Friday, June 5, 2015

PASSWORD HACKING . A BRIFE INTRODUCTION

PASSWORD HACKING

Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.
Most passwords can be cracked by using following techniques :

1) Hashing : Here we will refer to the one way function (which may be either an encryption function or cryptographic hash) employed as a hash and its output as a hashed password.
If a system uses a reversible function to obscure stored passwords, exploiting that weakness can recover even 'well-chosen' passwords.
One example is the LM hash that Microsoft Windows uses by default to store user passwords that are less than 15 characters in length.
LM hash breaks the password into two 7-character fields which are then hashed separately, allowing each half to be attacked separately.
Advice: Hash functions like SHA-512, SHA-1, and MD5 are considered impossible to invert when used correctly.

2) Guessing : Many passwords can be guessed either by humans or by sophisticated cracking programs armed with dictionaries (dictionary based) and the user's personal information.
Not surprisingly, many users choose weak passwords, usually one related to themselves in some way. Repeated research over some 40 years has demonstrated that around 40% of user-chosen passwords are readily guessable by programs. Examples of insecure choices include:
  • blank (none)
  • the word "password", "passcode", "admin" and their derivatives
  • the user's name or login name
  • the name of their significant other or another person (loved one)
  • their birthplace or date of birth
  • a pet's name
  • a dictionary word in any language
  • automobile licence plate number
  • a row of letters from a standard keyboard layout (eg, the qwerty keyboard -- qwerty itself, asdf, or qwertyuiop)
  • a simple modification of one of the preceding, such as suffixing a digit or reversing the order of the letters. and so on....
In one survery of MySpace passwords which had been phished, 3.8 percent of passwords were a single word found in a dictionary, and another 12 percent were a word plus a final digit; two-thirds of the time that digit was.
Advice: A password containing both uppercase &  lowercase characters, numbers and special characters too; is a strong password and can never be guessed.

3) Default Passwords : A moderately high number of local and online applications have inbuilt default passwords that have been configured by programmers during development stages of software. There are lots of applications running on the internet on which default passwords are enabled. So, it is quite easy for an attacker to enter default password and gain access to sensitive information. A list containing default passwords of some of the most popular applications is available on the internet.
Advice: Always disable or change the applications' (both online and offline) default username-password pairs.

4) Brute Force : If all other techniques failed, then attackers uses brute force password cracking technique. Here an automatic tool is used which tries all possible combinations of available keys on the keyboard. As soon as correct password is reached it displays on the screen.This techniques takes extremely long time to complete, but password will surely cracked.
Advice: Long is the password, large is the time taken to brute force it.

5) Phishing : This is the most effective and easily executable password cracking technique which is generally used to crack the passwords of e-mail accounts, and all those accounts where secret information or sensitive personal information is stored by user such as social networking websites, matrimonial websites, etc.
Phishing is a technique in which the attacker creates the fake login screen and send it to the victim, hoping that the victim gets fooled into entering the account username and password. As soon as victim click on "enter" or "login" login button this information reaches to the attacker using scripts or online form processors while the user(victim) is redirected to home page of e-mail service provider.
Advice: Never give reply to the messages which are demanding for your username-password, urging to be e-mail service provider.

It is possible to try to obtain the passwords through other different methods, such as social engineering, wiretapping, keystroke logging, login spoofing, dumpster diving, phishing, shoulder surfing, timing attack, acoustic cryptanalysis, using a Trojan Horse or virus, identity management system attacks (such as abuse of Self-service password reset) and compromising host security.
However, cracking usually designates a guessing attack.

Keep Learning. Keep Rocking :)

How to maximize phone battery lifespan


Lithium polymer (Li-Poly) battery of iphoneNow that you bought a replacement battery for your phone, you must be determined to make the maximum use of the battery before needing any replacement. This blog post will deal with increasing the lifespan of mobile phone batteries. battery lifespan is the duration that a rechargeable battery can be used before it needs replacement. Lifespan of a battery can be several months or few years.


At the current rate of producing new smartphones, you may hardly need to replace a battery. It’s more likely that before the battery needs replacement, you will upgrade to a newer model! But still if you love the phone you have and don’t plan to sell it for an upgrade, or you are a phone enthusiast like me who keep all the phones that you use and boast that all of them are in pristine working condition, you are sure to find this very helpful!

First thing to do is know your battery type. You can look at the battery or look up phone specifications on the user manual for the battery type. Most common battery types are
Lithium Ion (Li-ion) battery
Lithium ion battery

Li-ion     Lithium Ion
Li-Poly   Lithium Polymer (More precisely Lithium Ion Polymer)
NiMH    Nickel Metal Hydride
NiCd      Nickel Cadmium
Almost all new phones are powered by Lithium polymer batteries. Some new non-smart phones have Lithium ion batteries. Nickel metal hydride and Nickel Cadmium battery powered phones are a thing of the past.


The following tips are for all types of batteries
1.       Use only batteries and chargers built for your phone
Each type of battery charges in different ways. For example, the basic process to charge a Lithium polymer battery is a constant current until each cell reaches 4.2 V. The charger must then switch to a constant voltage mode, and the charging current will gradually reduce while the charger holds the cell voltage at 4.2 V. In contrast a Nickel cadmium battery is charged by a steady current.
But there is no harm in replacing the battery with another battery of the same type and same voltage but higher mili-ampere hour rating (mAh). This will definitely increase battery life.
2.       Use only genuine batteries and chargers from your phone manufacturer
You may damage your phone or battery or both and even make warranty void if you do otherwise! If you have a spare battery and want to charge it without the phone, always use a charger built to charge that type of batteries.
3.       Fully charge the battery for the first time.
Usually phone batteries come half charged. So insert the new battery, switch on the phone and immediately charge fully.
4.       Store the battery right
When you want to store the battery for a long time, charge it 60% - 80% and store in a cool dry place away from sun, dirt and dust. Don’t keep them un-used for a long time. Take them for a ‘spin around the block’ once in a while.
5.       Never abuse your battery.
Clean the copper contacts of the battery with rubbing alcohol and a cotton swab. Never put the battery in water or fire. Don’t short circuit, use with incompatible devices, puncture or bend batteries.
6.       Never try to squeeze out all the juice from the battery
Usually the phone will beep and switch off when battery is too low. It might even say ‘Battery empty’. But there is little juice left in it to keep the clock ticking so that you will not have to reset time once you charge it.
If your phone switched off due to low battery, never ever try to switch it on without charging. Repeatedly trying to squeeze out all the juice is the quickest way to destroy a battery!
This applies to all rechargeable batteries, even for laptop, ipod and camera.   
Now I’m going to bust the biggest urban myths on battery life span. Many believe that draining the battery completely and charging fully helps to improve battery lifespan.
  •   For phones using a Lithium ion or Lithium polymer battery

You can use your phone while it is charging. You can charge the battery at any time and for any duration. You can interrupt the charging without damaging the battery. In fact, it’s better for Lithium polymer batteries to have a ‘shallow’ charge and discharge!
But, it’s important to drain the battery fully and charge it fully once in a few months to recalibrate the battery. Recalibration occurs automatically once battery is low and the phone automatically switches off. Recalibration will not increase the battery life or battery lifespan, but it makes the onscreen battery percentage accurate.
Nickel Metal Hydride (NiMH) battery
Nickel metal hydride battery
  •  For phones using a Nickel Cadmium or Nickel metal hydride battery

The urban myth is somewhat true for the early mobile phones. The Nickel Cadmium and Nickel metal hydroxide batteries that were used to power these old phones has a ’memory effect’. This is responsible for significant decline in battery capacity when repeatedly charged and discharged to the same state of charge. Although this has been observed in satellites, this has not been observed in mobile phones. You can find more information in Wikipedia.


These tips have been experimented by me and have some valid scientific basis. I have managed to keep some phones that are about a decade old in good working condition by following these tips. If you want to share your tips, comment below!

100 USEFUL CMD COMMANDS

                                                COMMAND PROMPTS
here, I'm sharing a list of some useful commands for windows command prompt. Few commands may work only on windows XP not on Windows 7/Vista.

  •  Add Hardware Wizard - hdwwiz.cpl
  •  Add/Remove Programs - appwiz.cpl
  •  Administrative Tools - control admintools
  •  Bluetooth Transfer Wizard - fsquirt
  •  Calculator - calc
  •  Certificate Manager - certmgr.msc
  •  Character Map - charmap
  •  Check Disk Utility - chkdsk
  •  Clipboard Viewer - clipbrd
  •  Command Prompt - cmd
  •  Component Services - dcomcnfg
  •  Computer Management - compmgmt.msc
  •  Control Panel - control
  •  Date and Time Properties - timedate.cpl
  •  DDE Shares - ddeshare
  •  Device Manager - devmgmt.msc
  • Direct X Troubleshooter - dxdiag
  •  Disk Cleanup Utility - cleanmgr
  •  Disk Defragment - dfrg.msc
  •  Disk Management - diskmgmt.msc
  •  Disk Partition Manager - diskpart
  •  Display Properties - control desktop
  •  Display Properties - desk.cpl
  •  Dr. Watson System Troubleshooting Utility - drwtsn32
  •  Driver Verifier Utility - verifier
  •  Event Viewer - eventvwr.msc
  •  Files and Settings Transfer Tool - migwiz
  •  File Signature Verification Tool - sigverif
  •  Findfast - findfast.cpl
  •  Firefox - firefox
  •  Folders Properties - control folders
  •  Fonts - control fonts
  •  Fonts Folder - fonts
  •  Free Cell Card Game - freecell
  •  Game Controllers - joy.cpl
  •  Group Policy Editor (for xp professional) - gpedit.msc
  •  Hearts Card Game - mshearts
  •  Help and Support - helpctr
  •  HyperTerminal - hypertrm
  •  Iexpress Wizard - iexpress
  •  Indexing Service - ciadv.msc
  •  Internet Connection Wizard - icwconn1
  •  Internet Explorer - iexplore
  •  Internet Properties - inetcpl.cpl
  •  Keyboard Properties - control keyboard
  •  Local Security Settings - secpol.msc
  •  Local Users and Groups - lusrmgr.msc
  •  Logs You Out Of Windows - logoff
  •  Malicious Software Removal Tool - mrt
  •  Microsoft Chat - winchat
  •  Microsoft Movie Maker - moviemk
  •  Microsoft Paint - mspaint
  •  Microsoft Syncronization Tool - mobsync
  •  Minesweeper Game - winmine
  •  Mouse Properties - control mouse
  •  Mouse Properties - main.cpl
  •  Netmeeting - conf
  •  Network Connections - control netconnections
  •  Network Connections - ncpa.cpl
  •  Network Setup Wizard - netsetup.cpl
  •  Notepad - notepad
  •  Object Packager - packager
  •  ODBC Data Source Administrator - odbccp32.cpl
  •  On Screen Keyboard - osk
  •  Outlook Express - msimn
  •  Paint - pbrush
  •  Password Properties - password.cpl
  •  Performance Monitor - perfmon.msc
  •  Performance Monitor - perfmon
  •  Phone and Modem Options - telephon.cpl
  •  Phone Dialer - dialer
  •  Pinball Game - pinball
  •  Power Configuration - powercfg.cpl
  •  Printers and Faxes - control printers
  •  Printers Folder - printers
  •  Regional Settings - intl.cpl
  •  Registry Editor - regedit
  •  Registry Editor - regedit32
  •  Remote Access Phonebook - rasphone
  •  Remote Desktop - mstsc
  •  Removable Storage - ntmsmgr.msc
  •  Removable Storage Operator Requests - ntmsoprq.msc
  •  Resultant Set of Policy (for xp professional) - rsop.msc
  •  Scanners and Cameras - sticpl.cpl
  •  Scheduled Tasks - control schedtasks
  •  Security Center - wscui.cpl
  •  Services - services.msc
  •  Shared Folders - fsmgmt.msc
  •  Shuts Down Windows - shutdown
  •  Sounds and Audio - mmsys.cpl
  •  Spider Solitare Card Game - spider
  •  SQL Client Configuration - cliconfg
  •  System Configuration Editor - sysedit
  •  System Configuration Utility - msconfig
  •  System Information - msinfo32
  •  System Properties - sysdm.cpl
  •  Task Manager - taskmgr
  •  TCP Tester - tcptest
  •  Telnet Client - telnet
  •  User Account Management - nusrmgr.cpl
  •  Utility Manager - utilman
  •  Windows Address Book - wab
  •  Windows Address Book Import Utility - wabmig
  •  Windows Explorer - explorer
Keep Learning. Keep Rocking. :)