Category Archives: Hacking Tutorial

GlobalHackNews Is The Popular Blog of IT Security, Cybersecurity, and Latest Hacking News Update. Read Regular News to Improve Your Security.

101 Linux Error Code

Linux Error Code:-C code snippet tries to open a file through an open system call. There are two flags in the open call. The O_CREAT flag is to create a file if the file does not exist. The O_EXCL flag is used with O_CREAT if the file already exists open call will fail with the proper error number.

Linux Error Code in C code :-

$ cat fileopen.c
#include <stdio.h>
#include <fcntl.h>
#include <errno.h>
#include <string.h>
// Declaration of a file descriptor
int fd;

// Opening a file
fd = open("/root/sasikala/testing",O_CREAT|O_EXCL);
// If Open is failed
if ( fd < 0 ) {
        printf("Opening file : Failed\n");
        printf ("Error no is : %d\n", errno);
        printf("Error description is : %s\n",strerror(errno));
// If Open is success
        printf("Opening file : Success\n");


$ cc -o fileopen fileopen.c
$ ./fileopen

Opening file : Success

$ ./fileopen
Opening file : Failed
Error no is : 17
Error description is : File exists

open got executed successfully, and it created the file since the file was not available. In the next execution, it throws an error number 17, which is “File already exist”.  Linux Error Code

The following table shows a list of error numbers and their descriptions in the Linux operation system. Linux Error Code

Linux Error Code
Linux Error Code

Linux Error Code

Error number Error Code Error Description
1 EPERM Operation not permitted
2 ENOENT No such file or directory
3 ESRCH No such process
4 EINTR Interrupted system call
5 EIO I/O error
6 ENXIO No such device or address
7 E2BIG Argument list too long
8 ENOEXEC Exec format error
9 EBADF Bad file number
10 ECHILD No child processes
11 EAGAIN Try again
12 ENOMEM Out of memory
13 EACCES Permission denied
14 EFAULT Bad address
15 ENOTBLK Block device required
16 EBUSY Device or resource busy
17 EEXIST File exists
18 EXDEV Cross-device link
19 ENODEV No such device
20 ENOTDIR Not a directory
21 EISDIR Is a directory
22 EINVAL Invalid argument
23 ENFILE File table overflow
24 EMFILE Too many open files
25 ENOTTY Not a typewriter
26 ETXTBSY Text file busy
27 EFBIG File too large
28 ENOSPC No space left on device
29 ESPIPE Illegal seek
30 EROFS Read-only file system
31 EMLINK Too many links
32 EPIPE Broken pipe
33 EDOM Math argument out of domain of func
34 ERANGE Math result not representable
35 EDEADLK Resource deadlock would occur
36 ENAMETOOLONG File name too long
37 ENOLCK No record locks available
38 ENOSYS Function not implemented
39 ENOTEMPTY Directory not empty
40 ELOOP Too many symbolic links encountered
42 ENOMSG No message of desired type
43 EIDRM Identifier removed
44 ECHRNG Channel number out of range
45 EL2NSYNC Level 2 not synchronized
46 EL3HLT Level 3 halted
47 EL3RST Level 3 reset
48 ELNRNG Link number out of range
49 EUNATCH Protocol driver not attached
50 ENOCSI No CSI structure available
51 EL2HLT Level 2 halted
52 EBADE Invalid exchange
53 EBADR Invalid request descriptor
54 EXFULL Exchange full
55 ENOANO No anode
56 EBADRQC Invalid request code
57 EBADSLT Invalid slot
59 EBFONT Bad font file format
60 ENOSTR Device not a stream
61 ENODATA No data available
62 ETIME Timer expired
63 ENOSR Out of streams resources
64 ENONET Machine is not on the network
65 ENOPKG Package not installed
66 EREMOTE Object is remote
67 ENOLINK Link has been severed
68 EADV Advertise error
69 ESRMNT Srmount error
70 ECOMM Communication error on send
71 EPROTO Protocol error
72 EMULTIHOP Multihop attempted
73 EDOTDOT RFS specific error
74 EBADMSG Not a data message
75 EOVERFLOW Value too large for defined data type
76 ENOTUNIQ Name not unique on network
77 EBADFD File descriptor in bad state
78 EREMCHG Remote address changed
79 ELIBACC Can not access a needed shared library
80 ELIBBAD Accessing a corrupted shared library
81 ELIBSCN .lib section in a.out corrupted
82 ELIBMAX Attempting to link in too many shared libraries
83 ELIBEXEC Cannot exec a shared library directly
84 EILSEQ Illegal byte sequence
85 ERESTART Interrupted system call should be restarted
86 ESTRPIPE Streams pipe error
87 EUSERS Too many users
88 ENOTSOCK Socket operation on non-socket
89 EDESTADDRREQ Destination address required
90 EMSGSIZE Message too long
91 EPROTOTYPE Protocol wrong type for socket
92 ENOPROTOOPT Protocol not available
93 EPROTONOSUPPORT Protocol not supported
94 ESOCKTNOSUPPORT Socket type not supported
95 EOPNOTSUPP Operation not supported on transport endpoint
96 EPFNOSUPPORT Protocol family not supported
97 EAFNOSUPPORT Address family not supported by protocol
98 EADDRINUSE Address already in use
99 EADDRNOTAVAIL Cannot assign requested address
100 ENETDOWN Network is down
101 ENETUNREACH Network is unreachable

Having same terms, Linux error codes, Linux error codes list, error codes in Linux, error codes in Linux
list of error codes in Linux, error, errors,#define,error code

Hacker Kevin Mitnick shows how can bypass Two-factor authentication

Hacker Kevin Mitnick shows how can bypass Two-factor authentication

A major exploit allows hackers to spoof two-factor authentication applications by sending a user to a fake login page and then keeping the username, password, and session cookie

KnowBe4 is the world’s protecting security awareness training provider and also phishing firm with a massive client base of 17,000 organizations across the world.

Chief Hacking Officer knowbe4, Kevin Mitnick showed that how hackers to spoof two-factor authentication in a public video. By persuading a victim to visit a typo-squatting domain liked “” and capturing the login, password, and authentication code, the hacker can pass the credentials to the actual site and capture the session cookie. Once this is done the hacker can login frequently. This actually uses the one time 2FA code as a way to spoof a login and grab data.

“A white hat hacker friend of Kevin’s developed a tool to bypass two-factor authentication using social engineering tactics – and it can be weaponized for any site,” said Stu Sjouwerman, KnowBe4 CEO. “Two-factor authentication is intended to be an extra layer of security, but in this instance, we clearly see that you can’t rely on it alone to protect your organization.”

“Two-factor authentication is intended to be an extra layer of security, but in this instance, we clearly see that you can’t rely on it alone to protect your organization,” added Sjouwerman.

This is the scene of the victim is taken to the authentic LinkedIn website so as to enter login information and cookie, which the hacker required. the hacker takes that direct access to the account and manages to avoid the 2FA phase of the signing-in process

India actress Yami Gautam’s Twitter handle Hacked

   India actress Yami Gautam’s Twitter handle Hacked

Yami Gautam appears to be the latest victim of the pitfalls of social media. There has been repeated attempts to hack Yami’s Twitter account by an unknown hacker.

Yami Gautam management team informed her and the matter has now been taken to the intimation of the authorities. She was alarmed by the break-in attempts, especially her Twitter handle.

According to India news portal, the statements from the investigating agencies are anticipated and Yami Gautam, with the help of cyber cell.

The Twitter handle has been in headlines for all the wrong purposes. Actors Richa Chadha, Farhan Akhtar, Swara Bhaskar have put their voices on the poor content regulation and authority.

Whatsapp Co-Founder Brian Says Acton Its Time To delete Facebook


WhatsApp messaging service co-founder Brian Acton has urged users to “delete” Facebook amid a massive data harvesting scandal in which information of 50 million people was leaked allegedly to influence the 2016 US presidential election

WhatsApp co-founder Brian Acton left Facebook in September 2017 and joined a foundation. “It is time. #deletefacebook,” CNN quoted Acton as saying. Brian co-founded WhatsApp with Jan Koum which was acquired by Facebook in February 2014 for $19 billion., In the UK, members of the Parliament summoned Facebook’s chief executive Mark Zuckerberg to give evidence to a select committee investigating fake news.

UK’s Information Commissioner Elizabeth Denham earlier said she would be applying to the court for a warrant to search the offices of Cambridge Analytica—the UK-based political consulting firm accused of using the data of 50 million Facebook members to influence the 2016 US presidential election

Facebook has found itself in deep trouble after it emerged that data analytics company Cambridge Analytica allegedly misused the data of 50 million Facebook users.

That data may or may not have been used to help the Donald Trump election campaign and Vote Leave

Brian who founded a non-profit organization “The Signal Foundation” expressed his view on Twitter with a brief tweet It is time. #deletefacebook

 In another tweet, Brian went on to say that in order to protect your privacy,

How To Delete Your Facebook Account Permanently

To delete your Facebook account permanently follow this link, it will ask you for your Facebook password or follow these steps and say goodbye to your account:

  1. Click the account menu down arrow at the top right of any Facebook page in your web browser.
  2. Select ‘Settings’
  3. Choose ‘Security’ in the left column.delete-facebook-permanently

Ex-Hacker Adrian Lamo dies aged 37

adrian-lamoHacker Adrian Lamo has died at age 37, according to ZDNet and a Facebook post from his father. The circumstances of Lamo’s death are unknown, but a coroner in Sedgwick County, Kansas, reportedly confirmed the news.

Lamo was born in Boston, Massachusetts in 1981. In the mid-1990s, he volunteered for PlanetOut, a public media company that catered to the LGBTQ community. In 1998, he was appointed to the Lesbian, Gay, Bisexual, Transgender, Queer, and Questioning Youth Task Force by the San Francisco Board of Supervisors.

Lamo first gained notoriety online in the early 2000s for hacking companies like Yahoo! and AOL, as well as The New York Times. In 2004, after accepting a plea bargain, Lamo was sentenced for hacking the newspaper, where he had added his name to an internal list of op-ed writers and racked up $300,000 in charges using the organization’s subscription to Lexis-Nexis, a pay-per-use search tool.

Adrian was given the appellation “Homeless Hacker” by the media because once when he was unemployed he wandered the country by Greyhound bus and hacked corporations from inside abandoned buildings.

He spent almost six months in home detention and studied journalism before becoming a threat analyst.

When former US Army intelligence analyst Chelsea Manning (then Bradley Manning) read about his hacking profile in Wired magazine, Manning contacted him, and the pair started exchanging messages online.

Manning found Adrian a “kindred spirit” and told him about his role as an informer for WikiLeaks and how he leaked the most controversial combat video footage of a helicopter shooting unarmed Iraqi civilians and 260,000 classified diplomatic cables to the whistleblowing website.

However, Adrian then decided to report him and informed the US military of the breach. In an interview with the Guardian in 2013, Adrian defended his decision to turn Chelsea over to the FBI and said:

"There were no right choices that day, only less wrong ones. It was cold, it was needful, and it was no one's to make except mine. I couldn't just do anything, knowing lives were in danger, it's classified information, and when you play Russian roulette, how do you know there's not a bullet in the next chamber?"

"Choosing to interdict a man's freedom knowing it could mean his life, is something that's easy to judge but can only really be understood by living it."

Manning was arrested in May 2010 and sentenced to 35 years in prison for leaking classified documents, though her sentence was later reduced by President Barack Obama, and she was set free last year.

New discovered skygofree the most powerful spyware on android

spyware android skygofreeGlobal Hack News Report: – The Security researchers find the most powerful android spyware tools that hackers control your android device remotely

SKYGOFREE:-The Android spyware  has been Designing for the target user and it is believed to have been targeting a million of the number used for the past year Russian Cyber security firm lab publish a report where declare the skygofree implant has loss different novel features previously unseen in the wild,

The additional new update include location-based audio recording using an android microphone, etc.  The use of Android Accessibility Services to steal WhatsApp.apk and another social messenger etc., and the ability to connect infected devices to malicious Wi-Fi networks controlled by attackers.

SKYGOFREE is mainly distributed through fake web pages mimicking leading mobile network operators, most of which have been registered by the attackers since June 24th of 2015 —when the distribution campaign was most active in 2015, according to Kaspersky’s telemetry data.

Skygofree: Powerful Android Spyware Toolspyware android skygofree

Skygofree mainly works on after install they hides its icon and starts background services to conceal further actions from the user. Skygofree also includes a self-protection feature, preventing services from being killed

October of 2017, Skygofree are used by multi-stage spyware tool that gives attackers full remote control of the infected device using a reverse shell payload and a command and control (C&C) server architecture, etc.

Skygofree includes multiple exploits to escalate privileges for root access, granting it the ability to execute most sophisticated payloads on the infected Android devices

Such as payload allows the implant to execute shellcode and steal data belonging to other

Applications installed on the targeted devices, including Facebook, WhatsApp, Line, and Viber, etc.

“There are multiple, exceptional capabilities: usage of multiple exploits for gaining root privileges, a complex payload structure, [and] never-before-seen surveillance features,” the researchers said.

Skygofree’s control (C&C) server also allows attackers to capture pictures and videos remotely, seize call records and SMS, as well as monitor the users’ geolocation, calendar events and any information stored in the device’s memory.

The spyware uses “the Android Accessibility Service to get information directly from the displayed elements on the screen, so it waits for the targeted application to be launched and then parses all nodes to find text messages,” Kaspersky said.

Kaspersky researchers also found a variant of Skygofree targeting Windows users, suggesting the authors’ next area of interest is the Windows platform.

The best way to prevent yourself from being a victim is to avoid downloading apps via third-party websites, app stores or links provided in SMS messages or emails.

Hackers Can Guess Your PIN by Using Smartphone Sensor

Hackers Can Guess Your PIN by Using Smartphone Sensor(NTU)

Do you know Hackers Can Guess Your PIN by Using Smartphone Sensor.Your smartphone sensors can reveal PINs and passwords to hackers and apermission them to unlock your mobile devices, according to a study led by an Indian-origin scientist.

Instruments in smartphones such as the gyroscope and proximity sensors represent a potential security vulnerability, said researchers from Nanyang Technological University (NTU) in Singapore.

Report :-

combination of information gathered from six different sensors found in smartphones, researchers succeeded in unlocking Android smartphones with a 99.5 percent accuracy within only three tries, when tackling a phone that had one of the 50 most common PIN numbers.

The previous best phone-cracking success rate was 74 percent for the 50 most common PIN numbers, but NTU’s technique can be used to guess all 10,000 possible combinations of four-digit PINs.

Shivam Bhasu NTU Senior Research and Scientist, researchers used sensors in a smartphone to model which number had been pressed by its users, based on how the phone was tilted and how much light is blocked by the thumb or fingers.

The researchers believe their work highlights a significant flaw in smartphone security, as using the sensors within the phones require no permissions to be given by the phone user and are openly available for all apps to access.

The team of researchers took Android phones and installed a custom application which collected data from six sensors: accelerometer, gyroscope, magnetometer, proximity sensor, barometer, and ambient light sensor. “When you hold your phone and key in the PIN, the way the phone moves when you press 1, 5, or 9, is very different.

Likewise, pressing 1 with your right thumb will block more light than if you pressed 9,” said Bhasin. The classification algorithm was trained with data collected from three people, who each entered a random set of 70 four-digit pin numbers on a phone.

At the same time, it recorded the relevant sensor reactions.

Known as deep learning, the classification algorithm was able to give different weightings of importance to each of the sensors, depending on how sensitive each was to different numbers being pressed.

This helps eliminate factors which it judges to be less important and increases the success rate for PIN retrieval.

Although each individual enters the security PIN on their phone differently, the scientists showed that as data from more people is fed to the algorithm over time, success rates improved.

So while a malicious application may not be able to correctly guess a PIN immediately after installation, using machine learning, it could collect data from thousands of users over time from each of their phones to learn their PIN entry pattern and then launch an attack later when the success rate is much higher.

The study shows how devices with seemingly strong security can be attacked using a side-channel, as sensor data could be diverted by malicious applications to spy on user behaviour and help to access PIN and password information, said Professor Gan Chee Lip from NTU.

To keep mobile devices secure, Bhasin advises users to have PINs with more than four digits, coupled with other authentication methods like one-time passwords, two-factor authentications, and fingerprint or facial recognition.

How to Fix Blue Screen of Death on Your Computer

How to Fix Blue Screen of Death on Your Computer

A computer displayed a blue screen all of sudden when you are using it to finish your work, wave the internet, play the game, etc.Computer blue screen of death(BSOD) regularly stops computer for a reason and gives people error code, which is conferred on the computer displayed, to show the possible computer this case, many computer experts who get such computer issues, it is still possible to be fixed.

However, daily use, not all people are computer experts and can track down the possible reasons only during the shown error. maybe you also have no idea about such error codes? All right! No worry! Without analyzing these unknown error codes, you also can successfully fix this computer blue screen issue. carefully go read this article and go find your reason and solution.

Why Does Your Computer Blue Screen?

1). Hardware issues
Computer swiftly shut down, computer rebooting and computer slow performance and more, are able to be caused by computer hardware issues. So are the computer BSOD problems.  When your computer hard drive is not enough free space, your computer also would get that issue and your hard drive has too many fragments, you also are able to have this computer issues. Hence, go check your computer hardware carefully.

2). Computer system issues
How long has it been since you updated your computer system last time? Many crucial system files and folders are accidentally deleted or damaged? Your computer Windows system has not been updated for a really long time? OK! In daily use, the computer blue screen of death issue also is able to be aroused by computer system issues.

Also read :-85 malicious apps found on google play store


In these days, the diversified viruses cannot only infect your computer system files, damage the computer drives, occupying the computer resources without the sign and also result in computer BSOD issues. So, when your computer really gets a blue screen issue, go check your downloaded files and software to see whether they are virus-infected.

4). Computer hardware driver issues

When your computer hardware drivers are out of date or damaged, you also can get a blue screen all of sudden. Hence, go check the computer hardware drivers carefully.
Find anyone of them is practical with your computer problems? Hope they all are not difficult for you to understand.

How to Fix a Blue Screen of Death on Your Computer?

After tracking down the actual reason, you can set out to fix this computer problem immediately. Know what you can do to fix such blue screen issues? If not, also do not worry! Here are some major solutions for you to take as references:

1). Use computer system restore
In these days, in case of such troublesome computer system issues, many computers do have the system restore function that allows users to roll its system back to a previous state. So, if your computer does also have this function, to restore it back to the specific state which will bring you minimum computer data loss.

2). Clean computer viruses

The possible virus can damage the computer system, hardware and even lead to this BSOD problem. Hence, immediately open your antivirus software to scan this computer and clean all possible viruses, malware, spyware and other threats completely.

3). Update or re-install computer Windows system

In case this computer issue is brought by Windows system issue, you’d better go check your computer Windows system well. Firstly, go check the system updates and upgrade it to the latest versions. Of course, if these are too many system files or folders which have been lost or damaged, also directly re-install the computer system to fix everything.

Buy:- Linux Networking Cookbook just 1$

4). Update or re-install computer hardware drivers

The damaged or outdated hardware drivers also can lead to computer blue screen errors. Therefore, go check the computer hardware drivers well. You can easily go check the official website of the manufacturer and download the latest drivers for your computer use.
1). Back up your computer data to another external hard drive if it is still possible.
2). Recover inaccessible computer data at first after getting a Blue screen Problem.



Linking Aadhar number with Mobile phone number

following are some of the points I wish to suggest for linking mobile number to AADHAR number in a secure way.

For this purpose we require two things with a person

a) Mobile number for life long.
b) Aadhar number

1)Aadhar number is issued by government and finger prints and IRIS scan of a person is already taken while issuing the same. We can fairly assume that Aadhar is issued in a secure way.

2)However, mobile number sale is primarily carried out by private players through their Distributors/Retailers/Point of Sale (POS) network; there is some doubt about bonafide user of mobile number.

3)Mobile number has become critical identity and is being used in numerous financial transactions as well. Hence, it should be ensured that mobile connection is sold to genuine customer. To ensure security & genuineness, only Registered POS/retailer may be allowed to sale SIM cards/Telecom services. (Detailed note on registration of POS/ retailers and possible solution is given in Annexure-I of this document).

4)These registered POS/retailers shall also be given rights to link Aadhar with mobile number.

5)Government needs to develop a secure web application for this purpose, whose access will be given to ‘registered POS/retailer’. (see
Annexure I for details)
6)The web application shall be light weight to run on GPRS or low bandwidth internet speed. Otherwise two variant of the same can be explored.

7)These registered POS/retailers shall be equipped with finger print scanner, computers and connectivity with Aadhar server & TSP database. The customer should be authenticated using his finger print scan before linking his/her mobile number to Aadhar card.

8)Whenever customer’s finger prints are taken, his Aadhar number, name and photo shall be visible to registered POS/retailer (on his computer), so that he can verify the customer there only.

9)Telecom Service providers (TSP) can also devise mechanism to give access of their database to these POS/ retailers so that by entering mobile number of that customer they would be able to verify his name and photograph. Hence POS/retailers would be able to access mobile number details and Aadhar number details at the same time and he can verify name and photograph of the customer.

10)After verification POS shall recommend linking the mobile number with Aadhar number through web application.

11)An OTP can be sent to customer’s mobile number (automatically by web application) which he has to share with POS/retailer. POS/retailer will enter it in the web application to finalize linking process. Once correct OTP is entered, mobile number shall be linked to Aadhar number.

12)Computer and finger print scanner given to these POS/retailers should be subsidized by Government.

13)For all such Aadhar linking POS/retailer shall be given some monetary incentive (Rs.10/20 or as deemed fit).

14)Changing of mobile number linked earlier to Aadhar can also be done by same process as discussed earlier.

15)Once Aadhar card is issued to all individuals, we can make it mandatory to sell SIM card/mobile number only through this Aadhar authentication mechanism.

16)Only one mobile number shall be allowed to link with one Aadhar card.

Meet the hacker who hacks for the Emma Watson

Recently, across the internet, we found the hacker who loves the Hollywood celebrity Emma Watson, the crush of every 90’s kid. This hacker hacks for Emma Watson and proposed her on the hacked website .The hacker also provides his Skype and other social media accounts for Emma Watson to talk with him online because of his love for her.
Let’s read the message the hacker left on the hacked website
Hey admin this message is not for you.
It’s for who I love, who I wish I can meet her
It’s for Emma Watson
Hey Emma I want tell you my short story
First thing I really love you
This is not okay!
What makes me do this is just for love
I just want you to answer me on my Facebook or my email or Skype
I love you girl L

Please contact me.
As per the message left by the hacker, it seems he hacked the website for the love only as stated by him and he wants Emma Watson to contact him and talk to him via the social media accounts. We have gathered the hacked website screenshot too for confirming the authenticity.
The hacker is identified by the Cyber PS and is believed to be a security professional and seems to provide services. The name of the hacker is Muhammad Mallak. i.e., he is a Muslim hacker and you can view his have full bio on his website. We believe that this  is a teen and loves these sorts of things. Maybe Emma Watson will check all this all for him.but its very strange that hacker has showed interest to Emma via hacking the websites.which is why we took this blog on our network.its difficult but he seems trying to seek attention from the Hollywood celebrity by hacking into website and defaced with loving message to Emma Watson.