Sunday, July 17, 2016
Monday, March 30, 2015
Learn-How to Enable Whatsapp Voice Calling
So, here are the steps which are supposed to followed in order to enable Whatsapp voice calling on your Smartphones. The steps are quiet simple yet hidden and today these are going to be revealed for you guys here. Now, without taking your time more, I would request you to get towards the below piece of content in order to get this feature for your accounts too.
Conclusion
This was our simple guide which could be used to enable Whatsapp voice calling on your Smartphones. We are sure that this would have been proven helpful for many of you out there. If you have any queries or questions to ask then do let me know. We shall get back to your queries and questions as soon as possible.
Furthermore, if you have found this guide helpful and worth reading then do share it with your other friends and circle too. You may never know that your shares may be proven helpful for many of the users out there. So, keep sharing and liking our content over social media in order to keep helping people in your circle.
Friday, March 27, 2015
- AirTel 3G/2G Enabled Sim card.
- Nmdvpn Client (download from here).
- PC or MOBILE.
- Download and extract config in SD card.
- Go to Google Play Store Search for open vpn for android. Or Click Here
- Install Open Vpn in you android device.
- Add airtel tcp 3G Vpn Config to open Vpn folder.
- when it ask user name password (see earticleblog txt file in attachment) enter it.
- Run and Enjoy :)
Friday, March 6, 2015
A few ago, in order make its product more helpful, Facebook updated its tool to report suicidal post. Facebook claims that this tool will make it easy to report a person if he is having any kind of suicidal tendency. You can report a friend’s suicidal post and that friend will be provided help using different measures.
Today, I am going to tell you how to report suicidal posts on Facebook.
Step 1: Click on the arrow in top right corner of the post and then click on “I don’t like this post.”
Step 2: Now click on “I think it shouldn’t be on Facebook” and continue.
Step 3: Select “It’s hurtful, threatening or suicidal” and continue.
Step 4: Now select “I think they might hurt themselves.”
Step 5: Now Facebook will give you different options to reach to your friend who is having some suicidal tendency. This option may vary in number depending upon the services provided in your region. I am getting only 3 here, but for some of you options like “Chat with the trained helper” or “Call lifeline”
Friday, February 13, 2015
At the start of this month, Whatsapp added a new feature of Reading Receipts. One grey tick meant that the message has been sent, two grey ticks meant that the message has been delivered and two blue ticks meant that the message has been read by the recipient. The new Whatsapp feature of reading receipts was a welcome feature for many people, but it was a nightmare for some. I personally found the feature helpful and I was already loving similar feature on Hike and BBM.
Whastapp was on the receiving end on many online forums where people blamed this feature for jeopardising their relationships and some even claimed the instances of divorce due to divorce. Some people may fail to understand the concern, but this surely is an important factor if you are ignoring someone.
Now Whatsapp has addressed this issue and is working on a new update. This update features the option to disable the blue tick (reading receipts) on your phone. Right now this update is unavailable on mobile app store platforms but Whatsapp has released the updated version of app on their website. You need to manually download the application and install the Whatsapp apk file. The available version of Whatsapp on Google Play store is 2.11.432 but the update version available on the website is 2.11.452.
How to get the update right now?
- Go to the Whatsapp website and download the apk file.
- Once downloaded, transfer the file to your phone.
- Open the apk file from your file browser app and click on the file.
- After completing the installation, go to settings menu un Whatsapp and then proceed to privacy option.
- Here you will see the Read Receipts option already checked.
- Now uncheck this option to disable the blue tick.
Read Receipts option in privacy settings
Right now this update is only available for Android users via apk download. It is not known when the full update will be pushed out to all users, or when other platforms including iOS and BlackBerry will see the changes.
Saturday, July 19, 2014
How Can We Protect Our Website By Common Web Attacks ?
On this post i am telling about five types of common web attacks, which are used in most types of defacements or dumps of databases.
Following five exploits are listed SQL injection, XSS, RCE, RFI, and LFI. Most of the time, we missed out some website code tags. So that our website gets attack and allows the hacker for hijack the vulnerable website.
1. SQL Injection
Types ->
Login Form Bypassing
UNION SQL Injection
2. Cross Site Scripting ( XSS )
Types -> Cross Site Request Forgery
3: File Inclusion
Types -> Remote File Inclusion and Remote Code Execution
1. SQL Injection
>> Login Form Bypassing
Here is an example of the vulnerable code that we can bypass very easily:
index.html file:
<form action="login.php" method="POST" />
<p>Password: <input type="text" name="pass" /><br />
<input type="submit" value="Authenticate" /></p>
</form>
login.php file:
<?php
// EXAMPLE CODE
$execute = "SELECT * from database WHERE password = '{$_POST['pass'])";
$result = mysql_query($execute);
?>
We can simply bypass this by using ' or '1=1', which will execute "password = ''or '1=1'';".
Alternatively, the user can also delete the database by executing "' drop table database; --".
>> PREVENTION:
Use mysql_real_escape_string in your php code.
Example:
<?php
$badword = "' OR 1 '";
$badword = mysql_real_escape_string($badword);
$message = "SELECT * from database WHERE password = "'$badword'";
echo "Blocked " . $message . ";
?>
>> UNION SQL Injection
UNION SQL injection is when the user uses the UNION command. The user checks for the vulnerability by adding a tick to the end of a ".php?id=" file.
If it comes back with a MySQL error, the site is most likely vulnerable to UNION SQL injection. They proceed to use ORDER BY to find the columns, and at the end, they use the UNION ALL SELECT command. An example is shown below.
http://www.site.com/website.php?id=1'
You have an error in your SQL syntax near '' at line 1 SELECT SUM(quantity)
as type FROM orders where (status='completed' OR status='confirmed' OR status='pending') AND user_id=1'
No error--> http://www.site.com/website.php?id=1 ORDER BY 1--
Two columns, and it comes back with an error! This means that there is one column.
http://www.site.com/website.php?id=1 ORDER BY 2--
Selects the all the columns and executes the version() command on the only column.
http://www.site.com/website.php?id=-1 UNION SELECT ALL version()--
SOLUTION:
Add something like below to prevent UNION SQL injection.
$evil = "(delete)|(update)|(union)|(insert)|(drop)|(http)|(--)|(/*)|(select)";
$patch = eregi_replace($evil, "", $patch);
2. Cross Site Scripting
Cross site scripting is a type of vulnerability used by hackers to inject code into vulnerable web pages. If the site is vulnerable to cross site scripting, most likely users will try to inject the site with malicious javascript or try to scam users by creating a form where users have to type their information in.
There are two types of XSS (cross site scripting) are persistent XSS and non-persistent XSS.
Example:
http://www.site.com/search.php?q=">
SOLUTION
function RemoveBad(strTemp) {
strTemp = strTemp.replace(/\<|\>|\"|\'|\%|\;|\(|\)|\&|\+|\-/g,"");
return strTemp;
}
3. File Inclusion
Types: Remote File Inclusion/Local File Inclusion, and Remote Code Execution
Remote File Inclusion allows a hacker to include a remote file through a script (usually PHP). This code is mostly patched on websites, but some websites are still vulnerable to the vulnerability. RFI usually leads to remote code execution or javascript execution.
Example of the vulnerable code:
<?php
include($_GET['page']);
?>
Exploiting would be something like as follows:
http://www.site.com/page.php?page=../../../../../etc/passwd or
http://www.site.com/page.php?page=http://www.site.com/xyz.txt?
SOLUTION:
Validate the input.
$page = $_GET['page'];
$allowed = array('index.php', 'games.php' 'ip.php');
$iplogger = ('ip.php');
if (in_array $page, $pages)) {
include $page {
else
{
include $iplogger
die("IP logged.");
}
For remote code execution, the site would have to have a php executing command. You would patch this by about doing the same thing.
Note: I hope this post will helpful for your website to get secure from above types of attacks.
Thursday, July 17, 2014
Type of attack on Web Based Application
[~]Hibernate Query Language Injection
[~]Direct OS Code Injection
[~]XML Entity Injection
[~]Broken Authentication and Session Management
[~]Cross-Site Scripting (XSS)
[~]Insecure Direct Object References
[~]Security Misconfiguration
[~]Sensitive Data Exposure
[~]Missing Function Level Access Control
[~]Cross-Site Request Forgery (CSRF)
[~]Using Components with Known Vulnerabilities
[~]Unvalidated Redirects and Forwards
[~]Cross Site Scripting Attacks
[~]Clickjacking Attacks
[~]DNS Cache Poisoning
[~]Symlinking – An Insider Attack
[~]Cross Site Request Forgery Attacks
[~]Remote Code Execution Attacks
[~]Remote File inclusion
[~]Local file inclusion
[~]Evercookie
[~]Denial of Service Attack
[~]Cookie Eviction
[~]phpwn
[~]NAT Pinning
[~]XSHM
[~]MitM DNS Rebinding SSL/TLS Wildcards and XSS
[~]Quick Proxy Detection
[~]Improving HTTPS Side Channel Attacks
[~]Side Channel Attacks in SSL
[~]Turning XSS into Clickjacking
[~]Bypassing CSRF protections with ClickJacking and
[~]HTTP Parameter Pollution
[~]URL Hijacking
[~]Strokejacking
[~]Fooling B64_Encode(Payload) on WAFs and filters
[~]MySQL Stacked Queries with SQL Injection.
[~]Posting raw XML cross-domain
[~]Generic cross-browser cross-domain theft
[~]Attacking HTTPS with Cache Injection
[~]Tapjacking
[~]XSS-Track
[~]Next Generation Clickjacking
[~]XSSing client-side dynamic HTML.
[~]Stroke triggered XSS and StrokeJacking
[~]Lost in Translation
[~]Persistent Cross Interface Attacks
[~]Chronofeit Phishing
[~]SQLi filter evasion cheat sheet (MySQL)
[~]Tabnabbing
[~]UI Redressing
[~]Cookie Poisoning
[~]SSRF
[~]Bruteforce of PHPSESSID
[~]Blended Threats and JavaScript
[~]Cross-Site Port Attacks
[~]CAPTCHA Re-Riding Attack