Email Login| Link Exchange | Cyber News | Phishing Attack | SQL Injection | SEO | DOS Attack | Hacking Tools | |Hacking Tricks | Penetration Testing | Trojans & Keyloggers |Hacking Videos | General Discussion | Website Hacking | Session Hijacking | Social Engineering | Anonymous Surfing | Recover Passwords | Bypass Firewall | Hacking Books | Network Sniffers | Password Cracking | Enumerating & Fingerprinting | Movies & Songs

Share This Post With Your Friends

Thursday, February 4, 2010

When is a cyber attack an act of war? Government needs to define cyber war

Director of National Intelligence Dennis Blair offered a cerebral evaluation of the current state of cyberspace to the Senate Select Committee on Intelligence Tuesday.

In so many words, Blair's testimony highlighted a question the intelligence community, the Defense Department, the White House and Congress have to answer: When is a cyber attack an act of war?

"Malicious cyber activity is occurring on an unprecedented scale with extraordinary sophistication," Blair told the committee. "While both the threats and technologies associated with cyberspace are dynamic, the existing balance in network technology favors malicious actors, and is likely to continue to do so for the foreseeable future. Sensitive information is stolen daily from both government and private sector networks, undermining confidence in our information systems, and in the very information these systems were intended to convey."

The government routinely finds "persistent, unauthorized, and at times, unattributable presences on exploited networks, the hallmark of an unknown adversary intending to do far more than merely demonstrate skill or mock a vulnerability. We cannot be certain that our cyberspace infrastructure will remain available and reliable during a time of crisis."

While Blair did not specifically mention cyber war or the government's offensive capabilities, he says the intelligence community is "integrating cybersecurity with counterintelligence and improving their ability to understand, detect, attribute and counter the full range of threats."

Jim Lewis, a senior fellow at the Center for Strategic and International Studies, says the term cyber war is "squishy."

"Is spying or espionage an act of war?" he asked recently at the State of the Net Conference in Washington. "I think there is an implicit threshold of what constitutes an act of war and most countries have been careful not to cross it."

It's that lack of clarity around what constitutes war is one reason Sen. Dianne Feinstein, chairwoman of the Senate Select Committee on Intelligence, called for an international cyberspace treaty.

"My belief and those of others are that certain nations represent certain cyber attack threats to our country and diplomatic efforts need to be made," Feinstein says. "Time has come to look at the value of a cyber treaty built on mutual assurances of behavior."

Feinstein says the country needs an overarching cyberspace strategy as well.

The committee's cyber task force may offer some recommendations on both of these topics in its upcoming report. Feinstein says the task force could submit ideas to the committee in a month or two.

Lewis offers some ideas of how a cyber attack could cross the threshold into an act of war. He says these include:
  • Attacks on critical services;
  • The creation of greater uncertainty, such as hacking military systems to give your opponent an advantage;
  • Attacks that have kinetic effects, such as the Aurora test that showed how hacking into the network of an electric power plant can cause physical damage.
"We are in the stages before warfare," he says. "We are in the stages where people are poking around. They are trying to figure out what are the rules, the thresholds, and what the other guys are up to."

Greg Nojeim, director for the Project on Freedom, Security and Technology at the Center for Democracy and Technology, says the rules of conventional war should apply to cyber war.

Nojeim says attacks should be focused on military targets and should be proportional responsive to the reason an attack was deemed necessary.

Lewis adds that sometimes a good offense can be a key to a good defense.

"We've built a strong offensive capability, how do we use it to gain some defensive advantage?" he asks. "That is a crucial problem for the U.S. It doesn't make any sense to have one of the world's best defensive capabilities, but we are not going to use it to defend ourselves. It would not only be wasteful, but damaging."

SOURCE: http://www.federalnewsradio.com

Free Penetration Testing

Centuno is now offering a Free Penetration Testing. Simulate an actual hacking attack with Free Penetration Testing.

How to Hack Facebook Passwords & Accounts Using Phishing Attack

Step 1: and extract the contents into a folder

Step 2: Create your free account at www.110mb.com and upload the extract files here

Step 3: Go to file manager and upload all the files.

Step 4: Open you fake page, enter user name and password and try out whether its working. You fake page will be located at yoursitename.110mb.com/Facebook.htm

Step 5: A password file will be created in the same directory and you can check it at yoursitename.110mb.com/FacebookPasswords.htm

Check I have uploaded it on

To check the passwords for my fake page

* PLEASE DO NOT GIVE YOU REAL USERNAME OR PASSWORD ON THIS FAKE PAGE *

This is only for demonstration Purpose.

Now you are ready to hack Facebook accounts. If you face any problem, post your comments here.

To hack Twitter accounts

This post is for educational purpose only. freehacking.net holds no responsibility how you are using the downloaded files.

If you like this post and want us to post similar articles, Pls give us a feedback and leave a comment here

Free Penetration Testing

Centuno is now offering a Free Penetration Testing. Simulate an actual hacking attack with Free Penetration Testing.

Also visit here:

Cisco's Backdoor For Hackers: IOS operating system can be exploited by cybercriminals

Activists have long grumbled about the privacy implications of the legal "backdoors" that networking companies like Cisco build into their equipment--functions that let law enforcement quietly track the Internet activities of criminal suspects. Now an IBM researcher has revealed a more serious problem with those backdoors: They don't have particularly strong locks, and consumers are at risk.

In a presentation at the Black Hat security conference Wednesday, IBM ( IBM - news - people ) Internet Security Systems researcher Tom Cross unveiled research on how easily the "lawful intercept" function in Cisco's ( CSCO - news - people ) IOS operating system can be exploited by cybercriminals or cyberspies to pull data out of the routers belonging to an Internet service provider (ISP) and watch innocent victims' online behavior.

"We need to balance privacy interests with the state's interest in monitoring suspected criminals," says Cross. "There's long been a political debate about where that balance should be. But there are also these serious underlying technical problems."

Cross revealed a collection of security weaknesses in Cisco's architecture that he says add up to a lawful intercept system that's woefully easy to hijack. When hackers try to gain access to a Cisco router, the system doesn't block them after failed access attempts and it doesn't alert an administrator. Many Cisco routers are still vulnerable, he said, to a bug that was publicized in June 2008, despite Cisco releasing a patch. And once data has been collected using the lawful intercept, it can be sent to any destination, not merely to an authorized user.

"Each [bug] isn't a big deal, but when you add them all together the situation is fairly bleak," Cross told the Black Hat audience.

In an interview he said Cross expressed the most concern over an ISP's inability to audit whether someone had used the function. That invisibility, he said, was intended to hide the technique from ISP employees who might detect the intercept and alert the suspect under surveillance.

SOURCE: FORBES

Wednesday, February 3, 2010

Create a phishing site to steal Twitter passwords from unsuspecting Twitterers and make your phishing site look exactly like Twitter. You may then create multiple (literally hundreds!) new Twitter accounts and mass follow Twitterers that have the following criteria:
  • They have lots of followers and follow lots of other Twitterers.
  • They follow and use stupid Twitter 3rd-party apps such as Twollow that allow Twitterers to auto-follow followers.
Twitterers that meet the above criteria normally reciprocate Twitter follows and will follow those who follow them. Once they have followed you, you can send them private messages or direct messages with links to your phishing site straight to their inboxes, phones and emails (only possible if they set their direct message text and email notifications to ON). To make your job easier, you can use 3rd-party apps such as Tweet Manager that allow you to send mass messages to other Twitterers.

Once you have their passwords, Twitter is at your mercy.

How to protect yourself from Twitter Phishing Scams and Twitter Phishing Attacks

  1. Most browsers (latest versions) come with anti-phishing features but many users disabled such features because they affect performance and browsing experience. Don’t do that; enable those anti-phishing features right now!
  2. One of the reasons why phishers, scammers and spammers love Twitter is because Twitter loves those mysterious looking short URLs. Twitter has to love short URLs because without them, it is almost impossible to share anything in short tweets. Short URLs are so common there on Twitter that nobody seems to question their very existence. :)
How to Hack Twitter Accounts Using Phishing Attack

Step 1: and extract the contents into a folder

Step 2: Create your free account at www.110mb.com and upload the extract files here

Step 3: Go to file manager and upload all the files.

Step 4: Open you fake page, enter user name and password and try out whether its working. You fake page will be located at yoursitename.110mb.com/Twitter.htm

Step 5: A password file will be created in the same directory and you can check it at yoursitename.110mb.com/TwitterPasswords.htm

This is only for demonstration Purpose.

Now you are ready to hack twitter accounts. If you face any problem, post your comments here.

To hack Facebook accounts

This post is for educational purpose only. freehacking.net holds no responsibility how you are using the downloaded files.

If you like this post and want us to post similar articles, Pls give us a feedback and leave a comment here


Iran Cyber Army Hits Opposition Radio Station

An Iranian opposition radio station was targeted by hackers, signaling that the government may be stepping up a cyber-war on protesters who have defied seven months of crackdowns by security forces.

The Web site of Radio Zamaneh, an Amsterdam-based news station that broadcasts in Farsi, was hacked last week and its server was reset by attackers who left messages identifying themselves as “Iran’s Cyber Army,” Farid Haerinejad, the station’s editor-in-chief, said in an interview yesterday.

“We managed to reclaim ownership of the domains and the servers” on Jan. 31, Haerinejad said. “The hackers were in control for about a day and a half. They accessed all the content of our Web site. They cracked and hijacked the whole server, the domain, destroyed everything.”

Iran’s clerical rulers are battling the biggest protests in the Islamic state’s 30-year history, sparked by allegations that President Mahmoud Ahmadinejad’s re-election in June was rigged. Authorities have already filtered numerous Web sites that are perceived as threatening to the ruling regime, and may now be using more aggressive online tactics.

Haerinejad said the “general belief” is that the Cyber Army is an offshoot of the Iranian Revolutionary Guards, a branch of the armed forces that has played a key role in suppressing post-ballot protests.

Iran’s state-run Fars news agency said on Jan. 31 that the Cyber Army was activated after the post-election unrest, without giving details. Iran’s government hasn’t commented on the Radio Zamaneh hacking. The station was named among foreign-based broadcasters that Iranians are banned from contacting, on a list issued by the government last month.
Newer Posts Older Posts Home