java. This is the official method recommended by Google and it will afford you a lot of flexibility while ensuring there’s plenty of support if things go wrong. This is also the method you will need to know if you ever plan on becoming a professional developer.
There are numerous other options for your IDE and language too however. You may pick Unity and C++ for instance if you want to make a game. Basic4Android is an IDE focused on rapid development that lets you code with BASIC rather than Java. There’s even an IDE that runs on Android called AIDE.

3. Collecting Resources

Resources mean images and other material you will use in your app. You can download numerous images and use them but be aware not to violate someone’s copyright.

4. Building the layout of your app in IDE

Now you’re going to create your layout in Android Studio using the ‘designer’. This is a tool that lets you simply drag and drop the widgets (also called ‘views’) where you want them on the page. You’ll need to start a new project in Android Studio to do this but there will still be no coding necessary at this point (except maybe a little XML). To start a new project select File > New > New Project. Follow the steps selecting a name for your project and for your activities and choose ‘Empty Activity’.

5. Writing the core code

Now comes the more challenging part – adding the code. You know the basics of Java and you have your widgets/views already in place. Now you’re going to open the Java file for your main activity and simply create some ‘onClick’ events to add code that will run only when users click a specific button or otherwise take a specific action.

6. Implementing more complexity

By now though, you should have some of the basic functionality in place so that your app responds to button clicks (in one way or another) and perhaps stores some variables.
Next is to add the more advanced functionality that will be specific to your app. For example, you might want your app to play music when a button is clicked. Maybe you want to add some flashy animations. Or perhaps you need to know how to transition from one activity to the other.

7. Final review and publishing

Now comes the last step. You’ll have to test your app for bugs and once everything is right you can get your app published on Google Play Store.


Make sure your password is not included in this world’s worst passwords list 2016

Posted by Sufyan Hacker  |  at  03:25:00

Make sure your password is not included in this world's worst passwords list

Here’s a list of worst 25 passwords that you should conspicuously avoid

Earlier this week, the world celebrated ‘Password Day’ to promote better password habits among internet users around the world. In today’s digital age where most of the things are done online, it is very important to have a strong and safe password to protect our data.
To make hacking more difficult, a good password needs to have a combination of letters, numbers and characters along with capitalization. Most hacking programs mainly use algorithms that look for a simple pattern in passwords. There are some biggest mistakes that people make while keeping their passwords such as reusing one password for almost all their other accounts or easy guessable passwords. Due to these reasons, it is very important to have a good password to help prevent your social media/email/banking accounts from being hacked.
In the spirit of “World Password Day” and based on Password management firm SplashData’s annual list of ‘Worst Passwords’, here is a list of passwords you should stop using right away. These passwords were compiled from over 2 million passwords leaked over the course of 2015, to find the 25 worst passwords – those used by the most people at the same time.
The 25 most-used passwords are as given below:
  1. 123456: This is 2016 folks, why do you think this still a good idea?

  2. Password: Trust yourself; you can be little bit more creative than this.

  3. *12345678: Adding a “*” before the most basic password does not make it any better.

  4. Qwerty: Using a password after the name of a keyboard is not a very good idea.

  5. 12345: This is just the height of lazy.

  6. 123456789: This just lazy thinking its smart.

  7. Football: Even soccer is a better idea.

  8. 1234: Maybe drop an 8, or a “?” somewhere there?

  9. 1234567: No.

  10. Baseball: RedSox sucks is better than this.

  11. Welcome: That’s what your hacker is saying right now.

  12. 1234567890: Just no.

  13. abc123: Next time try a xyz890

  14. 111111: A little bit more, just a pinch more effort will save you a world of trouble.

  15. 1qaz2wsx: This is just a vertical visual keyboard aide, at least try the middle of the keyboard if you’re going to do this.

  16. Dragon: Dragons are infinity cool but not as your password.

  17. Master: Be the master of your own cyber security and avoid using this.

  18. Monkey: How about a marsupial or a reptile with numbers!

  19. Letmein: This is German, meaning “Let me in” the hackers are basically saying the same thing too.

  20. Login: Why do this to yourself?

  21. Princess: And a Leia, Aurora, Cinderella after maybe?

  22. Qwertyuiop: Again this is just a horizontal visual aide, you know you can do better.

  23. Solo: We understand the misery of singlehood.

  24. passw0rd: Clever, very clever, but the hackers are cleverer than you.

  25. Starwars: Piss off the starwars nerds who are trying to hack your account by having “startrek” instead!

    Stay Blessed! Don't forget to like our Fb Page


Sunday, 15 May 2016

How to use your Android smartphone as remote mouse and keyboard for your PC 2016 By Sufyan Hacker

Posted by Sufyan Hacker  |  at  01:32:00



Sunday, 1 May 2016

Here are the world’s top 10 Female Hackerst Which are Hot Too 2016

Posted by Sufyan Hacker  |  at  05:16:00

Meet the world’s Top 10 Female Hackers


Here are the world's top 10 Female Hackers who are also hot


1) Adeanna Cooke

It is very surprising to know that a handful of women were bold enough to step into the world of hacking and make their presence felt – a field where the art of writing computer code and manipulating computer hardware is always considered to be traditionally dominated by males. It remains an evolving, multi-billion dollar industry as some hackers are often blamed for causing irreparable damage while others are simultaneously credited for some of the biggest breakthroughs in technology.
No matter what a hacker may be, they are known for their resourcefulness and their knowledge of complex theory. The female hackers listed below have been credited with some of the biggest breakthroughs that changed the perception about hacking.
Let’s have a look at some of the most beautiful and notorious female hackers and the impact they have on the world.
10 Hottest Female Hackers in the World

2) Xiao Tian

Tian formed the renowned female hacking group called “China Girl Security Team,” as she felt that there was no other outlet for teenage girls like her in the male-dominated world of hacking.
10 Hottest Female Hackers in the World
Her group has now ties with some of the most notorious hacking organisations in the world and has become one of the largest Chinese-based hacking groups. As with most well-known and outspoken groups of this nature, Tian and the rest of China Girl Security Team continue to receive attention from national and international police organizations due to their activities.

3) Anna Chapman

Chapman is a Russian hacker who was residing in New York City when she was arrested, along with nine others in 2010. She was accused of working for the Illegals Program spy ring under the Russian Federation’s external intelligence agency.
10 Hottest Female Hackers in the World
Chapman pleaded guilty to a charge of conspiracy to act as an agent of a foreign government without notifying the U.S. Attorney General, and was deported to Russia, as part of a prisoner swap. She also lost her U.S. citizenship.

4) Kristina Svechinskaya

One of the most popular names in the world of hacking, Svechinskaya is a Russian money mule hacker. A student of the New York University, she was accused of a plot to defraud several British and U.S. banks of sizeable sums and usage of false passports.
10 Hottest Female Hackers in the World
Specializing in the use of Zeus Trojan horses, she hacked servers of thousands of bank accounts most within the United States, and then created a series of fake accounts through both Bank of America and Wachovia, which received $35,000 of money theft. Some authorities estimate that she stole $3 million in as little as a few months. Svechinskaya was dubbed “the world’s sexiest computer hacker” for her raunchy but casual appearance.

5) Ying Cracker

Cracker is an educator from Shanghai that offends white people every time she says her full name if they think she’s correcting them. She teaches people the basics of how to start hacking; things like changing your IP address or wiping Office passwords.
10 Hottest Female Hackers in the World
She is an expert in hacker software writing and charges good money for courses on simple and for high-end hacking tools. Cracker also charges between 500-5000 Yuan per class for helping other people crack software.

6) Gigabyte

While many of the top female hackers are known for their legal work within the security sector, Gigabyte is on the opposite end of the spectrum. Gigabyte was born and brought up in Belgium and her real name is Kim Vanvaeck.
10 Hottest Female Hackers in the World
She is believed to have been the sole creator or primary creator of a number of high-end viruses including Coconut-A, Sahay-A, and Sharp-A that are meant not to steal sensitive information but to destroy them.

7) Joanna Rutkowska

Rutkowska is a Polish ethical hacker who specializes in developing software and tools to counter hackers in the world. So, she’s kind of a protector of the common man against machines, Terminator style. She describes herself as an ‘Operating Systems Security officer’.
10 Hottest Female Hackers in the World
She is best known for demonstrating the vulnerabilities in Windows Vista in 2006 DefCon conference. An elite hacker, she has launched her own security services start-up called Invisible Things Labs.

8) Raven Adler

Adler was the first woman to ever present at the DefCon’s hacker conference. She continues to design hack-detecting systems, test and audit hacking detector systems for large federal agencies. She now works as a senior security consultant for a number of companies and continues to give lectures and regularly publish her work in industry magazines.
10 Hottest Female Hackers in the World
She also works with several federal firms and aids them in protecting their online databases.

9) Jude Milhon

Milhon was a hacker and author best known under the pseudonym St. Jude. She started her career as a computer programmer in 1967 only to later form a hacking group known as Cypherpunks. She was also a member of Computer Professionals for Social Responsibility. Throughout her life she wrote several books as well as contributed to a number of magazines within both the hacking industry and the computer programming industry.
10 Hottest Female Hackers in the World
During her lifetime, she pushed against those who believed hacking was nothing more than a criminal act. She passed away in 2003 due to cancer.

10) Natasha Grigori

Grigori started her career as a hacker in the 1980s but she did not receive fame until the early 1990s with a bulletin-board website for amateur programmers and hackers. With this site, she helped others share, release, and hack various forms of software.
10 Hottest Female Hackers in the World
However, in the late 1990s, she founded, also known as ACPO and Anti-Child Porn Organization and started working against child-pornography. This website has become one of the biggest campaigners against online child pornography and countless hackers utilize techniques learned from Grigori to help law enforcement agencies find and prosecute distributors.
Unfortunately, Grigori died of severe illness in November 2005, but ACPO has been left behind as a viable and effective organization that continues to operate today.


Top 10 Tips To Protect Yourself From Hackers 2016 By Sufyan Hacker

Posted by Sufyan Hacker  |  at  05:02:00

Top 10 Tips To Protect Yourself From Hackers 

Follow these Top 10 Tech Security Tips To Keep Yourself Safe From Hackers

If you are surfing the net or your computer is linked in anyway to Internet, you would be aware of the risks that cyber criminals pose to you. Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. On the other hand, data security means protecting data, such as a database, from destructive forces and from the unwanted actions of unauthorized users.
Every computer user needs to know the basic things to keep their device and data secure. Given below are the few tips and habits that can help you:

10. Look Out for Social Engineering Attacks

Social engineering is the biggest security concern these days, as cyber thieves and hackers smartly gain access to your secure information either through mimicking other companies, phishing and other common strategies. You need to be careful of all the suspicious phone calls, emails, links and other communications that you receive. Also, it is known that most of the data breaches come from internal sources. Hence, awareness is the important key, as it may be astonishing to know that even security experts can be easily tricked or hacked into.

9. Make Your Phone’s Lock Code More Secure

Many of us consider that the default 4-digit PIN is the most secure locking code. However, it is not. It is always better to add an extra digit to make your phone more secure. For iOS and Android, go to settings and add one more digit to make your phone’s lock code more. Further, Android also has lock screen tools that lets you enhance your phone’s security. Lastly, it is recommended to change your PIN if it’s one of these.

8. Always Back Up Your Computer/Smartphone

It is vital to frequently backup and make duplicate copies of all your important data to keep it safe. You can use a backup system with CrashPlan, or Windows’ built-in tools or Mac’s Time Machine.

7. Install the Best Antivirus and Anti-Malware Software

To keep viruses and malware at bay, it is suggested that you use one antivirus tool, such as Sophos Anti-Virus for Mac or such as Avira for Windows, as well as an anti-malware tool for on-demand scanning, such as Malwarebytes.

6. Lock Down Your Wireless Router

The first line of defense for your home network is your router. To keep your Wi-Fi secure, you need to change the router’s administrator login, use WPA2 (AES) encryption, and change other basic settings.

5. Never Send Sensitive Information Over Email Unless It’s Encrypted

Sensitive information, such as your bank info, social security number, tax returns, or confidential business info, should never be sent over email without encryption. It’s too risky. Encrypt files with one of these tools before sending them or use a service like super simple ProtonMail or encrypt your emails with PGP. Encrypt all the things.

4. Don’t Use Public Wi-Fi Without A VPN

While using public Wi-Fi, it is important to use a network that has security. To stay safe on public Wi-Fi networks, your best defense will be to use a VPN (Virtual Private Network), which keeps you safe even in other conditions too.

3. Use A Password Manager

It is impossible to remember every password for each and every site and service you use. That’s where password managers come handy. While security and convenience are the features that you need to look for, however, select the password that has the features you need.

2. Use Two-Factor Verification

Two-factor authentication offers the extra layer of security that protects you in case your password gets stolen. Turn this feature on in all the places where you can use TwoFactorAuth. Further, if you lose your phone (most often used as the authentication device), you can still get back into your account if you plan ahead.

10. Frequently Review Your App Permissions and Security Settings

Lastly, you still have to be watchful and make sure your software is always up-to-date besides following the above steps. Always remember to update the router firmware or regularly clean up app permissions, such as Facebook, Twitter, Google or use a site like MyPermissions to clean up multiple services. You can even get a bonus for keeping up with your security needs, as Google sometimes offers free storage just for doing a security check.
If you follow the above procedures, you will be always be safe surfing the Internet.


Get our latest posts directly in your email inbox.Click on RSS

Google+ Badge


Copyright © 2016 Hacking Tips and Tricks Designed By Sufyan Hacker
back to top
' type='text/javascript'/>