Cyber Army

Join the Cyber Army 

This is a group of Hackers, Penetration Testers, developers, Security Experts, Programmers. For Us Hacking is not a weapon for Cyber War, we believe in using Hacking skills for Security and Development. We are members from different countries and Religions. I think this is the best example of Team work where everyone is dedicatedly having concentration of Development and Security. We don’t believe in cyber war and working underground. We don’t need to prove us!

The Purpose of  Cyber Army (India) is that we want to educate every youngster and need to guide them in right direction in this Cyber Field. Real Hackers are not who know to deface a website or who can root venerable servers. The Real Hackers are whose who can gather the useful information either for good purpose or may be for wrong, depends upon the individual. But the Fact is that Hacker is that, who can code programs, who can find vulnerabilities, who can write exploits and who can test the every possible way to hack a system.

Why the name –  Cyber Army (India) ?
No one can said that “ Cyber Army (India) ” is my, Even I also can’t declare that ICA is mine.  Cyber Army (India)  is the group of Hackers or individual from different parts of India, who care for Nation!

 I believe, anyone can use the name Cyber Army (India) , who is interested to work for Indian’s Cyber Space. Yeah, may be the way of working will be different but the aim is same. Here on our site everyone is openly invited to join us, either he/she is from India or any other country. We are “ Cyber Army (India) ”, that does not mean that we love only Indians.

The meaning of ICA is that, a step taken by an Indian for securing the cyber world and taking stand with best of the best persons of Cyber Field. Here ICA is not mean to only a group of 10-15 members, Even in actual,  Cyber Army (India)  should include every that person who is interested to be the part of National Security !

Decode Keyloggers and Stealers - Get passwords of Hackers 
Hello, here method to hack the hackers..If you have a keylogger on your computer, and you know the file, this process will easily give you the FTP website they are using so you can get the logs for the files, and if they use the same keyloggers on other computers, you’ll get the logs for that to
What is Reverting ?
Reverting generally means reversing an action or undoing the changes. Here in our case, reverting would be more of reversing the action. For this we will need a key logger server using ftp. It can be found on warez sites, you tube etc.

Tools needed:
1) Key logger, pass stealer
2) Cain and Abel
3) Virtual machine (so you don't get infected, and what if the hacker is using better protocol that'd be epic fail)


Do you really know how to stop them?


Facebook is, undoubtedly, the most popular social networking website with more than 500 million active users. Due to its popularity, many hackers (or should I say crackers?) are actively involved in hacking Facebook accounts of unsuspecting users. This article outlines the many strategies that such hackers use to gain access to Facebook accounts of hundreds of users each day and how you can stop them from hacking your account.

Email Address Hack
I have always been puzzled by Facebook's leniency in this matter. All a hacker needs to do is know your email address and he will be displayed  a confirmation showing your name even if he enters the wrong password. How easily a hacker can then hack your Facebook account if he 'guesses' your password (if you use a weak password) or answers your security question! This is something I hope Facebook improves on quickly. Until Facebook does so, here are some tricks you can use to protect yourself from this vulnerability.

How to safeguard your Email Address?
Just follow these steps:-

Hide your Email Address from everyone by going to Edit Profile>Contact Information>Clicking on the icon beside your email address> checking 'Only Me'.
Change your primary email address to a one that is only known to you by going to Account Settings>Email> and changing your primary email to the new one (known only to you) and removing your previous email address.
For additional security, when in Account Settings, check 'Secure browsing' and 'Send me an email when a new computer or mobile device logs into this account' and click Save.


A hacker at work!
Phishing
Phishing is one of the easiest ways to trick users into giving out their login credentials. All a hacker does is setup a webpage similar in design to that of the Facebook homepage, attach a server sided script to track the username and password entered and store it in a log. Sending people emails stating that someone tagged a photo of them on Facebook in the same format as Facebookand giving a link below to the phishing website further reduces the chances of it being detected as a fake. Sometimes, spam Facebook apps, like those promising to tell who viewed your Facebook profile, automatically post links to phishing websites. A new trend amongst phishers is creating Facebook look-a-like widgets for stealing user's login credentials.

How to prevent yourself from being phished?
At all costs, avoid clicking on suspicious links. Moreover, always check the URL in the address bar before signing in. Avoid logging in through various "Facebook widgets" offered by websites and blogs. Instead, use Facebook's homepage to sign in. Always try to use Safe Search while searching. If you do manage to get phished, report the website so that others may get a warning before visiting it.

Keylogging through Keyloggers
Keylogger is a type of computer virus that tracks key strokes. Keyloggers can be installed remotely on a computer system by a cracker to record all the activity that is going on the victim's computer. Keylogging gets more easy if the hacker has physical access to the victim's computer.

How to stop keyloggers?
Install a good antivirus and update it frequently. Do not click on suspicious links and avoid downloading illegal software. Also, avoid installing free toolbars and other such spam software. Always scan third-person's flash and pen drives before using them on your computer.

Detailed Guide:- PC Security tips to make computer secure

Social Engineering
Social engineering involves using any trick to fool the user into making himself vulnerable to exploits. This could involve anything from sending spoof emails, pretending to be from Facebook, telling you to change your password to 12345678 to a hacker maliciously getting out the answer to your Security Question in a friendly chat or discussion.

How to prevent yourself from being socially engineered?
Stay aware during chats and discussions. Use a tough security question, preferably one whose answer you would never disclose to anyone. Moreover, Facebook, or any other company for that matter, will never ask you to change your password to 12345678 or do something as silly as asking you to send out your login details to prove that you are an active user. Always think before taking actions and your e-life on Facebook will be safe from hackers looking to hack Facebook accounts.

0 comments:

Post a Comment