Virus On Facebook

If you receive an email from a friend titled “You’ve been catched on hidden cam, LOL:
With the link (DO NOT CLICK)



It’s a virus

Update your virus scanners to be protected. (AVG is Good)

Happy Surfing.

Another virus in the town (Latest Virsues)

Hey all,

If some of you get the message saying

“Guess who your admirer is… goto ‘’ (Don’t Click Just Read)

“omg! you have a secret crush!! see who it is now goto

Don’t go to it, Just delete !

(I got this message of alert from facebook, so i wanna thank that ethical hacker guy too)

Amol Wagh

Proxies Demystified

Understanding the concept of proxies first need little introduction about IP Address structure.

IP Address: It is assigned when you connect to internet and gives idea about where your locality can be. Means if you perform some attack on private network your geographical location can be traced quickly with the help of your IP.

Proxy: As the name indicates it hides you from other internet users so that they can not track you

Proxies assign fake IP for your system than you actually have. So that if someone is going to track you gets decepted. If you in stalled a Russian proxy on your system you are treated as user from Russia on net.

Its not like you can not be traced back by any means. There are proxy experts who

 can notice that you are behind a proxy but they will waste there time only if you have committed a serious crime. So BE AWARE.

You can also mislead the tracker by using multiple proxies so tracer will need more tie to get you.





Hiding Your Computer on the Internet

When you use internet, you are connected to millions of PC’s out there. And each PC have its own unique address known as Static IP Address. This gives your identification by locality.

Without a firewall, on a typical computer, even if well maintained, a remote person will still be able to know that the communication effort has reached some computer, and perhaps some information about the operating system on that computer. If that computer is handled well, the remote user will not be able to get much more information from your computer, but might still be able to identify also who your ISP is, and might decide to invest further time in cracking into your computer.
With a firewall, you can set the firewall so that any communication effort from remote users (in the better firewalls you may define an exception list) will not be responded at all. This way the remote user will not be able to even know that it reached a live computer. This might discourage the remote attacker from investing further time in effort to crack into your computer.

Again there is one more security confirmation you can do is running is  operating behind proxies. It is the safest method but sometimes all web pages can not be surfed So selecting a firewall can be a good idea.

Amol Wagh




How To Convert File System,FAT – FAT32 to NTFS

Open a dos prompt and type the command


convert d: /fs:NTFS


This command would convert your d: drive to NTFS


If the system cannot lock the drive, you will be prompted to convert it during next reboot.


Normally you should select yes.


Conversion from fat/fat32 to NTFS is non-destructive, your data on the drive will NOT be lost.


Be aware that converting to NTFS will make that partition of your

Drive unreadable under dos unless you have NTFS utilities to do so.

Chunk 1: The Concept of Ethical Hacking

Ethical Hacking Series : Chunk 1

Ethical hacking basically means preventing criminal hackers from stealing information of any personal computer r corporate network.

Ethical hackers use same technology – software and tool that criminal hackers uses. But they use them for preventing crimes.

Penetration testing and vulnerability assessing are the basic types of test ethical hackers perform so as to check the drawback in the systems. These drawbacks (or weak part) of the system are termed as Vulnerability or a security hole. Vulnerabilities can be in program or network or the hardware. Physical and technical are basic classification of vulnerabilities.

There are general vulnerabilities in system or programs. Like windows XP or OS X have some known vulnerabilities. By exploiting those vulnerabilities crackers generally try to intrude the system. They first comes the network(LAN or WAN) of the victim company . And from that they try to access the databases of company which have very sensitive data.

Eavesdroppers also sniff the data packets from communication lines to get the more information. They come to Network by Passive Information Gathering which is the first stage of attack.

Ethical hackers usually take tests to find the severe vulnerabilities in network and then they shield it by various methods.

We’ll concentrate on these tests and securing methods in next chunks of the series. ( Includes White Box, Black Box test , Penetration and vulnerability assessments.)

So Watch out for our next post.

Biggest Security Flaw In Every System

        Imagine , You have a computer system or a network. You have plenty of anti viruses and firewalls installed on your system for security. Still there is a security flaw, and it is biggest through which hackers or viruses attacks.

      All these security softwares are 90% perfect to ensure your security but where they lag is the the tendency of user. tendency to ignore things.

     Your firewall always asks you that something is getting changed in system or you are connecting to insecure server. And then it asks whether to ‘Allow’ or ‘Deny’ the change. And then as usual you alway Click on allow because you have hurry to get the things, because your site is stopped still you click on it. And this is where you make the biggest mistake. Because of your ignorance the antivirus or firewalls fails totally. Because you never read what was the warning, why this warning is there. It is there to notify a suspicious document or a website. You should read that carefully then accept or deny it.

Again one more mistake you frequently do is click on every link you see in your email , you can read the that link , and check what it is about, at least you can guess. Because you always get promotional offers on internet and sometimes lottery notifications saying : YOU ARE SELECTED AS OUR LUCKY WINNER. and you click the link to receive the money, you get virus installed on it. So don’t do it.

Only one thing to prevent all these is to ignore that ‘Ignorance’. Read things, read the names of webpages you are visiting, just try to look at things clearly. You can be better secured than these so called anti- dash dash softwares. 

Have nice time. And keep eye on what you are clicking.

Amol Wagh





Introducing an Ethical Hacking Series

  Download This in PDF Format . . . 



All right guys, Get ready for the real ethical hacking stuff by Hackers  


Millions of people are curious about hacking all over the world, and you are one of them. You searched lot of things on hacking (Ethical or Unethical), but didn’t get anything solid, from where you can learn. There is no proper start point for this career. All searches on Google, for hacking, softwares download by hacking and many more goes totally fail because there is no such thing available.


Well, some day I was at your place and through out my career I never find anything that gives me sound knowledge. Now, I have enough knowledge to perform hacking (In Ethical ways off course). So I thought to start a new series on Ethical hacking here on my blog And the day is here when I am ready with subject and my strategy.


This series consists every single details of ethical hacking as the concept, syllabus, programming and OS stuff, penetration tests, vulnerability assessments, tools required, knowledge you need, How and from where to get all the things, hacking and its types, various attacks and defense techniques, network security, cyber laws ,  responsibilities and many more things than you can think.


Still, I wanted to tell you one thing that everything I am explaining is Ethical Hacking stuff, not the Criminal Hacking. Neither am I promoting that you commit some crime with these things. I’ll surely take care that you can’t use in ‘That Way’ 


            Anything that will be in the series is for educational purposes only, I don’t take any responsibility for any criminal use of it.


            I guess this much disclaimer is enough to start my series. I will try to make it in PDF format so you can download (free) and view it offline too. Have a nice time and visit again for the first article of the series.

Download This in PDF Format . . . 














Backdoors : An Introduction

Since the early days of intruders breaking into computers, they have tried

to develop techniques or backdoors that allow them to get back into the

system. In this paper, it will be focused on many of the common backdoors

and possible ways to check for them. Most of focus will be on Unix

backdoors with some discussion on future Windows NT backdoors. This will

describe the complexity of the issues in trying to determine the methods

that intruders use and the basis for administrators understanding on how

they might be able to stop the intruders from getting back in. When an

administrator understands how difficult it would be to stop intruder once

they are in, the appreciation of being proactive to block the intruder from

ever getting in becomes better understood. This is intended to cover many

of the popular commonly used backdoors by beginner and advanced intruders.

This is not intended to cover every possible way to create a backdoor as

the possibilities are limitless.

The backdoor for most intruders provide two or three main functions:

Be able to get back into a machine even if the administrator tries to

secure it, e.g., changing all the passwords.

Be able to get back into the machine with the least amount of visibility.

Most backdoors provide a way to avoid being logged and many times the

machine can appear to have no one online even while an intruder is using


Be able to get back into the machine with the least amount of time. Most

intruders want to easily get back into the machine without having to do all

the work of exploiting a hole to gain access.

In some cases, if the intruder may think the administrator may detect any

installed backdoor, they will resort to using the vulnerability repeatedly

to get on a machine as the only backdoor. Thus not touching anything that

may tip off the administrator. Therefore in some cases, the

vulnerabilities on a machine remain the only unnoticed backdoor.

Translating Binary Into Text

With this tutorial u can translate almost any binary file to text. This is a type of cryptographic translation which is commonly used in password creating. Cryptography is a language where we encrypt secret data. And Binary is also one of its way.

This tutorial I used in initial stage of hacking and not completely written by me definitely. ( I am Not good in writing tutorials ! )

Hope this can be useful for aspiring coders and ethical hackers.


We’ve all seen binary code. We’ve come to think of them as a bunch of ones and zeroes in long strings…

But these ones and zeros can also represent decimal numbers. First off, I will show you how to read these numbers as the decimal   numbers we’re used to in our daily life. Then, I will show you how to use those numbers and your keypad to translate them into text. Note that your computer doesn’t use the decimal system, so technically, when it converts binary to text, it doesn’t go through the process I will show you. This is just a diverting way of explaining you how the binary system works.

2.The Binary System:

Here’s a simple example of binary:

Let’s think of the example above as empty slots:
_ _ _ _ _

First off, you read binary from right-to-left. It’s just the way it’s designed. The first slot from the right represents a value of one, the second from the right a value of two, the third from the right a value of four, the fourth from the right a value of eight, the fifth from the right a value of sixteen, and the cycle continues by multiples of 2. This will never change.

By putting a 1 or a 0 in those slots you are either saying you want to corresponding value that’s attached to that slot or you don’t. A 1 means yes, and a 0 means no. For example, putting a zero in the first slot from the right, but a 1 in the second slot from the right means you want a two, but not a one:
_ _ _ 1 0

As such, the number above equals to a decimal value of two.

As an example, let’s say you want to represent eight in binary form. Well, thinking about the slots, you want the first slot to be 0 because you don’t want a one, you want the second slot to also be 0 because you don’t want a two, you want the third slot to also to be 0 because you don’t want a four, but you want the fifth slot to be 1 because you want a value of eight. As such, eight in binary form is:
1 0 0 0 (or simply 1000 without those underlines)

Now it is important to note that the amount of zeroes that precede the first value of one from the left is unimportant. So for example:
1 0 0 0 is the same as 0 0 0 1 0 0 0 (1000 = 000100)

To get it cleared up, here’s another example:
0 1 is the same as 1

Exercises: What do the following equal in decimal terms?
a) 100
b] 000100
c) 100000
d) 0010

a) 4
b] 4
c) 32
d) 2

If you got the answers above right, then you pretty much understand the basics of binary.
Let’s now understand how to get the corresponding decimal values to the numbers which are not multiples of 2.

To get the total value of a binary number, add the values corresponding to each slot. So, for example, three in binary would be:

The above corresponds to three because if you add the total values of all the slots, that is to say a one from the slot to the right, and a two from the second slot to the right, then it equals three.

As another example, let’s say you want to represent 5 in binary terms. Then you would need a value of one to be added to a value of four, and you would not want a value of two:
101 [Reading from the right: 1(one) + 0(two) + 1(four) = five]

Here’s an additional example:
001011 [Reading from the right: 1(one) + 1(two) + 0(four) + 1(eight) + 0(sixteen) + 0(thirty-two) = eleven)

: What do the following equal in decimal terms?
a) 11011
b] 110
c) 010101
d) 10110

a) 27
b] 6
c) 21
d) 22

If you got the above questions correct [without cheating], then you essentially understand the binary system. Understanding the binary system was the hard part. What follows is pretty easy.

3. Converting Binary to ASCII (Text)

ASCII is essentially the letters, numbers and symbols that are stored in our computers through the use of fonts. When the keyboard relays the buttons you pressed, it sends in a code which is then converted to the ASCII equivalent of “k” or “5” or whatever key you pressed.

Here’s an example of a message “hidden” in binary text:

Now there are only so many letters, numbers and symbols stored for ASCII. Having sets of 8 digits for their binary equivalent is more than enough to represent all of these letters and the like. As such, all strings that represent text like in the above are separated into bits of 8 for simplicity:
01001000 01100101 01101100 01101100 01101111

Okay, so our example message was separated into 8 digit strings. The decimal value for each of these strings in the example was calculated for you.
01001000 = 72
01100101 = 101
01101100 = 108
01101100 = 108
01101111 = 111

The result was 72,101,108,108,111. Now, there is something called the ASCII table. It essentially corresponds to the binary numbers from yore to the equivalent letters/symbols/numbers. But since we found the decimal values of these binary strings, we can use a major shortcut.

By pressing ALT + [The Number], you will get the ASCII equivalent of that number. For example, by pressing the ALT key and at then (while keeping it down) the numbers 72 in any text editor, you will get the corresponding “H” to show up.

Let’s do so for the entire example message:
72 = H
101 = e
108 = l
108 = l
111 = o

So the entire “hidden” message translates to “Hello”.

Exercise: Decode the following message
101001011011110110111001110011 00100001

Hint: The first step on your way to decoding the message (separated into bytes for you)
01000011 01101111 01101110 01100111 01110010 01100001 01110100 01110101 01101100 01100001 01110100 01101001 01101111 01101110 01110011 00100001