Friday 29 January 2016

hi all.. after 2 busy years.. i've planned to make this blog more active hereafter with new  techno info and hacking tutorial.

Sunday 1 December 2013

hello everybody.,

                                                      

                          My new session for ethical hacking training starts from january second week.,


Duration : 60 hours (30 days).

***Fee details :  rs.37,000 only/- (included-CEH certificate[  V8  ], internet facility, tools,...)


Training 


  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • System Hacking
  • Trojans and Backdoors
  • Viruses and Worms
  • Sniffers
  • Social Engineering
  • Denial of Services
  • Session Hijacking
  • Hacking Webservers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Evading IDS
  • Firewalls and Honeypots
  • Buffer Overflows
  • Cryptography
  • penetration testing

INTRESTED CANDITATES CAN MAIL TO >>>> praveen7595@gmail.com .

Thursday 8 August 2013

lesson day :02

As I've explained you about the basics of hacking in the previous class in our blog.,
let me begin the course in brief from now!!!
come on guys........
the first step of our class is that you know networking!!!
but let us skip now!!!
let me start an intresting hacking concept with you......
it's PHISHING!!!
okay!!! hope you have heared about it!!!
well., same as fishing the phishing method works........
i could even say you that this is the only easist method in learning hacking.....
perhaps let me teach the concept today!!!!

This method is used to steal the password of a user.,
first the user's login details are to be known......
well.,there you go... to take the login details the hacker creates a fake login page
like taking the page code from page source and then., the code is edited....,
ie. the main codings are edited  using notepad as it to be made in HTML format. Hence.,the hacker creates a fake login page...
perhaps/., you may ask how could they upload it.
well., there are several websites in which you may register for uploding these phishing files., as i'm quite different., i use a new technique here., this technique was only known for high class coders. any way i'll tell you the concept today and end the session.
I used to create a virtual server and then upload the made phishing page file and a blank notepad and a page(HTML) to your server. and juz make the victim to login via that page.. 
these are the concepts of PHISHING and the detailed class about PHISHING would be taken for the for coming 2 days.


any doubts??
mail to : praveen7595@gmail.com
or
tweet @praveen7595

Monday 5 August 2013

THE TRICKS INVOLVED IN ETHICAL HACKING!!!

ETHICAL HACKING tricks by I.PRAVEEN!!!

As a BEGINNER., you all need to know basic networking knowledge....;
well.... it would be better if you use the basic debugging tools for hacking.
i strongly recommend you all to use ollydebug(OLLYDGB) tool from the beginning.
the tool really does a great job for both HACKING as well as ETHICAL HACKING.!!!
DO YOU THINK PASSWORDS CAN REDUCE HACKERS????
ofcourse NO!!! you may use strong locks and specially designed keys for your house door...
but if a thief knows how was your door's architechtiure., then you will fail for sure.
hence., though you proceed locking your personal with safety measures you will be failed.!!! :(
hmmm...... then HOW CAN YOU BE SECURE? ..... yeah... it is the only way to learn their tricks and go better than them................. well let's move on to our course...............................>>>>>>>>>>>>>>>>>

DAY 01: PHISHING METHOD
In PHISHING method., 
Phishers have a variety of tricks up their sleeves to complete the illusion of representing your local bank or other web business.
By making you trust in them, phisher can gain unauthorized access to your emails, banking account, your mastercard or any other account demanding identification. Phishing scam is nothing new. Scammers have used telephone for years stealing identities and passwords by claiming to be a representatives from a trusted company.
With the email, however, came the fantastic possibilities of mass spam to the annoyance of everyone. Phishing scammers could now reach millions with a mouse click, making easy money based on statistics and quantity of spammed emails.
The internet industry is starting to take the threat very seriously seeing the exploding trend of attacks and the tendency for the phish hits to afflict the big industries. Some have even gone so far as to say phishing will be the end of spam! For now, both the spam and phishing enterprises are blooming.

hacker intel_praveen

Sunday 4 August 2013

EEE student's are invited !!!!!!



any body who is highly intrested in circuits please contact me!!!

a teammate needed!!!!!!

hello boy's and girl's .........
this is a new blog created by I.PRAVEEN!!!!!
i've created this blog to spread my own hacking tricks to all the people who are eager to learn about hacking and ethical hacking.....

first of all.,you all should be knowing the reason why you should learn HACKING before you learn ETHICAL HACKING!!!

hmm...... good., i'll explain you about it.....

first of all..,consider you as a police officer who are responded for arresting a criminal ( say theif ) ., now the officer must be knowing all about the thief ., perhaps., if you know about his tricks that was an easy task.., the same concept is here., if you wanna know about the person who is HACKING., then you should know  the path he came., that's why you are ought to learn ETHICAL HACKING!!!!!

usually people learn these by using some specialised hacker's like me with their own laptop's and internet connections...... but., i'm quite different!!!
i want to make other's know what i know!!! hence i teach hacking and ethical hacking for FREE!!!!! espically via this blog and my facebook page>> https://www.facebook.com/hackerssession !!!