Breaking

Wednesday, November 4, 2020

November 04, 2020

Want to report a suspected phishing site

 

Want to report a suspected phishing site

Want to report a suspected phishing site

    First, you need to know what is a phishing website. A Phishing website is also known as spoofed sited which collect user information or steal users information without his or her knowledge. its steal, your IP Address, Mac Address, browser information, Account Password, social media passwords etc...
This website trick user by tricking you into believing you're in a legitimate website and provide spoofed linked of any social media or other accounts if the victim clicks on that link this will redirect you in phishing site by mistyping a URL bar. If victim type any of there credentials like username password etc.. it will collect all that information and store this information in the cloud and redirect you on any website.


Report Phishing Site


There are various websites available online for reporting this type of phishing website, you just search report phishing website on google and it will show you thousands of websites, you can report it there.


Find below some website for reporting:


  1. https://safebrowsing.google.com/safebrowsing/report_phish/?hl=en
  2. https://www.reportphishing.in/
  3. https://us-cert.cisa.gov/report-phishing
  4. https://cybercrime.gov.in/
  5. https://www.usa.gov/online-safety

you can follow these links for reporting Phishing URL or Phone Website.

----------------------------------------------------------------------------------------------------------

Invite an Ethical hacker and organize workshop like HackTheHacker
Name: Pawan Shrivastav
Profession:- Author, Ethical Hacker, Guest Speaker Founder of ISF India NGO and P.S_Networks Securities.
Business Contact:- privacyprotection101@gmail.com
contact form:- ClickHere
Workshop Photos:- ClickHere

----------------------------------------------------------------------------------------------------------

Sunday, August 30, 2020

August 30, 2020

What Are The Basics Needed To Become A Hacker | Pawan Shrivastav


What Are The Basics Needed To Become A Hacker

What Are The Basics Needed To Become A Hacker


Everyone has detected of 1 individual or another that was caught whereas hacking computers that belonged to the present or that organization. as a result of hacking into computers is extremely black, it ought to be mentioned that this text won't mention any real specifics regarding the topic, and this author would rather fain encourage you to become a true hacker - professionally.

This article, can but, provides a temporary summary of criminal hackers, a number of their strategies, and some belongings you will do to create your own pc safer from hack attacks. Here area unit those belongings you got to learn on a way to become a hacker.

Learn computers

It ought to go while not voice communication that the primary issue that's required is to be told concerning computers. this suggests study. tons of reading is concerned beside simply plain old school learning the way to use a laptop. Then, of course, they are the special aspects of laptop study. The places wherever the ideas are learned is commonly two-fold: an acquaintance World Health Organization has access to a laptop and a spread of places on the online. however this can be conjointly a noteworthy issue - if a juvenile has the flexibility to be told, and desires to be told will use hacking tutorials- then why not take the time to be told the correct things - things which will earn him tons of cash within the legit world? Is it probable that it might be the friend he has that turns him aloof from the good?

----------------------------------------------------------------------------------------------------------

Invite a Ethical hacker and organize workshop like HackTheHacker
Name: Pawan Shrivastav
Profession:- Author, Ethical Hacker, Guest Speaker Founder of ISF India NGO 
Business Contact:- privacyprotection101@gmail.com
contact form:- ClickHere
Workshop Photos:- ClickHere

----------------------------------------------------------------------------------------------------------

#psnetworks
via Pawan Shrivastav
August 30, 2020

Smart Searching with GoogleDorking - Exposing the Invisible | Pawan Shrivastav

Smart Searching with GoogleDorking - Exposing the Invisible | Pawan Shrivastav

Smart Searching with GoogleDorking - Exposing the Invisible

Google Dork Query

Google Dorking, otherwise called Google hacking, can return data that is hard to situate through basic inquiry inquiries. That portrayal incorporates data that isn't planned for open survey however that has not been satisfactorily secured.
As an aloof assault technique, Google dorking can return usernames and passwords, email records, touchy reports, by and by recognizable money related data (PIFI) and site vulnerabilities. That data can be utilized for any number of unlawful exercises, including cyberterrorism, modern secret activities, fraud and cyberstalking.

Advanced and Latest Google Dorks List 2019

about.php?cartID=

accinfo.php?cartId=

acclogin.php?cartID=

add.php?bookid=

add_cart.php?num=

addcart.php?

addItem.php

add-to-cart.php?ID=

addtomylist.php?ProdId=

adminEditProductFields.php?intProdID=

advSearch_h.php?idCategory=

affiliate.php?ID=

affiliate-agreement.cfm?storeid=

affiliates.php?id=

ancillary.php?ID=

archive.php?id=

phpx?PageID

basket.php?id=

Book.php?bookID=

book_list.php?bookid=

book_view.php?bookid=

BookDetails.php?ID=

browse.php?catid=

browse_item_details.php

Browse_Item_Details.php?Store_Id=

buy.php?

buy.php?bookid=

bycategory.php?id=

cardinfo.php?card=

cart.php?action=

cart.php?cart_id=

cart.php?id=

cart_additem.php?id=

cart_validate.php?id=

cartadd.php?id=

cat.php?iCat=

catalog.php

catalog.php?CatalogID=

catalog_item.php?ID=

catalog_main.php?catid=

category.php

category.php?catid=

category_list.php?id=

categorydisplay.php?catid=

checkout.php?cartid=

checkout.php?UserID= 

checkout_confirmed.php?order_id=

checkout1.php?cartid=

comersus_listCategoriesAndProducts.php?idCategory=

comersus_optReviewReadExec.php?idProduct=

comersus_viewItem.php?idProduct=

comments_form.php?ID=

contact.php?cartId=

content.php?id=

customerService.php?****ID1=

default.php?catID=

description.php?bookid=

details.php?BookID=

details.php?Press_Release_ID=

details.php?Product_ID=

details.php?Service_ID=

display_item.php?id=

displayproducts.php

downloadTrial.php?intProdID=

emailproduct.php?itemid=

emailToFriend.php?idProduct= 

 events.php?ID=

faq.php?cartID=

faq_list.php?id=

faqs.php?id=

feedback.php?title=

freedownload.php?bookid=

fullDisplay.php?item=

getbook.php?bookid=

GetItems.php?itemid=

giftDetail.php?id=

help.php?CartId=

home.php?id=

index.php?cart=

index.php?cartID=

index.php?ID=

info.php?ID=

item.php?eid= 

SQL Dorks 2019

item.php?item_id=

item.php?itemid=

item.php?model=

item.php?prodtype=

item.php?shopcd=

item_details.php?catid=

item_list.php?maingroup

itemDesc.php?CartId=

itemdetail.php?item=

itemdetails.php?catalogid=

learnmore.php?cartID=

links.php?catid=

list.php?bookid=

List.php?CatID=

listcategoriesandproducts.php?idCategory=

modline.php?id=

myaccount.php?catid=

news.php?id=

order.php?BookID=

order.php?id=

order.php?item_ID=

OrderForm.php?Cart=

page.php?PartID=

payment.php?CartID= 

pdetail.php?item_id=

powersearch.php?CartId=

price.php

privacy.php?cartID=

prodbycat.php?intCatalogID=

prodetails.php?prodid=

prodlist.php?catid=

product.php?bookID=

product.php?intProdID=

product_info.php?item_id=

productDetails.php?idProduct=

productDisplay.php

productinfo.php?item=

pdetail.php?item_id=

powersearch.php?CartId=

price.php

privacy.php?cartID=

prodbycat.php?intCatalogID=

prodetails.php?prodid=

prodlist.php?catid=

product.php?bookID=

product.php?intProdID=

product_info.php?item_id=

productDetails.php?idProduct=

productDisplay.php

productinfo.php?item=

productlist.php?ViewType=Category&CategoryID=

productpage.php

products.php?keyword=

products_category.php?CategoryID=

products_detail.php?CategoryID=

productsByCategory.php?intCatalogID=

prodView.php?idProduct=

promo.php?id=

SQL DORKS

promotion.php?catid=

pview.php?Item=

resellers.php?idCategory=

results.php?cat=

savecart.php?CartId=

search.php?CartID=

searchcat.php?search_id=

Select_Item.php?id=

Services.php?ID=

shippinginfo.php?CartId=

shop.php?a=

shop.php?action=

shop.php?bookid=

shop.php?cartID=

shop_details.php?prodid=

shopaddtocart.php

shopaddtocart.php?catalogid=

shopbasket.php?bookid=

shopbycategory.php?catid=

shopcart.php?title=

shopcreatorder.php

shopcurrency.php?cid=

shopdc.php?bookid=

shopdisplaycategories.php

shopdisplayproduct.php?catalogid=

shopdisplayproducts.php

shopexd.php

shopexd.php?catalogid=

shopping_basket.php?cartID=

SQL injection Dorks

shopprojectlogin.php

shopquery.php?catalogid=

shopremoveitem.php?cartid=

shopreviewadd.php?id=

shopreviewlist.php?id=

ShopSearch.php?CategoryID=

shoptellafriend.php?id=

shopthanks.php

show_item.php?id=

show_item_details.php?item_id=

showbook.php?bookid=

showStore.php?catID=

shprodde.php?SKU=

specials.php?id= 

Dorks carding

store.php?id=

store_bycat.php?id=

store_listing.php?id=

Store_ViewProducts.php?Cat=

store-details.php?id=

storefront.php?id=

storefrom.php?item=

StoreRedirect.php?ID=

subcategories.php?id=

tek9.php?z

template.php?Action=Item&pid=

topic.php?ID=

tuangou.php?bookid=

type.php?iType= 

updatebasket.php?bookid=

updates.php?ID=

view.php?cid=

view_cart.php?title=

view_detail.php?ID=

viewcart.php?CartId=

viewCart.php?userID=

viewCat_h.php?idCategory=

viewevent.php?EventID=

viewitem.php?recor=

viewPrd.php?idcategory=

Overproduction?misc=

voteList.php?item_ID=

whatsnew.php?idCategory=

WsAncillary.php?ID=

WsPages.php?ID=noticiasDetalle.php?xid=

sitio/item.php?idcd=

index.php?site=

de/content.php?page_id=

gallerysort.php?iid=

products.php?type=

event.php?id=

showfeature.php?id=

home.php?ID=

tas/event.php?id=

profile.php?id=

details.php?id=

past-event.php?id=

index.php?action=

site/products.php?prodid=

page.php?pId=

resources/vulnerabilities_list.php?id=

site.php?id=

products/index.php?rangeid=

global_projects.php?cid=

publications/view.php?id=

display_page.php?id=

pages.php?ID=

lmsrecords_cd.php?cdid=

product.php?prd=

cat/?catid=

products/product-list.php?id=

debate-detail.php?id=

cbmer/congres/page.php?LAN=

content.php?id=

news.php?ID=

photogallery.php?id=

index.php?id=

product/product.php?product_no=

nyheder.htm?show=

book.php?ID=

----------------------------------------------------------------------------------------------------------

Invite a Ethical hacker and organize workshop like HackTheHacker
Name: Pawan Shrivastav
Profession:- Author, Ethical Hacker, Guest Speaker Founder of ISF India NGO 
Business Contact:- privacyprotection101@gmail.com
contact form:- ClickHere
Workshop Photos:- ClickHere

----------------------------------------------------------------------------------------------------------


#psnetworks
via Pawan Shrivastav

Tuesday, August 18, 2020

August 18, 2020

How to know out mobile is hacked or not | Pawan Shrivastav

 

How to know out mobile is hacked or not?

One of the majour issue of mobile in this 21st century is to check is our mobile devices is hacked or not, because hacking is common thing now a day, some hackers intentionally hacked into someones mobile devices and stolling victims personal or private information, sometime because of this issue the hackers or cyber criminals  uses attack on mobile phone and do financial frauds. is is one of the majour issue we need to be fixed.

Some bad hackers also do virus payload binding into applications the main intention to do this attack is to do fincial fraud on victims bank account through UPI apps like Google pay , Phone pay, internet banking etc. The hacker build viruses and bind with an any application and publishing this infacted apps on internet and play store, some virus are "FUD Virus" it means undetectable virus, this type of virus will bypass from antivirus.

Mobile hack symptoms

(If this things happening in your phone it means you device is hacked keep note)

1. The battery is draining much faster.
2. Mobile data is expire so fast.
3. Mobile is overheating regularly
4. Unknown Activities.
5. Apps installed without icon

What to do after this

1. Go to app setting and delete all spyware apps, apps without icon, apps like system application.


Tips regarding Cyber Safety.

1. Consult with ethical hacker, or computer security expert regarding this.

2. "Internet security 101" Read this book for knowing more about self security with real life incident, stories.

3. Invite a professional ethical hacker and organize for Oneday workshop in your society, Organization, College, Camp etc...

----------------------------------------------------------------------------------------------------------

Invite a Ethical hacker and organize workshop like HackTheHacker
Name: Pawan Shrivastav
Profession:- Author, Ethical Hacker, Guest Speaker Founder of ISF India NGO 
Business Contact:- privacyprotection101@gmail.com
contact form:- ClickHere
Workshop Photos:- ClickHere

----------------------------------------------------------------------------------------------------------

Monday, July 27, 2020

July 27, 2020

What are the specifications of a good laptop | Pawan Shrivastav

What are the specifications of a good laptop
What are the specifications of a good laptop

B
uying a new laptop is not an easy task since there are a lack of variety of laptops in the market. This just makes it confusing for people to select the best one for them. There are many options to choose from vast varieties. We are trying to simplify this process for you by giving you a set of criteria, some basic things other than budget, which everyone should think about before buying a new laptop. Given below are a few of these types of important things that you should know before buying a new device.

1. Size

Laptops start in size from 12 inches to 17 inches. However, it depends on you, what your usage of the device is. Therefore, choosing the ideal size is important. The laptop which ranging from 12 to 14 inches is very portable apart from being small, thinner, and lighter than the others.

These include EliteBooks and Ultrabooks. The traditional Notebooks are around 15.6 inches, which makes them a good mix of portability and power for you. These types of devices can turn into a tablet as the keyboard either detach or folds. Some also have the option of touch screens usability. These devices are available almost in all brands, such as HP, DELL, ASUS, and LENOVO.

2. CPU

The another most important part of buying a new laptop is Processing speed. Most devices are equipped with Intel's Core Based CPU'S/ processers, such as i3, i5, i7 i8, and i9 series. You can take a look for one according to your need. in this case, the AMD processor is also a good choice The i3, i4 series laptops have enough power to perform all our basic tasks.

But the i5 processor is found in most of the high-end laptops but it depends o  you and your task. i7 is for people who need the best performance from their devices. On the other hand, the i9's are even more powerful than i7's.

3. RAM

RAM is one of the important things which we need in laptop our other devices. but in case of laptop RAM is always upgradable. Almost all laptops have a minimum RAM of 4GB. However, it depends on your usage involves heavier applications, just you should consider at least of 8GB or 16GB of RAM.

4. Storage

Another most important thing to see when buying a new laptop or other devices is storage, as nobody wants the storage space of their devices to run out. Hard drives were used in many laptops devices, but today's devices are equipped with (SSD's) Solid State Drives.

SSD's can increase the overall performance of the laptop, as they offer higher speed. They can add data much faster during the system boot-up. Hence, if you're finding a new laptop, try to look for the devices that come with SSD's.

5. Other Things to consider

When finding a new laptop, you should always look for other factors, such as the capacity of battery time, display qualities, keyboard features, and overall Build Quality, just to name a few. Such features are add-ons in your search of a good and ideal laptop.

The Takeaway

You may get confused sometime and find it difficult to reach and finalize a decision. However, if you follow the simple tips & tricks mentioned above, this will make the whole process of buying a new laptop much simpler. Hopefully, now, you'll able to get the best laptop to meet your needs.

If you are looking for the best and useful guides to buy different types of gadgets, such as computers and laptops, Mobile phones we suggest that you check out this site psnetworks guide at http://psnetworks.xyz/.

Sunday, July 26, 2020

July 26, 2020

What is a Phishing Attack and types Stay Safe | Pawan Shrivastav

What is Phishing attack? Types and Prevention By Pawan Shrivastav
What is a Phishing attack? Types and Prevention By Pawan Shrivastav

Phishing is a kind of social engineering attack which frequently used to take client information, including login credentials and credit card numbers. It happens when an attacker, taking an informative and message of a confided in element, tricks a casualty into opening an email, text, or instant message. The beneficiary is tricked into clicking a link, which can prompt the establishment of malware, the freezing of the framework as a component of ransomware attacks This article will discuss the kinds of phishing procedures and counteraction.

Phishing techniques 

Here's a brief look at five regular phishing attacks that frequently arise in big business settings.

1. Breach of Trust - Janifer gets an email from what he thinks is his bank telling her to confirm a wire transfer. The email transfers her to a link that looks like her original bank's website but it is actually a "spoofed" but someone but an identical copy of his bank's website. When she gets to the page, he entered his credential details but nothing happened. now, this is too late, Jenefer just gave his bank login credential to a cybercriminal/ hacker.

2. False Lottery - James gets an email saying that he's won a prize from a lottery. Normally, James is too savvy and alert to fall for this trick. However, this email comes from his boss, Jennifer, and references a charity that they both support from last some years. He clicks and ends up at a Fake page that loads malware, and now James is compromised.

3. Data Update - Lara gets an email from Joe telling her to take a look at the attached pdf file. The document is compromised with a trojan. Lara may not even realize what has happened. She looks at the pdf file, which looks normal. The resulting trojan might log his keystrokes for months, compromise the entire network, and lead to big security breaches throughout the organization.

4. Sentimental Abuse - James received an email from someone claiming to be Jennifer's brother-in-law. He's suffering from TB and Brain Hambrage and his medical insurance canceled. He asks James to donate to help him recover from his illness. James clicks on the link and is taken to a bogus charity site. The webpage could host malware or just steal James' credit card information via a bogus "online donation".

5. Impersonation - Richard gets an email from his boss Mark, who says that he needs some money wired to a known vendor as pre-payment for an emergency job. Can Richard wire them the money right away? It seems fairly routine. Richard wires the money to the account requested. The money is untraceable and never seen again.

Tuesday, June 30, 2020

June 30, 2020

Indian government has banned 59 Chinese apps Breaking News | Pawan Shrivastav Blogs

Indian government has banned 59 Chinese apps Breaking News
Indian government has banned 59 Chinese apps Breaking News

In Official notification by Indian Government. The ministry of Information Technology has ten a step and banned 59 chinies apps, this apps has captured huge amount of Indian market and this apps has million infact Billions of download. some apps in this list has very good Rating in Play Store also.
and one app called TikTok has also banned in he is included in this list in some days back this TikTok app was the reason of YouTube vs Tiktok conspiracy. now many of tiktokers has job less, but i thik many of tiktokers also have talen so they can also able to shift they content from TikTok to YouTube.
some of famous pass are included in this like like, shareit, TikTok, UC Browser, Helo, Like and etc...
find below list of all banned chinies apps.

FULL LIST OF CHINESE APPS BANNED BY GOVT:

1. TikTok

2. Shareit

3. Kwai

4. UC Browser

5. Baidu map

6. Shein

7. Clash of Kings

8. DU battery saver

9. Helo

10. Likee

11. YouCam makeup

12. Mi Community

13. CM Browers

14. Virus Cleaner

15. APUS Browser

16. ROMWE

17. Club Factory

18. Newsdog

19. Beutry Plus

20. WeChat

21. UC News

22. QQ Mail

23. Weibo

24. Xender

25. QQ Music

26. QQ Newsfeed

27. Bigo Live

28. SelfieCity

29. Mail Master

30. Parallel Space 31. Mi Video Call - Xiaomi

32. WeSync

33. ES File Explorer

34. Viva Video - QU Video Inc

35. Meitu

36. Vigo Video

37. New Video Status

38. DU Recorder

39. Vault- Hide

40. Cache Cleaner DU App studio

41. DU Cleaner

42. DU Browser

43. Hago Play With New Friends

44. Cam Scanner

45. Clean Master - Cheetah Mobile

46. Wonder Camera

47. Photo Wonder

48. QQ Player

49. We Meet

50. Sweet Selfie

51. Baidu Translate

52. Vmate

53. QQ International

54. QQ Security Center

55. QQ Launcher

56. U Video

57. V fly Status Video

58. Mobile Legends

59. DU Privacy

--------------------------------------------------------------------------------------------------------------------------
Popular Blogs:-

1. Top 25 Chinies app list:- click here

2. Live Covid 19 Update :- Click here

3. How to rise cyber crime complain from home:- click here
--------------------------------------------------------------------------------------------------------------------------