Thursday, 11 January 2018

HOW TO ACCESS DARKNET WEBSITES THROUGH ANY WEB BROWSER

Generally, normal browsers cannot open the Darknet websites whose top level domains are .onion because they are not normal domain names, but a string of random characters followed with .onion. These domain names are created by Onion when you host your anonymous websites using the Onion or Tor network. Thus, the DNS servers do not have a clue of what they are and you will get a site not found error if you try to access one of the websites in the Darknet. Only the Onion servers know how to resolve these domain names.
The best and recommended way to access darknet is by Tor Bundle.
But there is an another way to access darknet by diverting your traffic through Tor anonymity network. We will use a tool named Tallow .
Download Tallow , Hit the Tor Onion and you’re good to go.  Open any web brower and enter any .onion URL and you will be redirected to the website
You can see a .onion website accessed through Internet Explorer.

But beware! Unlike the TorBrowserBundle, Tallow does not make any attempt to anonymize content sent though the Tor network. This may include cookies or other information that can identify you.

HOW TO SETUP/RUN A DARKNET (.ONION) WEBSITE

Things You Will Need

Download
  1. XAMPP Server 
  2. Tor Bundle

Getting Things Ready.

Install Xampp and fire up Apache, My SQL & FileZilla
Note down the Port of ApacheServer (in most cases it’s 80)

Extract Tor Bundle , and browse inside Tor Browser Folder 
Path – Tor Browser\Browser\TorBrowser\Data\Tor\torrc
Open this file in Notepad or any other text editor, and paste in this code underneath, without editing any pre-written paths
#Hidden Services

HiddenServiceDir C:\darknet

HiddenServicePort 80 127.0.0.1:80
Save the document and go to C drive and make a folder named darknet. 
Obviously you can change the path of HiddenServiceDir as you like , and also check for hidden service port, in this case the port is 80, and 127.0.0.1 is the address of localhost (xampp server landing page)

Connecting to .onion

Start Tor Browser and let it connect to tor circuit, once done go back to C:\darknet  (the folder you’ve just made)- in the folder you’ll find 2 files “Hostname” & “Private_Key”
Open up “Hostname” in Notepad, you’ll find a .onion domain.
Open Up Tor Browser and paste in the .onion domain and you’ll be redirected to your localhost page.
If You want to use any other of your static website page..
You will have to replace the index file of xammp server with the index.html your website
Path – C:\xampp\htdocs  
Paste the index.html webpage of ur website in the mentioned folder.

Have You Ever run a .onion website ? Do you know any other ways to do it ? Let us know your thoughts in the comments section down below. 

4 MASSIVE HACKS OF ALL TIME (OUR PICK)

4. The First Cyber War

Yes, yes, we said we were clearing out the DDoS dross in the introduction, but what happened to Estonia in 2007 was no ordinary DDoS attack. Kicking off at 10pm on 26 April, the Baltic state suffered three weeks of DDoS attacks, which completely crippled its IT infrastructure.
During first week, went on to take down the sites of most other political parties, the official site of the Estonian Parliament and other government entities. In the second week, the attack spread to the websites of Estonian news outlets, universities, schools and businesses. But it was in the third week that the real hammer blow fell. At the stroke of midnight, a huge torrent of traffic – peaking at over 4 million data packets per second – slammed into Estonia’s banking infrastructure.
It’s suspected that all the perpetrators were either Russians or ethnic Russian Estonians. The attack followed two days of rioting in the Estonian capital Tallinn over the relocation of a bronze war memorial dating from the Soviet era. Perhaps even more damningly, the third wave of the attack commenced on the  Russian Victory Day of 2nd world war.

3. The Bedroom Hacker who made US armory disappear.

At the turn of 200, NASA and the US Department of Defense (DoD) were successfully compromised by two hackers, 15-year-old Jonathan James and 35-year-old Gary McKinnon.
James was the first to have a crack at the American space agency in 1999, which he crawled into by compromising computers at the US Defense Threat Reduction Agency.
Among other things, he managed to make off with the source code for the life support systems on the International Space Station (ISS).
Gary McKinnon has the dubious honour of being accused by US prosecutors of perpetrating “the biggest military computer hack of all time”.

2. Bitcoin’s Black Day

How can millions of dollars disappear without trace? This is the question Mt. Gox, the largest Bitcoin exchange in the world, was faced with in early 2014. On 7 February, the exchange suddenly ceased trading, saying it had discovered a “transaction malleability” bug and locked customers out of their accounts. The organisation would later blame hackers for stealing $460 million-worth of Bitcoins over the course of three-to-four years, causing a crash in the value of the cryptocurrency.
On 13 June 2011, 478 Mt. Gox accounts were robbed of a total of 25,000 bitcoins (worth between $375,000 and $500,000 at the time), which were all transferred into a single account.
What made the attack possible and successful, though, wasn’t just the SQL injection vulnerability in the Mt. Gox code that gave hacker access to the user database, or the fact that usernames and email addresses were stored in plain text, or that it used the MD5 hashing algorithm rather than a more secure SHA-2 alternative, or even that about 1,600 of the passwords were hashed but unsalted. It was Karpeles’ own unique brand of hubris and naïveté. Failure to take seriously the complaints of the original 478 customers whose accounts were compromised – or even to consider it a bit weird that nearly 500 people were hacked on the same day – was a serious misstep; following it up by seemingly not caring that someone had stolen an entire user database is mind-blowing.

1. The Virus that destroyed nuclear equipment (Stuxnet)

Stuxnet is one of the best known names when it comes to cyber attacks, and for good reason. The worm (a self replicating, self propagating computer virus). This worm program that was less than a megabyte in size was released into Iran’s nuclear refinement plants. Once there, it secretly took over the Siemens SCADA control systems. This sneaky worm commanded over 5000 of the 8800 uranium centrifuges to spin out of control, then suddenly stop and then resume, while simultaneously reporting that all is well. This chaotic manipulating went on for 17 months, ruining thousands of uranium samples in secret, and causing the staff and scientists to doubt their own work. All the while, no one knew that they were being deceived and simultaneously vandalized.
But what makes Stuxnet really stand out among all the destructive malware out there was just how well crafted it was. The Stuxnet payload consisted of three parts: the worm itself (WORM_STUXNET), an execution .LNK file (LNK_STUXNET) that allowed the worm to auto-execute, and a rootkit (RTKT_STUXNET) that hid the worm’s existence.
This hack is memorable because of both optics and deceit: it attacked a nuclear program of a country that has been in conflict with the USA and other world powers; it also deceived the entire nuclear staff for a year and a half as it performed its nasty deeds in secret.

GET FREE UNLIMITED UBER RIDES – UBER HACKED

The Uber app, like most applications uses an IMEI(International Mobile Equipment Identity), a unique 15-digit number assigned to all cellular devices. Unfortunately for Uber, this number can be changed/spoofed programmatically.

Hacker Downloaded Vine's Entire Source Code. Here’s How...

download-twitter-vine-source-code
Guess What? Someone just downloaded Twitter’s Vine complete source code.

Vine is a short-form video sharing service where people can share 6-second-long looping video clips. Twitter acquired the service in October 2012.

Indian Bug bounty hunter Avinash discovered a loophole in Vine that allowed him to download a Docker image containing complete source code of Vine without any hassle.

Launched in June 2014, Docker is a new open-source container technology that makes it possible to get more apps running on the same old servers and also very easy to package and ship programs. Nowadays, companies are adopting Docker at a remarkable rate.

However, the Docker images used by the Vine, which was supposed to be private, but actually was available publically online.

While searching for the vulnerabilities in Vine, Avinash used Censys.io – an all new Hacker’s Search Engine similar to Shodan – that daily scans the whole Internet for all the vulnerable devices.

Using Censys, Avinash found over 80 docker images, but he specifically downloaded 'vinewww', due to the fact that the naming convention of this image resembles www folder, which is generally used for the website on a web server.

After the download was complete, he ran the docker image vinewww, and Bingo!
Hacker Downloaded Vine's Entire Source Code. Here’s How...
The bug hunter was able to see the entire source code of Vine, its API keys as well as third-party keys and secrets. "Even running the image without any parameter, was letting me host a replica of VINE locally," He wrote.

The 23-year-old reported this blunder and demonstrated full exploitation to Twitter on 31 March and the company rewarded him with $10,080 Bounty award and fixed the issue within 5 minutes.

Avinash has been an active bug bounty hunter since 2015 and until now has reported 19 vulnerabilities to Twitter.