Email Login| Link Exchange | Cyber News | Phishing Attack | SQL Injection | SEO | DOS Attack | Hacking Tools | |Hacking Tricks | Penetration Testing | Trojans & Keyloggers |Hacking Videos | General Discussion | Website Hacking | Session Hijacking | Social Engineering | Anonymous Surfing | Recover Passwords | Bypass Firewall | Hacking Books | Network Sniffers | Password Cracking | Enumerating & Fingerprinting | Movies & Songs

Share This Post With Your Friends

Friday, January 1, 2010

The 10 biggest failures in IT history

Windows Vista What a disaster! Could Microsoft have assembled a bigger failure if it tried? Well, possibly. But Microsoft wasn't trying to make a failure – it was trying to make the best of the best. The result was the worst of the best.

NeXT NeXT did inspire a lot of software for the Linux desktop (such as AfterStep), and the NeXTSTEP did eventually become the foundation of OS X. So NeXT wasn't a complete flop.

BeOS BeOS has been resurrected as Haiku, the BeOS (and all the cool hardware it promised) never really got off the ground. The PC that promised to be the dream machine for the media crowd fizzled out before its fuse could really be lit.

Cobalt Qube The Cobalt Qube looked cool. If you're lucky, you can still find one on eBay going cheap. Underneath that tiny blue exterior lay a beefy 64 MB of RAM and an 8.4 Gig HD that was ready and willing to serve up your Web site, your mail, your DNS, or anything else you needed. Ah, but those were the glory days -- and short-lived at that. The serious IT crowed quickly realized that function held sway over form, and the cool blue Qubes went nowhere. Even after Sun bought the Cobalt company, these devices did nothing.

Y2K I can't resist including this one. The entire world was supposed to cave under the pressure this little bug promised, wasn't it? I even read plenty of sci-fi books based on that premise. But nothing happened. Banks didn't lose all of your money, the world's security didn't fall to pieces, and all IT professionals woke up the next morning collectively saying, "Was that it?"

MP3 The MP3 format is on this list because of all the licensing issues it has caused. On the Linux operating system alone, MP3 isn't installed on most distributions, by default, because of licensing issues. As a result, users scramble to get MP3 support built into their various tools. This causes as much hair loss as MP3 causes audio quality loss. There are much better formats out there without the licensing issues, people!

Richard Stallman This man was supposed to be the champion of open source -- but he endangers open source at every turn. Instead of making ridiculous claims, RMS should stand down and let someone with a modicum of tact and sense to take over as the voice of open source software.

WordPerfect WordPerfect was an outstanding word processing tool. Corel, however, was not outstanding in its ability to market and sell something as good as WordPerfect. So instead of a piece of software that should have single-handedly toppled the Microsoft juggernaut, WordPerfect died. This should never have happened. Any other company could have pulled off this win.

IPv6 Should this already be in place? Should something so simple really be that hard? The 'net could run out of IP addresses and there is no solution in place yet. Why? Because we don't have the problem yet. But didn't everyone panic with claims that the "IP sky is falling"? Wouldn't it be smart to go ahead and put this in place? Maybe the powers-that-be are waiting until that very last IPv4 address is issued and we have to say, "We have no more!" At that point, no one will really know how to implement the solution and it will be Y2K all over again.

Mesh networks At one point, wireless was going to cover the entire planet and everyone was going to have free wireless networking, thanks to wireless mesh networks. It didn't happen. It sounded like a great idea, and sites popped up all over the place trying to get users to set up their own mesh networks to further expand the "net." It was a grand idea, based on a grand ideal, but it just never got off the ground. That's a shame, since a "mesh Wifi" would have enabled anyone to be online anywhere. Of course, I am sure the telecoms had NOTHING to do with the fall of mesh networking.

SOURCE: TechRepublic

Learn How to Scan Open Ports of Target Using WinFingerprint

  • The WinFingerprint application is used to enumerate information from a target.
  • Information such as ports, services, shares, and password policies can be obtained.
  • Install the The WinFingerprint on your system.
  • Accept the default choices during the installation by clicking Next throughout the process.
  • To accept the default answer of Yes when asked to change the number of ephemeral ports, click Yes. Remember..always click YES only
  • After installation of the tool, Enter the target IP address, IP range, Subnet, IP list, or Neighborhood. Select the scan options. Select if you need a TCP and/or UDP port scan against the target. Click Scan.
  • The results will be displayed as below
  • Once the WinFingerprint application has made a NULL session connection to the target (one of the options) and the Windows Shares have been identified, an attacker can open Windows Explorer and place in the Address bar the path represented in the WinFingerprint results. This will reveal the contents of the shared resource.

Learn How to Disable Default Shares on Windows Operating System

  • The default shares for Windows computers can be as useful to an attacker as the intended user.
  • The default shares of concern are ADMIN$ and one for each logical disk on the system (C Drive = C$, D Drive = D$, etc.)
  • Once an attacker has identified the default shares a dictionary attack can be attempted against these shares.
  • To disable it, Open Control Panel/Administrative Tools/Computer Management (or right-click on My Computer and select Manage).
  • Double-click the SHARES to open the shares to the computer and identify the default shares. In this example, the ADMIN$ and C$ are the shares of concern.
  • Click on START/RUN and type Regedit. Click OK.
  • Browse to the following: HKEY_LOCAL_MACHINE/System/CurrentControlSet/Services/lanmanserver/parameters
  • Right-click and select NEW, DWORD value. Enter the name of AutoShare-Server and enter a value of 0.

  • Right-click and select NEW, DWORD value. Enter the name of AutoShare-Wks and enter a value of 0.
  • Restart the computer.
  • From the Computer Manager validate the same.

Learn How to Gather OS Runtime and Registered IPs Using Netcraft

The http://www.netcraft.com Web site allows you to retrieve
  • The target is running on Microsoft Windows 2000.
  • The target is using IIS 5.0.
  • The date this information last changed.
  • The IP addresses associated with the target.
  • The netblock owner.

Learn How to Gather IP or Hostname Using Sam Spade

  1. The Sam Spade provides a variety of tools against a target such as registrant information and tracing the route to the target.
  2. From the http://www.samspade.org Web site enter the target hostname or IP.
  3. By clicking the Do Stuff button the registrant information is retrieved by a WHOIS query.
An other websites which I suggest:

Determining the target operating system - Open the http://www.netcraft.com Web site enter the target hostname or IP

Learn How to Gather Registration Info/Trace Using Visual Route

  1. The Visual Route (http://www.visualroute.com) provides visual indication of the location of the target in a representation of a global map.
  2. From http://www.visualroute.com enter the target hostname or IP.

Wednesday, December 30, 2009

Learn How to Hack Online Security Cameras using Google Hacking

Google hacking involves using advance operators in the Google search engine to locate specific strings of text within search results. Some of the more popular examples are finding specific versions of vulnerable Web applications. Although Google blocks some of the better known Google hacking queries, nothing stops a hacker from crawling your site and launching the Google Hacking Database queries directly onto the crawled content.

The Google Hacking Database is located at http://johnny.ihackstuff.com.

For Hacking Security Cameras from google, Type in Google search box exactly as hit enter

inurl:”viewerframe?mode=motion”

Click on any of the search results. I found below:
  • http://66.209.109.2:60006/ViewerFrame?Mode=Motion&Language=0
  • http://birdtable.derby-college.ac.uk/ViewerFrame?Mode=Motion&Language=4
  • http://125.206.34.116/cgi-bin/ViewerFrame?Mode=Motion&Resolution=640x480&Quality=Motion&Interval=10&Size=STD&PresetOperation=Move&Language=0
  • http://cube.northwestcollege.edu/ViewerFrame?Mode=Motion&Language=0
AND MANY MORE....

Other search queries through you can gain access to other cameras is

intitle:”Live View / – AXIS”

Google is a pretty powerful search tool,You knew that. You can use it to find information, but you can also use it to find downloadable MP3s, books, videos, and other items.

We are going to assume you are just looking for legally available downloads, but the truth of the matter is if someone?s posted an MP3 (copyrighted or not) to their web page, Google can find it.

But who has the time to memorize all the search modifiers, index of, last modified, parent directory, description size (.mp3|.wma|.ogg).....That's where Google Hacks comes in. This handy little app will let you search for dozens of file types, song lyrics, cached pages, fonts, and other little goodies hanging out on the web.

Just download and install Google Hacks for Mac, Linux, or Windows, fire it up and enter your search term and check the boxes next to the type of search you want to perform. Your results will show up in your default web browse.

To download Google Hack Software

A Beijing judge has told the Chinese novelist Mian Mian to hold settlement talks, who is suing Google over its plan to create an online library.

After a two-hour hearing, the court ordered both sides to talk but did not set a deadline for reporting back, according to the author's lawyer.
She is seeking damages of 61,000 yuan ($8,950; £5,576) and a public apology.

The lawsuit was filed in October after Google scanned one of Mian Mian's books, Acid House, into its library.

Google said it had removed the book as soon as it learned of the lawsuit, but had no further comment on the case.

Mian Mian writes risque novels - including titles such as Panda Sex and Candy - about China's underworld of sex, drugs and nightlife. Most of her work is banned in China.

She is not alone in complaining about copyright issues raised by Google's online library. The China Written Works Copyright Society is also looking for compensation for other Chinese authors whose work is included in the project.

In France, a court ordered Google to stop digitising French books without the publisher's approval. The search engine was also told to pay 300,000 euros ($430,000; £268,000) in damages and interest to French company La Martiniere, which had sued for copyright infringement for scanning book excerpts.

In the US, Google agreed a $125m settlement with American authors and publishers - although this is still waiting for final court approval.

SOURCE: BBC News

Tuesday, December 29, 2009

Learn how to Report the RPC of Target using Rpcinfo

  1. The rpcinfo application makes a Remote Procedure Call (RPC) to the target and reports the results.
  2. Attackers use the results to identify what ports/exploits to attack/use.
  3. From a Linux shell type the following with the syntax of: rpcinfo (Hostname)
  4. In this example, the target 192.168.11.123 has 5 RPC ports open.

Monday, December 28, 2009

Learn How to Enumerate Hosts and Domains of LAN using Net Commands

  1. The net commands are used to enumerate information from the Local Area Network (LAN).
  2. Once a NULL session has been established, any shares these hosts will be displayed as well.
  3. Create null session first as mentoined in old posts.
  4. Run the syntax: net
  5. From a DOS prompt, type the syntax: net view
  6. This technique only works on the LAN and not on the Internet. Type command syntax: net view /domain
To identify the hosts within each domain, the syntax would be: net view /domain:domain name
To view the nonhidden shares available: net view \\Target IP Address

If you find you are not obtaining the results desired, try initiating a NULL session to the target.

Learn How to Exploit User Information from Target usingDUMPSEC

  • Establish a NULL session
  • Open the DUMPSEC
  • From Report, Select Computer, enter the target IP address and click OK.
  • The Dump Users as Table as shown as below
  • From Report, select Dump User as Column. Click Add until all items on the left are now on the right on the screen. Click OK
  • The results from the target will appear in the main window.
  • Attention should be given to the “notes” section of the results as many Administrators place sensitive information in that block, including passwords.
  • The DUMPSEC application may also be run from the DOS command line with the following syntax: dumpsec /computer=\\Target IP Address /options

Learn How to Exploit Data from Target Computer using USERINFO

  1. The USERINFO gathers the user information from the target.
  2. Some of the information enumerated is the user RID, privileges, login times, login dates, account expiration date, network storage limitations, login hours, and much more.
  3. An attacker uses this information for social engineering phase of an attack.
  4. Establish a NULL session
  5. From command prompt type the following syntax: userinfo \\Target IP Address Target Username
  6. Result with USERINFO are identical to the USERDUMP application. Both tools use the NetUserGetInfo API windows call.

Learn How to Enumerate User Information from Target using USERDUMP

  1. The USERDUMP application gather the user information from the target system.
  2. Some of the information which can be enumerated is the user RID, privileges, login times, login dates, account expiration date, network storage limitations, login hours, and much more.
  3. First establish a NULL session
  4. From a DOS prompt type the following syntax: userdump \\Target IP Address Target Username
The results reveal the following username Administrator details:
  • The User ID is 500. (This tells us that this is indeed the real Administrator account.)
  • The user’s password never expires.
  • The Administrator last logged in at 12:44 a.m. on January 16, 2004.
  • The account has had 9 bad password attempts.
  • The Administrator has only logged in to this computer 2 times.
  • The PasswordExp is set to 0. (This tell us that the password never expires.)
  • The logon hours are all set to 1. (This tells us that the Administrator can log in 24/7.)
  • Other information.

Sunday, December 27, 2009

United States finally appoints new Cybersecurity Coordinator: Mr.Howard Schmidt

The White House announced on Tuesday the appointment of former eBay Chief Security Strategist Howard Schmidt to the post, after six month of President Barack Obama pledged to appoint a cybersecurity advisor.He will also work closely with his economic team to ensure that our cybersecurity efforts keep the nation secure and prosperous.

In 1967, Schmidt joined the Air Force and served in a variety of capacities until 1983, when he joined the police force in Chandler, Arizona, according to an online biography. In 1994, he served as a computer-forensics investigator for the FBI's Drug Intelligence Center and has served in similar capacities for the U.S. Air Force and the U.S. Army Reserves. He subsequently spent five years at Microsoft as the chief security strategist, leaving to join the Bush administration as Special Advisor to the President for Cybersecurity in 2001. He returned to the private sector in 2003, joining eBay as chief security strategist.

Since leaving eBay in 2005, Schmidt has worked in a number of different posts, including at the U.S. Department of Homeland Security.

The President was personally involved in the selection of Mr. Schmidt, and that he will have regular and direct access to the President for cybersecurity issues.

Clarke is the chairwoman of the House Committee on Homeland Security's Subcommittee on Emerging Threats, Cybersecurity and Science and Technology, which legislates many cybersecurity issues.

In May, the president released a review of the nation's cybersecurity policies and established the post of Cybersecurity Coordinator. Since then, numerous security professionals had refused the post.

SOURCE: www.securityfocus.com

Learn How to Enumerate the Username from the Known SID SID2USER

  1. Certain RIDs are static. The SID2USER application is used to enumerate the username from a given SID regardless of what the account may have been renamed.
  2. Establish a NULL session and initiate a query against the target.
  3. From the directory containing the sid2user executable establish a NULL session.
  4. From a DOS prompt, type the following syntax: sid2user <\\Target IP Address> SID RID
  5. The computer name is optional with this utility. If none is given the local computer is used.
  6. User accounts that carry the same RID regardless of what the account has been renamed to are shown here:
Username RID
Administrator 500
Guest 501
User Accounts 1000 +

From the diag, it is clear that: The username for that RID is actually the Administrator account and The target resides in the WIN2000S-V domain.


On the target computer the Administrator account has been renamed to Kermit.


  • Now when the SID2USER application is run against the target: The renamed Administrator account of Kermit has been identified by the RID of 500.
  • The RID for the real Administrator account will always be 500 regardless of what the account is renamed to.
  • As before, the target resides in the WIN2000S-V domain.


Learn How to Enumerate the SID from the Username USER2SID

  1. Every account on a Windows computer has a Security Identifier (SID).
  2. SIDs are static for the machine the user accounts are installed on.
  3. The USER2SID application is used to enumerate the SID from a given username.
  4. Once the SID has been identified the username can be enumerated regardless of what the user account has been renamed.
  5. First establish a NULL session. then type the following syntax in command prompt: user2sid <\\Target IP Address> account name
  6. The computer name is optional with this utility. If none is given the local computer is used.
  7. In this example the username of the Administrator, has a SID of 5-21-1220245398. (The S-1 and number at the end, in this case 500, is not part of the SID.) Is in the WIN2000S-V domain.
  8. The 500 is known as the Relative Identifier (RID) and is ALWAYS 500 on a Windows computer.

Learn How to Enumerate MAC Address and Total NICs using GETMAC

  1. The GETMAC application is used to identify the Media Access Control (MAC) address assigned to each network card (NIC) of the target.
  2. GETMAC application will also identify the total number of NICs in the target.
  3. Establish NULL session first
  4. Then from a command prompt, type the following with the syntax of: getmac IP Address
  5. The target MAC addresses have been identified as well as the total number of NICs. In this case, two NICs have been identified as shown in the below fig.
  6. In this case, the target has the following MAC addresses for each identified NIC:
NIC 1: 00-0C-29-A3-E4-40
NIC 2: 24-C8-20-52-41-53

Learn How to Establish a NULL Session

  1. The NULL session is used on Windows computers via the Inter-Communication Process (IPC$) to allow the viewing of shared resources.
  2. This connection is made without a username or password.
  3. An attacker will use the NULL session to enumerate user information from the target.
  4. From command prompt enter the following syntax: net use \\Target IP Address\IPC$ ""/u:""
  5. When successful, the result will show The command completed successfully and this is not logged in the System Event Log.

Dumpster Diving and Personnel are strong Social Engineering Techniques

  • An attackers can easily retrieve the companies consider sensitive information thrown out daily in the normal garbage cans
  • One can literally climbing into the company dumpsters and pilfering through the garbage
  • Critical information such as names, Social Security numbers, addresses, phone numbers, account numbers, balances, and so forth is thrown out every day somewhere.
  • So many companies are still uses carbon paper in its fax machine. Once the roll is used up they simply throw the entire roll in the dumpster. The information on that roll is priceless, including names, addresses, account numbers, phone numbers, how much they actually pay or take, and so forth.
  • Another social engineering attack that also proves to be very successful is not to verify the personnel credentials - when an attacker dresses in the uniform of those personnel considered “honest” and “important” or even “expensive.” For example; an attacker purchases/steals the uniform of a carrier, telephone, or gas or electric employee and appears carrying boxes and/or clipboards, pens, tools, etc. and perhaps even an “official-looking” identification badge or a dolly carrying “equipment.” These attackers generally have unchallenged access throughout the building as employees tend to see “through” these types of people.
Newer Posts Older Posts Home