Tuesday 5 August 2014

Microsoft Word shortcut keys

Ctrl + b : you can order your
favorite file by this command
ctrl + f : you can search for
some word
ctrl + s : save the work you've
done
ctrl + shift or right index
makes the writing go to the
left
alt + f4 : is useful to close the
windows
alt + esc you can move from
window to window
alt + tab : is very useful if
there are many windows open
you can choose the required
window
alt + shift : switch between
languages
f2 : very useful and fast to
change the name of a specific
file
Ctrl + C : Copy
Ctrl + X : Cut
Ctrl + V : Paste
Ctrl + Z : Undo
Ctrl + A : Select all
Ctrl + ESC : task list (Start)
Ctrl + Enter : Starting a new
page
Ctrl + END : Move to end of
file
Ctrl + F5 : Thumbnail file
window
Ctrl + F6 : move between files
Ctrl + F2 : preview the page
before printing
= + Ctrl : zoom in and out,
one degree
F4 : repeat the last process
Alt + Enter : repeat the last
process
Ctrl + Y : repeat the last
process
Shift + F10 : Bullets and
digital
F12 : Save As
Shift + F12 : Save the file
Ctrl + Home : the first
document
Ctrl + End : Latest document
Shift + F1 : information about
type of coordination
Ctrl + U : line under the text
Ctrl + F4 : Exit from the file
Ctrl + N : New File
Ctrl + H : Replacement
Ctrl + I : slash
Ctrl + K : Document Format
Ctrl + P : Print
Ctrl + O : open area
Alt + S : List Format
Alt + J : Help Menu
[+ Alt : List Table
] + Alt : Tools Menu
Alt + U : View menu
Alt + P : Edit Menu
Alt + L : file list
"+ Alt : window List
Alt + Q : modified procedure
Ctrl + E : Center text
Ctrl + F : Search
Ctrl + B : black line
Ctrl + Shift + P : font size
Ctrl + Shift + S : Style
Ctrl + D : line
Ctrl + Shift + K : character
conversion - Capital
Shift + F3 : character
conversion - Capital
Ctrl + Shift + L : point at the
beginning of the text
Ctrl + Alt + E : footnotes
numbered Romanian
Ctrl + Alt + R : Mark ®
Ctrl + Alt + T : Mark ™
Ctrl + Alt + C : Mark ©
Ctrl + Alt + I : preview the
page before printing
Shift + F7 : Thesaurus
Ctrl + Alt + F1 : System
Information
Ctrl + Alt + F2 : Open
Directories
Ctrl + J : resolving the text
from both sides
Ctrl + L : the beginning of the
text from the left side
Ctrl + Q : the beginning of the
text from the right side
Ctrl + E : Center text
Ctrl + M : changing the size of
the top paragraph
Shift + F5 : To return to the
position that you finished it
when you close the file
= + Ctrl + Alt : Customize
F3 : AutoText entry
F9 : Check fields
F10 : Move the framework to
open windows
F1 : Help
F5 : Jump to
F7 : Spelling
F8 : Select Zone

Why Programming For Hacking ???

Learn a programming language. You
shouldn't limit yourself to any particular
language, but there are a few guidelines.
C is the language the Unix was built with. It
(along with assembly language) teaches
something that's very important in hacking:
how memory works.
Python or Ruby are high-level, powerful
scripting languages that can be used to
automate various tasks.
Perl is a reasonable choice in this field as
well, while PHP is worth learning because the
majority of web applications use PHP.
Bash scripting is a must. That is how to
easily manipulate Unix/Linux systems—
writing scripts, which will do most of the job
for you.
Assembly language is a must-know. It is the
basic language that your processor
understands, and there are multiple
variations of it. At the end of the day, all
programs are eventually interpreted as
assembly. You can't truly exploit a program
if you don't know assembly.

Top Ten Torrent Web Sites

1) The Pirate Bay
2) KickassTorrents
3) Torrentz
4) ExtraTorrent
5) YIFY-Torrents
6) EZTV
7) 1337x
8) isoHunt.to
9) BitSnoop
10) RARBG
": Legal Warning :- Copy right Files
Downloading From Pirates Sites Are illegal "

What is Tabnabbing?

Tabnabbing is a computer exploit and
phishing attack, which persuades users
to submit their login details and
passwords to popular websites by
impersonating those sites and convincing
the user that the site is genuine. The
attack's name was coined in early 2010
by Aza Raskin, a security researcher
and design expert.
The attack takes advantage of user
trust and inattention to detail in
regard to tabs, and the ability of
modern web pages to rewrite tabs and
their contents a long time after the
page is loaded. Tabnabbing operates in
reverse of most phishing attacks in that
it doesn’t ask users to click on an
obfuscated link but instead loads a fake
page in one of the open tabs in your
browser.
The exploit employs scripts to rewrite a
page of average interest with an
impersonation of a well-known website,
when left unattended for some time. A
user who returns after a while and sees
the rewritten page may be induced to
believe the page is legitimate and enter
their login, password and other details
that will be used for improper purposes.
The attack can be made more likely to
succeed if the script checks for well
known Web sites the user has loaded in
the past or in other tabs, and loads a
simulation of the same sites. This attack
can be done even if JavaScript is
disabled, using the "meta refresh" meta
element, an HTML attribute used for
page redirection that causes a reload of
a specified new page after a given time
interval.
The NoScript extension for Mozilla
Firefox defends both from the
JavaScript-based and from the
scriptless attack, based on meta
refresh, by preventing inactive tabs

Sniffing password over network by cain and abel

Introduction
UNIX users often smugly assert that the best
free security tools support their platform
first, and Windows ports are often an
afterthought. They are usually right, but Cain
& Abel is a glaring exception. This Windows-
only password recovery tool handles an
enormous variety of tasks. It can recover
passwords by sniffing the network, cracking
encrypted passwords using Dictionary, Brute-
Force and Cryptanalysis attacks, recording
VoIP conversations, decoding scrambled
passwords, revealing password boxes,
uncovering cached passwords and analyzing
routing protocols.
We are going to explain Cain & Abel in
context to Man-in-the-middle attack.
Sniffing LAN passwords using Cain & Abel.
(Works only for ethernet netwoks)
>Run Cain and abel
>Now click on the sniffer tab, right click and
select Scan MAC Addresses.
>Check "All tests" and click OK. Cain & Abel
will start scanning the MAC addresses
>Click to ARP ( yellow symbol ) after
scanning the host then click to Plus Symbol
>Click to left side box of any IP. it
automatically comes right hand side box
>Pess the Ctrl or shift select all then click ok
>All the host in Idle postion then click to
yellow symbol to Start the poisoning
>now ARP Poisoning start in the network
>Check the logs. Click to passoword options

WEB PENTESTING-

web pentesting there
are many type of bugs in the website
some which is given below
1.sql injection-
this type of bug is for beginner there are lot
of the websites .for tat we can insert in the
input field following command like
' or '1'='1
in the username and password both aNd
after that u can bypass the cpanel of the
websites
and upload your vuln shelll and after that
you can use metasploit for shared server
hacking
if there is linux server is used then you can
root the server or symlink the particular
server.
2.SQLI-
these type of vulnerability in the database of
that websites.for attacking on that you can
use havij for windows machine(KIDDIES).if
you are work on linux then you can use
sqlmap for
datebase hacking if you are professional
hacker then you can use the browser side
query based
attack on that target website.Once you got
the admin and pass themn you can deface
thaT
by using shell like C99,R57 etc
3.XSS-
this is cross site scripting based attack on
that websites in which we can insert the
text on that target websites and which can be
reflected on that browser side or can we
stored '
on the database of website(server side)
4.dir traversal-
it is a type of bug in which there is sensitive
link is directly is open by url side
by browser
5. Remote code execution vulnerability-
A Remote Code Execution attack is a result of
either server side or client side security
weaknesses.
Vulnerable components may include libraries,
remote directories on a server that haven’t
been monitored, frameworks, and other
software modules that run on the basis of
authenticated user access. Applications that
use these components are always under
attack through things like scripts, malware,
and small command lines that extract
information.
some examples of that LFI,RFI,web dav
remote code execution,JCE exploit etc
6. DDOS-
DDoS, or Distributed Denial of Services is
where a server or a machine’s services are
made unavailable to its users.
it's usually agenda is temporarily interrupt or
completely take down a successful running
system.
DDoS attack could be sending tons of URL
requests to a website or a webpage in a very
small amount of time.
BOTNET is popularly used for that DDOS,BY
BOTNET we can connect many clients on
that .
after that we can flood on that websites.