Tips and Tricks

Tips and Tricks

Get to know everything you will ever need to optimize your system and enhance your web experience. The tips and tricks will let you explore the tech world in a new way

Read More
Impedit quo minus id

Social Networking

Know more about the social sites you visit everyday. Things you should know with these sites

Read More
Tech News

Tech News

At hacking duo we keep you updated with the recent turnouts in the techno world. The space contains all the new advancement in the Tech world, new releases, reviews etc

Read More
Operating System

Operating system

You own Window, Linux or Mac, we will always have something for you. All tips and hacks that you will need to play with your system

Read More
  • Quas molestias excepturi
  • Impedit quo minus id
  • Tech News
  • Mauris euismod rhoncus tortor
Showing posts with label proxy servers. Show all posts
Showing posts with label proxy servers. Show all posts

Friday, 23 September 2011


The Remote Administrative Tool, or more commonly known as RAT over internet. It is used by hackers to remotely use and control single or multiple computers. It has many useful tools embedded into itself.

It can act as a keylogger.

  • It can capture screenshots.
  • It can control the cameras or web cam.
  • It can disable anti-virus.
  • Can cause system instability
  • Can be used to access files on victim computers.
  • Shell control
  • File management i.e uploading and downloading files.
  • Registry management
  • computer authority i.e you can shut down victim computer.
Most important function of RAT is its power to get access to the victim computer. Once you are in you could do anything you, most feature of RATs are product oriented.

RAT is basically a software that is used to create a server file which once is executed on victims computer, lets the hacker whole access to the system. The server file is provided with IP addresses of both of the attackers and the victim's.
The server file once created is crypted using any crypter to avoid its its detection from anti-viruses, most of the anti virus detects RATs as potential threats and could delete them to avoid this they are crypted. After crypting they are binded with any file with known extension so as to confuse victim to click on them. Once clicked victim is all yours.

RATs that utilize reverse connection have a few major advantages, such as the ones listed below.
  • Outgoing connections generally are less threatening, and are less likely to be detected or blocked by a firewall, such as a router.
  • Since the victim's computer is connecting to the remote administrator, he or she will not need to know the victim's IP in order to connect.
  • The remote administrator does not need to know to which or how many computers the RAT is being installed on, which allows for mass-distribution.
  • If mass-distributed, it is much easier to keep track of the computers the RAT is installed on, since they are all "calling home" by connecting to the remote administrator.
most popular RATs are :
  1. proRAT
  2. Cerberus
  3. Cybergate
  4. Blackshades
  5. Poison Ivy
  6. Schwarze Sonne RAT
  7. Syndrome RAT
  8. Team Viewer
  9. Y3k RAT
  10. Snoopy
Hope you liked this post, soon will be posting tutorial on how to use RATs.

Saturday, 10 September 2011

Surf web anonymously and securely. 
Its really an insecure world out there, when ever you are surfing net you leaves all your foot prints behind yourself, just like as if walking on a mud. Its really easy for an attacker to trace you.
How to surf anonymously without exposing yourself:

Now thats a question most of people never wanted to give a thought. When ever you surf internet you leave trace of yourself everywhere. Its like a leaving a trail all around. But first as we proceed. For beigners here is something you should know first.


What is an IP?
IP is known as INTERNET PROTOCOL .The Internet Protocol (IP) is the principal communication protocol used for relaying datagrams (packets) across an internetwork using the Internet protocol suit. Responsible for routing packets across network boundaries, it is the primary protocol that establishes the Internet. IP is the primary protocol in the internet layer of the Internet Protocol Suite and has the task of delivering datagrams from the source host to the destination host solely based on their address.
A IP address is like a telephone number. It can revel everything about you, your location, your address, everything about you.
So, then how to mask up your IP so that no one could trace you. there are a no. of methods which could be used. PROXY is the most significant one.
Proxy provides a different mode of path for data encryption. The proxy server act as a medium of communication between your system and network. All the data you send is manipulated by proxy server
Following few methods could be used to change your proxy.
Method 1:
By using online proxy sites. There are a no. of online proxy sites which provide free proxy. These sites are very useful if you want to access a site which is banned by by you network administrator.

proxy buddy
hide my ass
proxy site
access blocked site

Method 2:
By using VPN software it changes your proxy directly. The softwares such as 
Ultrasurf
TOR, 
Real hide IP, 
Hide my IP etc are quite usefull.

Friday, 29 July 2011

 Being a firefox lover its really is cumbersome to use ultrasurf as it doesn't supports firefox. But here is a method by which you can use firefox also with ultrasurf, so, surf freely, hidden, anonymously, and safe with firefox also.

In school colleges or at public place wifi systems, as I talked through a lot of guys talking about their college banning most of the stuffs. So, here I got you a way by which you can access all the banned sites on the ( wi-fi network) including your favorite one.