Saturday 22 September 2018

Get the Nigerian MTN 500MB in 30sec free

Let get straight to the point.

Step 1

Download this app name myMtn from playstore or ios.

Step 2

Open it, select your country.

Step 3

After that enter your mobile number, to receive an OTP.

Step 4

Enter the OTP and click on verify.

Step 5

On the next screen that appears click on get 500mb, and you will get it instantly.

You can do for your friends, just click on the menu and locate change user. That all.
Share:

Thursday 20 September 2018

Fact of life on attitude proved by mathematics 2018



[caption id="attachment_27" align="alignnone" width="300"]fact of life image Fact of life on attitude proved by mathematics[/caption]



This is the mathematical fact I recently received from a friend, written by an unknown writer.

This article is on attitude. It contains mathematics provens of facts of what brings a man the best return of his life in his life time.

I am not a mathematician but I find this to be Very interesting and meaningful message to share:

If:

A = 1 ; B = 2 ; C = 3 ; D = 4 ;

E = 5 ; F = 6 ; G = 7 ; H = 8 ;

I = 9 ; J = 10 ; K = 11 ; L = 12 ;

M = 13 ; N = 14 ; O = 15 ; P = 16 ;

QQ = 17 ; R = 18 ; S = 19 ; T = 20 ;

*U = 21 ; V = 22 ; W = 23 ; X =24 ;*í

*Y = 25 ; Z = 26.*

 

*Then,*

 

H+A+R+D+W+O+R+K*

=8+1+18+4+23+15+18+11

= 98%

 

K+N+O+W+L+E+D+G+E

=11+14+15+23+12+5+4+7+5

=96%

 

L+O+V+E

= 12+15+22+5

= 54%

 

L+U+C+K ;

=12+21+3+11

= 47%

 

None of them makes 100%.

Then what makes 100%?

 

Is it Money?

.

.

NO!

 

M+O+N+E+Y

= 13+15+14+5+25

=72%

 

Leadership?

.

.

.

NO!

 

L+E+A+D+E+R+S+H+I+P

=12+5+1+4+5+18+19+8+9+16

=97%

 

*Every problem has a solution, only if we perhaps change our*

 

"ATTITUDE"...

 

A+T+T+I+T+U+D+E ;

1+20+20+9+20+21+4+5

*= 100%*

 

It is therefore OUR ATTITUDE towards Life and Work that makes.

OUR Life 100% Successful.

Amazing mathematics, abi.

Please share it to all you friends.

Therefore, your profession or geographical location can not give you 100% success in life, whether you are doctor, teacher, lawyer, programmer, US, UK Canada, Afric and so on.

Your skills such as leadershipleadership and knowlegde can also not give you 100% success but your attitude will.

Please, view and sharemore of our articles and you may also contribute by signing up with us to contribute and earn.
Share:

Wednesday 19 September 2018

Saturday 8 September 2018

How to Hack & Secure a Wireless Network (Complete Guide)

Wifi stands for Wireless Fidelity, Its a device that performs the functions of a router but also includes the functions of a wireless access point and a network switch.
They are commonly used to allow access to the Internet or a computer networks without the need for a cabled connection. Wifi is commonly used in airports , Offices etc

How Wifi Works?


The working of Wifi is pretty simple to understand. The components of wireless network includes a communication device such as a laptop or a cell pone etc, a router and internet connection
The communication device which has a wireless compatibility ( laptops )converts the data in the form of radio waves and transmits it to the router, through an antenna. The router receives the signal and decodes it. The router sends the information to the Internet using a physical, wired Ethernet connection.

The reverse communication follows the same ( i.e) the router receiving information from the Internet, translating it into a radio signals and sending it to the computer’s wireless adapter.

What’s the Risk?


Security is an important part of a home wireless network. If you set your router to create an open hotspot, anyone who has a wireless card will be able to use your signal. And he/she will be able to use your internet connection .

To protect and keep our internet private we can use one the following encryptions

WEP


Wired Equivalent Privacy (WEP) is a weak security algorithm for wireless networks. Its intention was to provide data confidentiality comparable to that of a traditional wired network. WEP, recognizable by the key of 10 or 26 hexadecimal digits, Its widely in use and is often the first security choice presented to users by router configuration tools.
Although its name implies that it is as secure as a wired connection, WEP has been demonstrated to have numerous flaws and has been deprecated in favor of newer standards such as WPA2.

WPA And WPA 2


WPA (Wi-Fi Protected Access) and WPA2 (Wi-Fi Protected Access II ) are two security protocols for wireless networks from the Wi-Fi Alliance that was developed to provide a migration from WEP.
The Alliance defined these in response to serious weaknesses researchers had found in the previous system, WEP

But these encryptions can also be broken , The following demo shows us how easy it is to crack WEP Keys.

 How to Secure Your Wireless Network


1. Never use WEP as your encryption type, always use WPA Or WPA 2 as your encryption type.
2.Use strong passwords , which can not be cracked easily by using a dictionary attack or brute force attack.
3. Always Use a Vpn when your using pubic Wifi hotspots.Hope this Information Helps You , For further doubts and clarifications please pass your comments
Share:

Penetration Testing (Types)

There are primarily three varieties of penetration testing: white field, black field, and grey field.

– White Box Testing
White field testing is when the testing crew has entry to network diagrams, asset data, and different helpful knowledge. This technique is used when budgets are tight and the quantity of allowed hours is proscribed. This kind of testing is the least lifelike, in of what an attacker could do.

– Black Box Testing
Black field testing is when there may be positively no info supplied to the penetration testing crew. Actually, utilizing this technique of testing, the penetration testing crew could solely be given the group title. Other instances, they might be given an IP vary and different parameters to restrict the potential for collateral harm. This kind of testing most precisely represents what an attacker could do and is probably the most lifelike.

– Gray Box Testing
Gray field testing is, you guessed it, someplace in between white field testing and black field testing. This is the very best form of penetration testing the place the penetration testing crew is supplied with restricted info and solely as wanted. So, as they work their manner from the skin in, extra entry to info is granted to hurry the method up. This technique of testing maximizes actuality whereas remaining price range pleasant.
Share:

How to Hack your ISP (Internal Service Provider)

What is FUP?

Most ISPs implement a Fair Usage Policy which will decrease the speed after you reach the usage limit. For eg. - in my case I will have to live with 512 kbps after my 50 GB data usage is over

The ISP doesn't (officialy) provide customers with any interface to view their current usage. This is pretty frustrating as you never know whether you have actually gone over your FUP limit or not.

With the outside temperatures reaching 43-44 degrees, I had no other option but to stay in the house and do something. My first aim was to understand how the ISP was maintaining the usage info of its customers. I logged into my router's admin console (192.168.2.1) and went straight to the page which shows me the info about the internet connection (PPPOE). From there I found the gateway IP address. Gateway IP address is the IP address of a router/computer through which all your internet traffic goes. You can imagine it as a big router which connects all the customers to internet. This should be the place where my internet usage is getting recorded.



I started a scanning the Gateway IP address for open ports using Zenmap(nmap GUI for Windows). I found that the following ports were open and seemed interesting.

  • Port 80 - http

  • Port 443 - https

  • Port 3306 - mysql


Since port 80 and 443 were open. I quickly opened the Gateway IP address on my browser and found the login page of the customer management portal. This was the place I was looking for.



I tried entering my PPPOE username and default password and voila it worked. I could now see my current usage, change the default password and do much more. A quick glance on the info assured me of the foul play by my ISP. The ISP was actually just giving me 30GB FUP instead of the promised 50GB.



This was enough for the hacker inside me to wake up and start working. I went to the login page and tried some basic SQL injection inputs and luckily one of inputs worked and I was logged into someone else's account. I saw that this username was starting with letter 'a' and I quickly figured out that this must be the first username in the database. The SQL injection has bypassed the username and password check and logged me in as the first available user. I tried some more SQL injection queries to find whether error based SQL injection was an option or not. But sadly they have disabled all the errors. I also tried some other options but none of them seemed to work.

 

Now the only option that I could think of was doing a Time Based Blind SQL injection which would take a lot of time since it like asking database true or false questions and then making sense depending on the answers.

I knew that doing this manually is not an option. So I fired up a KALI Linux instance on a Hyper-V Virtual Machine and instructed SQLMAP (an automated SQL injection tool) to do all of the hard work for me for the rest of the night. You have to patient if you are doing a Time Based SQL injection.

KALI Linux is an Advanced Penetration Testing Linux distribution used for Penetration Testing. Hyper-V is an alternative to Virtual Box that comes pre-installed on Windows.

 



I woke up next morning to find out the I have got the dump of table containing four username and password of elevated users of the management software. I appended /admin to the Gateway IP hoping that it would take me to the admin login page and I was right.

Now the problem was that the password was hashed one way. I looked at the hash and quickly figured out that it is a MD5 hash(32 character). I googled 'MD5 reverse', opened the first link and pasted the hash in the hope of getting the original value. Out of the four hashes I was able to reverse the two because the passwords were same and very simple. You must be wondering what was the password. Try to reverse this hash d8578edf8458ce06fbc5bb76a58c5ca4 and you will get it. It was really that simple.

I logged in with the username and password and the ship was now in my control.



But this user didn't had some of the more elevated privileges like changing the minimum speed of the user etc.

So I took the other hash and started trying to reverse it on various different websites. Luckily on one of the sites, I was able to successfully reverse the hash, the password was 9 character long containing upper and lowercase letters, numbers and special characters. I know such a password is generallly regarded as safe but one should clearly accept the fact that MD5 is easy to reverse and short passwords are always a bad idea even if there contain special characters.

What information was available in admin panel?

  • All the usernames and their MD5 password hashes. The ISP used the default password for everyone and it was a single password therefore it was very simple to reverse it.

  • A good thing was that each account was binded with a MAC address. So even if I had the username and password of someone else I would not be able to use that. The bad thing about this was I also got their MAC addresses from the admin panel so I could easily fake my MAC address in my router settings and use any other username and password easily. I never tried this but I am sure that it would have worked for sure.

  • Various other information like phone, email, address etc. that I didn't cared about.

Share:

Sample Text

Copyright © Promoting Unique Content | Powered by Blogger Design by ronangelo | Blogger Theme by NewBloggerThemes.com