Hacker means someone who finds weaknesses in a computer or computer network, though the term can also refer to someone with an advanced understanding of computers and computer networks.Hackers may be motivated by a multitude of reasons, such as profit, protest, or challenge. The subculture that has evolved around hackers is often referred to as the computer underground but it is now an open community. While other uses of the word hacker exist that are not related to computer security, they are rarely used in mainstream context.



Several subgroups of the computer underground with different attitudes use different terms to demarcate themselves from each other, or try to exclude some specific group with which they do not agree. Eric S. Raymond (author of The New Hacker’s Dictionary) advocates that members of the computer underground should be called crackers. Yet, those people see themselves as hackers and even try to include the views of Raymond in what they see as one wider hacker culture, a view harshly rejected by Raymond himself. Instead of a hacker/cracker dichotomy, they give more emphasis to a spectrum of different categories, such as white hat, grey hat, black hat and script kiddie.

White Hat:-

A white hat hacker breaks security for non-malicious reasons, perhaps to test their own security system or while working for a security company which makes security software. The term “white hat” in Internet slang refers to an ethical hacker. This classification also includes individuals who perform penetration tests and vulnerability assessments within a contractual agreement. The EC-Council , also known as the International Council of Electronic Commerce Consultants has developed certifications, course ware, classes, and online training covering the diverse arena of Ethical Hacking.

Black Hat:-

A “black hat” hacker is a hacker who “violates computer security for little reason beyond maliciousness or for personal gain” (Moore, 2005). Black hat hackers form the stereotypical, illegal hacking groups often portrayed in popular culture, and are “the epitome of all that the public fears in a computer criminal”. Black hat hackers break into secure networks to destroy data or make the network unusable for those who are authorized to use the network.

Part 1: Targeting

The hacker determines what network to break into during this phase. The target may be of particular interest to the hacker, either politically or personally, or it may be picked at random. Next, they will port scan a network to determine if it is vulnerable to attacks, which is just testing all ports on a host machine for a response. Open ports—those that do respond—will allow a hacker to access the system.

Part 2: Research And Information Gathering

It is in this stage that the hacker will visit or contact the target in some way in hopes of finding out vital information that will help them access the system. The main way that hackers get desired results from this stage is from “social engineering”, which will be explained below. Aside from social engineering, hackers can also use a technique called “dumpster diving”. Dumpster diving is when a hacker will literally search through users’ garbage in hopes of finding documents that have been thrown away, which may contain information a hacker can use directly or indirectly, to help them gain access to a network.

Part 3: Finishing The Attack

This is the stage when the hacker will invade the preliminary target that he/she was planning to attack or steal. Many “hackers” will be caught after this point, lured in or grabbed by any data also known as a honeypot (a trap set up by computer security personnel).

Grey Hat:-

A grey hat hacker is a combination of a Black Hat and a White Hat Hacker. A Grey Hat Hacker may surf the internet and hack into a computer system for the sole purpose of notifying the administrator that their system has been hacked, for example. Then they may offer to repair their system for a small fee.

Elite Hacker:-

A social status among hackers, elite is used to describe the most skilled. Newly discovered exploits will circulate among these hackers. Elite groups such as Masters of Deception conferred a kind of credibility on their members.

Script Kiddi:-

A script kiddie (or skiddie) is a non-expert who breaks into computer systems by using pre-packaged automated tools written by others, usually with little understanding of the underlying concept—hence the term script (i.e. a prearranged plan or set of activities) kiddie (i.e. kid, child—an individual lacking knowledge and experience, immature).


A neophyte, “n00b”, or “newbie” is someone who is new to hacking or phreaking and has almost no knowledge or experience of the workings of technology, and hacking.

Blue Hat:-

A blue hat hacker is someone outside computer security consulting firms who is used to bug test a system prior to its launch, looking for exploits so they can be closed. Microsoft also uses the term BlueHat to represent a series of security briefing events.


A hacktivist is a hacker who utilizes technology to announce a social, ideological, religious, or political message. In general, most hacktivism involves website defacement or denial-of-service attacks. Nation state Intelligence agencies and cyberwarfare operatives of nation states.

Android Secret Codes

#1. Normal Android Secret Codes –

Android Secret Codes Functioning
*#*#7780#*#* 1.     Factory restore setting

2.     Clear all application and data.

3.     Remove Google account setting.

4.     Remove System, application data and settings.

*2767*3855# 1.     Reinstall the phones firmware.

2.     Used for factory format.

3.     Remove all files and settings including the internal storage.

4.     Reinstall the firmware.

*#*#197328640#*#* 1.     Enabling test mode for service activity.

2.     Used to enter into Service mode.

3.     You can run and change various tests and settings in the service mode.

*#*#4636#*#* 1.     Phone basic information.

2.     Phone usage detail.

3.     Battery information.

*#*#34971539#*#* 1.     Information about mobile camera.

2.     Get camera information.

3.     Note:- Please avoid update camera firmware option

*#*#7594#*#* 1.     Changing the power button behavior.

2.     Enables the direct power off without asking for selecting any option (silent mode, Aeroplane and power off).

*#*#273283*255*663282*#*#* 1.     Create backup to all your media files.

2.     Opens file copy screen where you can backup your media files like (images, videos and audios).

*#*#8255#*#* 1.     For Google Talk service monitoring.

2.     Used to launch G Talk Service Monitor.

*2767*4387264636* 1.     Used to display product code.
*#0228# 1.     Used to know Battery Status.
*#12580*369* 1.     Software and Hardware Info.
*#32489# 1.     Let you know Ciphering Info.
*#273283*255*3282*# 1.     Data create menu.
*#3282*727336*# 1.     Data usage status.
*#8736364# 1.     OTA update menu.

Wan, GPS and Bluetooth Test And Android Secrets

Android Secret Codes Functioning



1.     WLAN Test.
*#*#232338#*#* 1.     Displays/Shows WiFi MAC address.
*#*#1472365#*#* 1.     For quick GPS test.
*#*#1575#*#* 1.     Different type GPS test.
*#*#232331#*#* 1.     Bluetooth test.
*#*#232337#*# 1.     Displays Bluetooth device address.

#3 Firmware version information:

Codes Functioning
 *#*#1111#*#* 1.     Let you know about FTA SW Version.
*#*#2222#*#* 1.     FTA Hardware Version.
*#*#4986*2650468#*#* 1.     Firmware Info PDA, Phone, H/W, RFCallDate.
*#*#1234#*#* 1.     PDA and Phone firmware info.
*#2263# 1.     RF band selection
*#9090# 1.     Diagnostic configuration.
*#7284# 1.     USB 12C mode control.
*#872564# 1.     USB logging control.
*#745# 1.     RIL dump menu.
*#746# 1.     Debug dump menu.
*#9900# 1.     System dump mode.
*#*#44336#*#* 1.     Shows Build time changelist number.

2.     PDA, Phone, CSC, Build Time, ChangeList number.

*#03# 1.     NAND flash serial number.
*#3214789# 1.     GCF mode status.

#4 Factory Tests –

Secret Codes Functioning
*#*#0283#*#* 1.     Packet Loop-back test.
*#*#0*#*#* 1.     LCD test.


1.     Audio/Melody test.
*#*#0842#*#* 1.     Vibration test and Back Light test Device test.
*#*#2663#*#* 1.     Displays Touch screen version.
*#*#2664#*#* 1.     Touch-Screen test.
*#*#0588#*#* 1.     Proximity sensor test.
*#*#3264#*#* 1.     RAM version.
*#0782# 1.     Real time clock test.
*#0589# 1.     Light sensor test.
*#7353# 1.     Quick test menu.

#5 PDA and Phone:

Android Secret Codes Functioning
*#*#726262#*#* 1.     Field test.
*#06# 1.     IMEI number.
*#*#8351#*#* 1.     Enables voice dialing logging mode.
*#*#8350#*#* 1.     Disables voice dialing logging mode.
**05***# 1.     Execute from Emergency dial screeen to unlock PUK code.
*#301279# 1.     HSDPA HSUPA control menu.
*#7465625# 1.     View phone lock status.

#6 Other Android Secret Codes:

Secret Codes Functioning
*#0*# 1.     Galaxy S3 service menu.
##7764726 1.     Motorola DROID hidden service menu.

2.     The default SPC password is six zeroes(000000).

1809#*990# 1.     LG Optimus 2x hidden service menu.

2.     When prompted for a code enter six zeroes(000000).

3845#*920# 1.     Lg Optimus 3D hidden service menu.

2.     When prompted for a code enter six zeroes(000000).

Best WhatsApp Hacking Tricks

WhatsApp Tricks And Hacks 2015

 1. How To Lock WhatsApp Chats

 As you all know we have to be secured in this modern era.Our main purpose is that to aware you on security. To secure your whatsApp chats from others ,just follow the methods to lock you account.
1. Download And Install

WhatsApp Lock from this Playstore Link.
2. Open the application after installation and “Set a Password”.
3. Now you have done with the Lock And enjoy .
2. How To View Others WhatsApp Chat
In this you will spy on other whatsapp chat,you easily view others chats without any software. using this tricks you can easily view this chats.This tricks is for android.
1. Firstly go to the “WhatsApp” Folder.
2. After opening this folder you contain a “Database” Folder, and you find some files like “msgstore.db.crypt” and “msgstore-*date*-db-crypt”.
3. Copy these files and store them to any storage.
4. WhatsApp Xtract is a tool which displays the chat on the computer.Which is used to extract the encrypted files.
WhatsApp Xtract Tool
5. After the Files you have stored previous you will have to use these.
6. The tools decrypt the files after decrypting you will easily view the chats.
7 .Enjoy the trick.
3) How to Hide your Mobile Number in Whatsapp Groups
  1. So first Uninstall whatsapp and reinstall it.
  2. During the time of Verification it will ask to verify your mobile number.
  3. Put your device on airplane mode.
  4. Install message spoof app for your smartphone from the store.
  5. Now you have to chose an alternative method to verify Whatsapp.Then , check ” Verification through SMS” and
  6. give them your email details and click on send.
  7. Now instantly click on cancel to terminate whole process.
  8. Now open message spoof app and use the details that is given below
    To: +447999347295
    From: +(Country code)(mobile number)
    Message: Your email address
  9. You will be getting the verification at the spoof app just use it and enjoy the whatsapp without having number displayed in whatsapp groups.

4. Migrate WhatsApp Data

 In this method the users can migrate the data including messages from one phone to another phone using this simple tricks.
1. Firstly go to the “File Manager” option where your “WhatsApp” folder is placed in your phone storage.
2. Open the folder and a “Database” folder is their in this ,Just Copy this folder from your phone to the pc.
3. Now come to second phone ,hope your WhatsApp is installed in your another phone, if not installed then installed it from this link.
Download WhatsApp For Android
4. Now Copy the “Database Folder” from pc to the another phone.
5. Enjoy the trick.
5) Use Whatsapp without any number

In this whatsapp hacking tricks you will not need of sim card to be actually there in your smatphone. Follow the steps given below.

  1. So first Uninstall whatsapp and reinstall it.
  2. During the time of Verification it will ask to verify your mobile number.
  3. Put your device on airplane mode.
  4. Install message spoof app for your smartphone from the store.
  5. Now you have to chose an alternative method to verify Whatsapp.Then , check ” Verification through SMS” and give them your email details and click on send.
  6. Now instantly click on cancel to terminate whole process.
  7. Now open message spoof app and use the details that is given below
    To: +447999347295
    From: +(Country code)(mobile number)
    Message: Your email address
  8. You will be getting the verification at the spoof app just use it and enjoy the whatsapp.

6) How To Run Multiple Whatsapp Accounts On Android

1.  First root your android device.

2.  Install switchme app in it which will only work in rooted android.

  1. Now create multiple users account in switchme app and you can switch between these accounts.
  2. In each account you can use different whatsapp with different mobile number registered.

How to Hack CCTV Private Cameras

Hi Friends.

Now a days CCTV cameras are used many place like shops, malls, offices, warehouse etc and more. for security reason and for many more purposes. This articles show you how to hack CCTV cameras. If search on Google for CCTV camera hacking , you will be find tricks for public CCTV camera hacking tricks. But here you will be hack private CCTV cameras


Step 1: Download Angry Ip Scanner

Angry Ip scanner is powerful GUI Port scanner . Angry Ip scanner available for all major OS.

Download and Install Angry ip scanner

Step 2: Choose Ip Address Range

Its important that how to choose proper ip address range for CCTV camera hacking. CCTV cameras are connected with broadband internet connection. If your accessing broadband router then find your public ip address. Just type ‘My IP’ in Google or Bing search bar. Google will show your public ip address

Here is my public ip . So ip range can be o or o

Step 3: Configure Angry Ip for CCTV Camera Hacking

Open Angry Ip Scanner

Go to tools > Preferences > Ports | add ports 80,8080,23 in Port selection tab
It will scan 80,8080 and 23 port.

We need add web detect. Web detect can show short details about device details connected to internet. like as follow

  1. CCTV camera model name
  2. CCTV camera name
  3. router name or router model name

Add web detect as follows

Go to Tools > Fetchers > add (<<) web detect

Click OK

Step 4: Start Ip Range Scanning

Add ip range in Ip range tab and click start

After scanning finished you will find interesting information in web detect tab some examples as follows

  1. RomPager/4.07 UPnP/1.0 —– router
  2. uc-httpd 1.0.0 —– CCTV camera
  3. DVRDVS-Webs —– CCTV camera
  4. microhttpd —– router
  5. Webs —– CCTV camera
  6. Hikvision-Webs —– CCTV camera
  7. iBall-Baton —– CCTV camera

Copy ip address of detected CCTV camera and pest in browser press enter.

Step 5: Default Username and Password

Most of the CCTV cameras and router configured default username and password. example

Username : admin | password : admin
Username : admin | password : (blank password)
Username : admin | password : 12345
Username : admin | password : 9999

You can find default username and password list trying some googling

some CCTV cameras need plugin, you can download from same page. If not found plugin at same page then go to manufacture website site and download it.

Step 6: Crack CCTV Camera Password Using Hydra

If default password not work then we need to crack it. hydra is powerful brute for tool can crack CCTV cameras password.

Now fire up kali
root@DeepHack:~# hydra -s 80 -l admin -P /root/Desktop/wl/cctvpass.txt -e ns -t 16 targetIP http*

Hydra syntax

-s 80 — define port number
-l admin — default login name admin
-P /root/desktop/worldlist.txt — choose your word list for brute force
-e — empty password
ns — try login as passwordand try empty password
http — port name for attack

Using these can hack CCTV cameras

Step 7: Warnning

This article is only for education purpose . Aim of these article is that how can secure cctv cameras using strong passwords. Do not use for criminal or another black art purpose. I am not responsible for that.

How to Hack AppLock in Android

No need to uninstall the app or no root is required. well! let us see how to bypass AppLock android app without knowing password.



Note: This trick will not work if the settings is locked by the admin.
To hack AppLock just follow these simple steps.
1. Take the target phone in which you want to hack AppLock.
2. Now go to settings and then tap on Apps or Applications.
3. You will see AppLock app under downloaded section and tap on it.

4. After that tap on Force stop option.

With this AppLock application is currently in idle state. You can open locked apps with out entering password.

How to make a Virus


Note:The information given on this page in intended solely for educational purposes and it is not intended,in one way or other to create any sort of damage.By reading the following information you have agreed not to use this information for any destructive purpose.

Viruses that cannot be detected by Any Anti Virus Software!

Have you heard of Visual Basic?Visual Basic is a computer programming language.Its used to create useful software.It can also be used to create games,screensavers,and lots of more things. Visual Basic has certain commands that are used to do something with files.Some open files,some write to files,some create files,and some delete files.Now,here’s where the game begins!

The “Kill” command

The command which is used to delete the files is called the Kill command.What this command does,is that it deletes the file(s) which it is instructed to delete.For the ones not familiar with Visual Basic,it works like this:
What’s happening here is that the file abc.txt found in the folder C:Abc is being deleted.Any file can be deleted using the above statement in Visual Basic.For example.if we want to delete file xyz.txt found in C:Xyz then we will use the following statement:


Wildcards are names of file extensions written between *s.For example,the following:

is the wildcard of text files.Wildcards can be used to select only those files who have a certain file extension.For example,the above wildcard will select only the text files.Wildcards can be used with the kill command to delete files having a certain extension.For example:


will delete only the text files from the folder C:abc.Using wildcards with the kill command means that one kill command will delete multiple files from a folder,instead of one.I mean,that in the command without wildcards,only the file abc.txt or xyz.txt were deleted.However after using the wildcard *.txt*,ALL of the text files were deleted.The wildcard *.* is the most dangerous wildcard because it will delete all the files from a folder regardless of their file extensions.Have a look at the following statement:


This statement will select all files in the folder C:abc and delete them.

The real idea!

We have seen,from the above examples,that the Kill command deletes files without the user’s permission or without informing the user.Now,what some people are doing,is that they are using the file names which are extremely important for a computer,e.g someone might put a statement like:

This statement will delete all the files from the windows folder of the computer.If you already don’t know,then the Windows folder is the most important folder of your computer.This folder contains many files that are vital,and I mean vital for your computer.If even one of those files gets deleted then the computer wouldn’t be able to even start.Using above statement someone might create a program,and start telling other people its his/her photo or he might start spreading the program on the internet as a free software.No matter what Anti virus software or firewall or whatever you are using,if you scan that file it would be rendered as a harmless file.And then once you open that file,all that’s gonna happen is that your Windows folder would get washed up and you’ll be deprived of all your important files.In some cases,you might even need to get a new computer!These viruses could be the most deadly viruses ever created!

Note:these are a real danger to your computer beware of them.If you get And pdf file or a pic in your mail with an extendion in the last as .exe then do not download the file or double click it !!!

Another warning !! The internet has been stormed with a Virus that is a problem creator it is a pdf file showing the death of the north Korean president but it is really the death of your computer!!(taken from the newspapers)



Step 1: Go to Start Type “Run” > Type “CMD”

Then ,Open Command Prompt in the Administrative Mode.

Step 2: there will be a black coloured window that will be opened for you.

Step 3: you have to Type in Command prompt :  attrib -h -r -s /s /d <Your USB drive letter>:\*.*(See <Your USB drive letter> from My computer and then type it For ex, if your drive letter is “D” then the command is like: ” attrib -h -r -s /s /d D:\*.* “).

Thank You

3 Basic Tips To Prevent A DDoS Attack

 DDoS Attack

Distributed denial-of-service (DDoS) attacks are always in top headlines worldwide, as they are plaguing websites in banks, and virtually of almost every organization having a prominent online presence. The main cause behind the proliferation of DDoS attacks is that there is a very low-cost that the attacker has to incur to put such attack in motion. Fortunately, today various prevention methods have been developed to tackle such attacks. Before delving further into understanding about the ways to prevent DDoS attack, let’s first understand what exactly a DDoS attack is!

Understanding DDOS Attack
 DDoS Attack bot
A DDoS (distributed denial-of-service) attack is an attempt made by attackers to make computers’ resources inaccessible to its anticipated user. In order to carry out a DDOS attack the attackers never uses their own system; rather they create a network of zombie computers often called as a “Botnet” – that is a hive of computers, to incapacitate a website or a web server.
Let’s understand the basic idea! Now, the attacker notifies all the computers present on the botnet to keep in touch with a particular site or a web server, time and again. This increases traffic on the network that causes in slowing down the speed of a site for the intended users. Unfortunately, at times the traffic can be really high that could even lead to shutting a site completely.

3 Basic Tips to Prevent a DDoS Attack

There are several ways to prevent the DDOS attack; however, here in this guest post I’ll be covering three basic tips that will help you to protect your website from the DDoS attack.

1. Buy More Bandwidth.

 DDoS Attack bandwidth
One of the easiest methods is to ensure that you have sufficient bandwidth on your web. You’ll be able to tackle lots of low-scale DDOS attacks simply by buying morebandwidth so as to service the requests. How does it help? Well, distributed denial ofservice is a nothing more than a game of capacity. Let’s suppose you have 10,000 computer systems each distributing 1 Mbps directed towards your way. This means you’re getting 10 GB of data that is hitting your web server every second. Now, that’s causes a lot of traffic!
So to avoid such issue, you need to apply the same rule intended for normalredundancy. According to this technique, if you wish to have more web servers just multiply around diverse datacenters and next make use of load balancing. By spreading your traffic to various servers will help you balance the load and will most likely create large space adequate to handle the incessant increase in traffic.
However, there’s a problem with this method that is buying more bandwidth can be a costly affair. And as you’ll know that the current DDoS attacks are getting large, and can be a lot bigger exceeding your budget limit.

2. Opt for DDoS Mitigation Services.

A lot of network or Internet-service providers render DDoS mitigation capabilities. Look for an internet service provider having the largest DDoS protection and mitigation network, automated tools, and a pool of talented anti-DDoS technicians with the wherewithal to take action in real-time as per the varying DDoS attack characteristics. A viable alternative is to utilize a DDoS prevention appliance, which is specifically intended to discover and prevent distributed denial-of-service attacks.

3. Restricted Connectivity.

 DDoS Attack
In case you have computer systems that are connected to the web directly, a better idea is to properly install/configure your routers and firewall so as to limit the connectivity. For an instance, while receiving some data from a client machine you can only allow traffic to pass from the machine only on a few chosen ports (like HTTP, POP, SMTP etc.) via the firewall.

Wrapping Up!

Websites are largely getting attacked by hackers every second. Denial-of-serviceattack is insanely getting huge and is creating a lot of problems for business organizations having strong online vicinity. In this guest post you’ll not only understand what a DDoS attack actually means, but will also come to know about a few type of methods to prevent DDoS attacks. Aforementioned are three tips that I’ll recommend you to run through to at least understand where to get started towards building a resilient web network with chances of surviving a DDoS attack.

Bug In Windows Calculator

Note:- It works with all versions of Windows.

Have you ever used square root button in windows?

If yes, it is a possibility that you might have come across this bug…. If not, you are just about to know it..

Just follow the steps:-

1) Open calculator ie..  
   Goto run and type – calc 

2) Now type the following
   2.1) Type 4
   2.2) Take its square root  by using the square root button,
   2.3) Now you will get 2. Subtract 2 from it.
   2.4) The answer should have been 0 but its not. You would have got a long number as your answer.

See.. it was as simple.

Here is the general syntax to this bug.

1) Take Any number 
2) Take its square root
3) Subtract its square root from it
4) Your answer is not 0.. That’s the bug.

I am sure this was something new for most of you out here..;-)