-->

ABOUT US

Our development agency is committed to providing you the best service.

OUR TEAM

The awesome people behind our brand ... and their life motto.

  • Kumar Atul Jaiswal

    Ethical Hacker

    Hacking is a Speed of Innovation And Technology with Romance.

  • Kumar Atul Jaiswal

    CEO Of Hacking Truth

    Loopholes are every major Security,Just need to Understand it well.

  • Kumar Atul Jaiswal

    Web Developer

    Techonology is the best way to Change Everything, like Mindset Goal.

OUR SKILLS

We pride ourselves with strong, flexible and top notch skills.

Marketing

Development 90%
Design 80%
Marketing 70%

Websites

Development 90%
Design 80%
Marketing 70%

PR

Development 90%
Design 80%
Marketing 70%

ACHIEVEMENTS

We help our clients integrate, analyze, and use their data to improve their business.

150

GREAT PROJECTS

300

HAPPY CLIENTS

650

COFFEES DRUNK

1568

FACEBOOK LIKES

STRATEGY & CREATIVITY

Phasellus iaculis dolor nec urna nullam. Vivamus mattis blandit porttitor nullam.

PORTFOLIO

We pride ourselves on bringing a fresh perspective and effective marketing to each project.

Showing posts with label micrrosoft. Show all posts
Showing posts with label micrrosoft. Show all posts
  • What is a thing which cannot be hacked?

      

    What is a thing which cannot be hacked? by hackingtruth.in or kumaratuljaiswal.in


    which cannot be hacked


     

    "In simple words, All things that are not connected to the internet cannot be hacked. "


    otherwise, Yes, there are many very small systems that cannot be hacked.

    Hacking a system is like robbing a bank. If the bank is a 1 inch by 1 inch solid steel box, and is kept inside my pocket, it really can’t be hacked.

    The larger the system, the more possibilities for it to have a flaw/vulnerability that can be exploited, resulting in a hack.

    However, today computer and digital systems are very complex. Even if you have a perfect cryptographic system (e.g. AES) or even if you have a theoretically proven flawless algorithm (Google NaCl), then you still have to run these pieces of code on an operating system and a sizable hardware, both of which are susceptible to attacks. What is a thing which cannot be hacked?



    For example, did you know that all cryptography can become futile, if you can measure the power usage of the hardware? Because then you can tell how exactly is the algorithm running, and extract the secrets from it. These attacks are called side-channel attacks.




     

    EVM Voting In India

     

    EVM(Electronic Voting Machines) which are used many country to contest their elections. Even in India EVMs are used to contest the election. The EVMs can't be hacked as they aren't connected to any other devices or network. No internet, no Bluetooth, nothing. Many a times many political parties have questioned the authenticity of the EVM but none of them were present when the election commission of India called them to hack the EVM. Any device can only be hacked if it's connected to any network or to some other device. instashell



    Electronic Voting is the standard means of conducting elections using Electronic Voting Machines, sometimes called "EVMs" in India.[1][2] The use of EVMs and electronic voting was developed and tested by the state-owned Electronics Corporation of India and Bharat Electronics in the 1990s. They were introduced in Indian elections between 1998 and 2001, in a phased manner. The electronic voting machines have been used in all general and state assembly elections of India since 2004.



    Disclaimer



    This was written for educational purpose and pentest only.
    The author will not be responsible for any damage ..!
    The author of this tool is not responsible for any misuse of the information.
    You will not misuse the information to gain unauthorized access.
    This information shall only be used to expand knowledge and not for causing  malicious or damaging attacks. Performing any hacks without written permission is illegal ..!


    All video’s and tutorials are for informational and educational purposes only. We believe that ethical hacking, information security and cyber security should be familiar subjects to anyone using digital information and computers. We believe that it is impossible to defend yourself from hackers without knowing how hacking is done. The tutorials and videos provided on www.hackingtruth.in is only for those who are interested to learn about Ethical Hacking, Security, Penetration Testing and malware analysis. Hacking tutorials is against misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used.


    All tutorials and videos have been made using our own routers, servers, websites and other resources, they do not contain any illegal activity. We do not promote, encourage, support or excite any illegal activity or hacking without written permission in general. We want to raise security awareness and inform our readers on how to prevent themselves from being a victim of hackers. If you plan to use the information for illegal purposes, please leave this website now. We cannot be held responsible for any misuse of the given information.



    - Hacking Truth by Kumar Atul Jaiswal



    I hope you liked this post, then you should not forget to share this post at all.
    Thank you so much :-)

     


  • Find Leaked Email and Password via onion service


    Find Leaked Email and Password via onion service


    Find Leaked Email and Password via onion service


    So today we will know about the special technique of penetration testing, which is named PWNDB so, we will covered in this article about Search for leaked email and password using the onion service so, you can find in kali linux and other linux distribution also. so, lets get started!


    Leaked Email and Password


    Billions of email addresses and plain text passwords have been leaked online by an unknown party, leaving countless Internet users at risk from credential stuffing and other attacks. Search for leaked email and password using the onion service

    Security researcher Bob Diachenko discovered the unsafe elastics search database on 4 December, although it was first indexed by the BinaryAidz search engine and therefore has been publicly available since the beginning of the month.

    Access to the database was disabled on 9 December when it reported to the US-based ISP hosting the IP address, giving potential hackers more than enough time to scrape the logged-in data.

    In total, the database contained 2.7 billion email addresses and plain text passwords for more than a billion of them - providing a true starting point for a credential stuffing campaign.



    How To Find Leaked Email and Passwords

    We will use pwndb tool to find the password email leaked here...pwndb.py is a python command-line tool for searching leaked credentials using the Onion service with the same name. Search for leaked email and password using the onion service

    Installation


    git clone https://github.com/davidtavarez/pwndb


    Find Leaked Email and Password via onion service


    cd

    ls


    Find Leaked Email and Password via onion service



    pip3 install -r requirements.txt  OR  pip install -r requirements.txt


    Find Leaked Email and Password via onion service



    Then, type "  virtualenv venv   " without quotes and hit enter...


    Find Leaked Email and Password via onion service



    source venv/bin/activate



    Find Leaked Email and Password via onion service





    Full Post :-  Click Here



    Disclaimer

    This was written for educational purpose and pentest only.
    The author will not be responsible for any damage ..!
    The author of this tool is not responsible for any misuse of the information.
    You will not misuse the information to gain unauthorized access.
    This information shall only be used to expand knowledge and not for causing  malicious or damaging attacks. Performing any hacks without written permission is illegal ..!


    All video’s and tutorials are for informational and educational purposes only. We believe that ethical hacking, information security and cyber security should be familiar subjects to anyone using digital information and computers. We believe that it is impossible to defend yourself from hackers without knowing how hacking is done. The tutorials and videos provided on www.hackingtruth.in is only for those who are interested to learn about Ethical Hacking, Security, Penetration Testing and malware analysis. Hacking tutorials is against misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used.


    All tutorials and videos have been made using our own routers, servers, websites and other resources, they do not contain any illegal activity. We do not promote, encourage, support or excite any illegal activity or hacking without written permission in general. We want to raise security awareness and inform our readers on how to prevent themselves from being a victim of hackers. If you plan to use the information for illegal purposes, please leave this website now. We cannot be held responsible for any misuse of the given information.



    - Hacking Truth by Kumar Atul Jaiswal


    Video Tutorial :- 

              
    Please Subscribe

  • British hacker reveals Microsoft's fake call center in India, CCTV exploits



    scammer cctv - PHOTO : bbc

    British hacker reveals Microsoft's fake call center in India, CCTV exploits



    A British hacker has hacked the CCTV camera of a fake call center in Gurugram. Apart from this, he has also recorded about 70 thousand phone calls. The hacker is named Jim Browning and has told the BBC about the hacking. Jim Browning has also uploaded CCTV footage from the call center to his YouTube channel.



    Jim Browning studied for a full three months by hacking the CCTV camera of a fake call center running in Microsoft's name in Gurugram and then handing the footage to the BBC. A BBC report reported that a thug at the call center in Gurugram, adjacent to Delhi, spoke to people by the name of Chris Lawson and told that he was speaking from San Jose, California.







    According to the CCTV footage obtained by the BBC, the scammer of the Grugram is talking to a UK man by the name of Chris Lawson. In the meantime, the scammer asks the UK man (victim) to recover his computer for £ 1,295, or about Rs 1,21,250. The victim tells the scammer that he is in depression and may have a heart attack. After this the scammer says why are you crying, you are a good man.


    Hacker says he wanted to show the world how scammers defraud people. The hacker has claimed that these scammers were working as Microsoft's technical support staff while sitting in an office in Grurugram. They used to send fake pop-up messages on the users' system as a warning.


    The BBC report states that scammers pay lime to the UK of around Rs 21 million, or Rs 1,53,85,96,500, every month. Scammers pretend to be from banks, computer companies, retailers, and even the government.




  • Microsoft said- 4.4 crore users used hacked username-password


    Microsoft revealed that about 4.4 crore of its users are using hacked passwords and user names for login.


    Microsoft said- 4.4 crore users used hacked username-password



    Microsoft Corporation is an American multinational technology company with headquarters in Redmond, Washington. It develops, manufactures, licenses, supports, and sells computer software, consumer electronics, personal computers, and related services. Its best known software products are the Microsoft Windows line of operating systems, the Microsoft Office suite, and the Internet Explorer and Edge web browsers. Its flagship hardware products are the Xbox video game consoles and the Microsoft Surface lineup of touchscreen personal computers. In 2016, it was the world's largest software maker by revenue (currently Alphabet/Google has more revenue). The word "Microsoft" is a portmanteau of "microcomputer" and "software". Microsoft is ranked No. 30 in the 2018 Fortune 500 rankings of the largest United States corporations by total revenue.


    Microsoft was founded by Bill Gates and Paul Allen on April 4, 1975, to develop and sell BASIC interpreters for the Altair 8800. It rose to dominate the personal computer operating system market with MS-DOS in the mid-1980s, followed by Microsoft Windows. The company's 1986 initial public offering (IPO), and subsequent rise in its share price, created three billionaires and an estimated 12,000 millionaires among Microsoft employees. Since the 1990s, it has increasingly diversified from the operating system market and has made a number of corporate acquisitions, their largest being the acquisition of LinkedIn for $26.2 billion in December 2016, followed by their acquisition of Skype Technologies for $8.5 billion in May 2011. Microsoft said- 4.4 crore users used hacked username-password


    Microsoft revealed that about 4.4 crore of its users are using hacked passwords and user names for login. This flaw came to light when Microsoft's research team conducted data analysis. The team scanned the account between January and March. It turned out that these accounts are using hacked passwords and usernames on Azure and other similar platforms. Microsoft said- 4.4 crore users used hacked password-username



    According to a PC Mag report, the company's research team matched the database of more than 3 billion passwords and user names leaked in 2019. In this, the accounts of more than 4.4 crore users were matched with it. The company said that users whose accounts were matched, were asked to reset the password. hacked password



    99.9% hacking failed by MFA


    Microsoft said - The number of hacked accounts shows that 99.9% of hacking was thwarted through multi-factor authentication (MFA). We told users that MFA is an important system for online account security. We suggested users to strengthen the password. Many users' passwords were weak.











  • WHAT WE DO

    We've been developing corporate tailored services for clients for 30 years.

    CONTACT US

    For enquiries you can contact us in several different ways. Contact details are below.

    Hacking Truth.in

    • Street :Road Street 00
    • Person :Person
    • Phone :+045 123 755 755
    • Country :POLAND
    • Email :contact@heaven.com

    Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

    Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation.