Email Login| Link Exchange | Cyber News | Phishing Attack | SQL Injection | SEO | DOS Attack | Hacking Tools | |Hacking Tricks | Penetration Testing | Trojans & Keyloggers |Hacking Videos | General Discussion | Website Hacking | Session Hijacking | Social Engineering | Anonymous Surfing | Recover Passwords | Bypass Firewall | Hacking Books | Network Sniffers | Password Cracking | Enumerating & Fingerprinting | Movies & Songs

Friday, March 12, 2010

How to bypass anti virus? Make Keylogger and Trojan Fully Undetectable (FUD) using Xenocode

This article has been posted by our fellow members Mr.Amey Anekar, Mr.Rahul and Mr Sachin.

Well making a trojan is very easy now-a-days by using tools such as lostdoor, poisonivy, etc. But the real challenge is to pass the trojan a system's antivirus. Here's a post on the same. Here we used a virtual application creator, Xenocode, which is famous for creating portable applications. It kinda encrypts our trojan and further if we bind our trojan with another exe, it is bound to be executed by the victim. I'll surely post on binding in my next post.

The encrypted trojan does not match with the virus definitions in the antivirus and hence is rendered undetected.

Also I would like to tell you that we are working on making our own video tutorials. We have already downloaded Camtasia Studio for that purpose.. So very soon we'll be posting video tutes narrated in by me. I'll surely mail you the link as soon as we upload any such tut.

The video tutorial for how to use this tool is

Make Trojan Fully Undetectable (FUD) using Xenocode

A few weeks before, we had posted on how you can make your trojan using LostDoor. But the problem with the so formed trojan is it being detected by almost all AV softwares. We know that after learning to make your own trojan, the next thing you must've exhausted your bandwidth searching for is: "How to make a Trojan undetectable?" Well here is the answer.

First of all you'll have to download Xenocode (Never heard of it? Google it. This may help you..http://www.xenocode.com/Technology/)
Xenocode is a set of application virtualization and portable application creation technologies developed by Code Systems Corporation. Applications are packed into single executable files that can be executed instantly on any Windows desktop (so called "portable apps"). The technology therefore emulates only the operation system features that are necessary for the application to run. Applications can be deployed using existing infrastructure, software deployment tools, the web or USB keys. The virtualized application runs independently from other software that is installed on the host PC so there are no conflicts between different versions or DLL files.

Well, reading the above introduction must've got you acquainted you with xenocode application. You might be wondering, how this application will help you in making your Trojan undetectable.

Xenocode creates a virtual operating system for processing the files you have virtualized and hence it completely overwrites your code. As you may know, AV softwares use virus signatures to identify viruses. There are ways in which you can make a trojan undetectable by modifying the Hex code, but it is very tedious. Using xenocode alleviates the pain to a negligible level. The only pain you will have is to grab a full version of the application. Keep in mind that trial version xenocode does not create virtual applications. When you will click on the build button, it will prompt you to purchase license. We hope you understand what we mean to say implicitly.

After you download xenocode, give your trojan as the input. Now click on the build button and then specify the location where the output file must be saved. The so formed file is your undetecable Trojan. You can try scanning it with your local AV. Or if you wanna see how far you've gone, upload the file on http://scanner.novirusthanks.org/. It will provide you results after scannig your file with 20 different AV. Our score for this test was 0 outa 20. No AV detected it and the file still works fine.

Full Version Xenocode download link :- http://bit.ly/djy2ol

Mirror download link

The video tutorial for how to use this tool is

If you face any problem while using this tool OR find any broken link on this blog, report it to us on . You can also leave a comment here.

Too lazy to say Thanks or comment here? Why not too lazy to read my post?? If you like this post and want us to post similar articles, Pls give us a feedback and leave a comment here.

Types of Ethical Hacking: A step by step explanation video tutorial


This video has been posted by one of our fellow member. Find all members list here

Too lazy to say Thanks or comment here? Why not too lazy to read my post?? If you like this post and want us to post similar articles, Pls give us a feedback and leave a comment here.

Thursday, March 11, 2010

What is Ethical Hacking: A step by step explanation video tutorial


This video has been posted by one of our fellow member. Find all members list here

Too lazy to say Thanks or comment here? Why not too lazy to read my post?? If you like this post and want us to post similar articles, Pls give us a feedback and leave a comment here.

Is The India Ready For A Cyberwar ?? All major sectors like government, military, infrastructure and international businesses contains huge RISK

The year is 2017 and two rival countries - India and China - are fighting a war. The conflict is not being fought with guns, tanks and aircraft but computers, bots, viruses and Trojans. The soldiers are not troops, but hackers.

The scenario was enacted by the Indian military last year in a cyber-warfare simulation called the "Divine Matrix". Officially, the likelihood of a Chinese cyber-strike has since been played down. This is a big mistake, experts say, given the poor state of India's cyber-security.

Cyber-attacks rise globally, India is emerging as an easy hunting ground. Worse, the vulnerability not only poses a threat to the government, military, and infrastructure, it also carries a huge risk for international businesses that have outsourced IT operations or bought software in India.

India could be used as a route to attack the IT systems of other countries, since it is linked to important networks like the United States' financial sector. "Cyber-criminals could take advantage of the vulnerability in the IT security systems here and cripple financial services there.

Greg Walton, one of the researchers at The Citizen Lab at the University of Toronto that created a sensation last year by discovering the existence of GhostNet, a global cyber-spy network that allegedly originated in China, said India was particularly vulnerable.

"If you look at the statistics of the institutions or the targets that were attacked by GhostNet when it attacked global systems, India was by far the hardest hit by that operation," he said. "India is a software superpower yet for some reason the country can't seem to get its cyber-security act together."
Legally, India is also seen as an easy target. "The Indian IT act and related local laws are oriented towards primarily addressing fraud and copyright violations; they are not security oriented," said Gurmeet Kanwal, founder-director of The Center for Land Warfare Studies, an autonomous think-tank on strategic studies and warfare.

The other major issue is cost. Indian is touted as a low-cost outsourcing destination and "security is always an expensive proposition. Often Indian service providers cannot adopt security measures that on a par with international standards."

Too lazy to say Thanks or comment here? Why not too lazy to read my post?? If you like this post and want us to post similar articles, Pls give us a feedback and leave a comment here.

How can you secured your networks to make online security more robust? What is the current security solution you can use.

Security is a concern for everyone. Security concerns include perimeter security, securing websites, right access defined and segregation of duties, so that users have access to only what is relevant to them.

Online security is important in the financial sector; thus, you need to exploring the best value, not only in terms of money, but services and technology as well.

Internal security team is also required and group expertise is equally important. Apart from that, you must have very rigorous information security policies and fall back on experts, both internal and external to help implement them.

Some of the new technology solutions you can implemet are cloud computing, virtualization and service-as-a-model.

You can also introduce new green IT concepts, which will help in reducing power consumption, cooling, data center, office designing and other data technologies.

Too lazy to say Thanks or comment here? Why not too lazy to read my post?? If you like this post and want us to post similar articles, Pls give us a feedback and leave a comment here.

Pennsylvania fires CISO, Robert Maley, over RSA talk: Terminated for disclosing security incident

Pennsylvania's chief information security officer, Robert Maley, has been fired, apparently for talking publicly at the RSA security conference last week about a recent incident involving the Commonwealth's online driving exam scheduling system.

A source close to the matter said Maley was terminated for not getting the required approvals from the Commonwealth's authorities to talk publicly about the incident.

Commonwealth rules explicitly require all employees to get approval from the appropriate authorities before they publicly disclose official matters, the source said.

A spokesman for the state's governor, Edward Rendell, today confirmed that Maley is no longer working for the Commonwealth. But he refused to say if Maley had been terminated, citing privacy rules.

Maley, who was Pennsylvania's CISO for more than four years, was part of a RSA conference panel discussing state cybersecurity issues last Thursday.

During the discussion, Maley talked about a recent incident involving a Philadelphia-area driving school that was trying to get early driving tests for its students. The source said someone at the school exploited a configuration "anomaly" in the Department of Transportation's online driver's test scheduling system.

The vulnerability allowed the school to essentially cut the line and schedule "a whole bunch of driver's license exams" for its students, the source said.
The incident was reported to the state police, and the matter is currently under investigation, the source said.

Danielle Klinger, a spokeswoman for Pennsylvania's Department of Transportation, confirmed today that a problem had been uncovered in the driver test scheduling system, and that the matter has been turned over to state police.

However, she contested several media reports that have described the incident as a hacking attack, and said that as far as the the department was aware, there had been no hack or breach of the system.

Maley's dismissal comes amid ongoing budget and staff cuts at Pennsylvania's IT security organization, the source said. Over the past 18 months to two years, the administration has cut information security budgets by close to 38%, and staff by 40%. They also put a "lockdown" on talking about cybersecurity, the source claimed.

This news has been posted by Jaikumar Vijayan. His e-mail address is .

Too lazy to say Thanks or comment here? Why not too lazy to read my post?? If you like this post and want us to post similar articles, Pls give us a feedback and leave a comment here.

Wednesday, March 10, 2010

Microsoft has pulled the release of Windows 7 Service Pack 1

Microsoft has pulled the release of Windows 7 Service Pack 1 forward to the final quarter of this year, according to a speculative report.

The company hasn't officially announced when it plans to squirt out SP1 for its current operating system, but that hasn't stopped the rumours from swirling around the interwebs.

The latest speculation comes courtesy of Malaysian website TechARP.com, which cites sources that claim Windows 7 SP1 will land by the end of 2010.

TechARP has been bang on the money in the past about when a Microsoft Windows service pack would rock up for both XP and Vista, so given its remarkably good sense of smell around Redmond's roadmaps it might be fair to assume that this rumour could prove accurate too.

In January, a tech blogger discovered a Windows Registry Key that pointed to SP1 of the operating system. As a result some people concluded that Microsoft was planning to push out a service pack for Windows 7 soon.

In response to the rumours earlier this year, Microsoft told us: "There is currently no news around this at the moment."

Whether that canned statement will change in light of the latest speculation remains to be seen, however.

As we've noted previously, Microsoft has a well-established lifecycle for its Windows-based service packs. It took the software vendor 14 months to release SP1 for its bug-ridden, driver support-shy Vista OS.

There's no reason why Microsoft would speed up its own self-imposed deadline for its much better received - though still not watertight - Windows 7 operating system.

SOURCE: http://www.theregister.co.uk

Too lazy to say Thanks or comment here? Why not too lazy to read my post?? If you like this post and want us to post similar articles, Pls give us a feedback and leave a comment here.

Internet Security Problems Solved - A New Internet Security Group Defeats CyberCrime in West Virginia

Attacking Cyber Crime with proven NSA Information Assurance strategies, a new internet security group start up is enforcing cyber security in West Virginia. Personal Phishing attacks and Corporate Botnets do not stand a chance.

Internet SecuritT Group of Charleston, West Virginia, a niche professional cyber security services company, is providing local WV businesses and consumers with defense-in-depth, layered Internet security risk management services; addressing security vulnerabilities in personnel, technology and operations.

When asked what makes the Internet SecuritT Group different from other technology companies, Chief Internet Security Officer (CISO) Troy Lilly states, "The Internet SecuritT Group has a uniquely focused Internet security strategy, which brings comprehensive holistic cyber threat mitigation to common businesses and consumers which typically could not, or would not, hire a full time Internet Security Officer". Troy further states "West Virginia's industry offers very few if any professionally focused, Internet security service oriented companies".

SOURCE: http://www.prweb.com

Too lazy to say Thanks or comment here? Why not too lazy to read my post?? If you like this post and want us to post similar articles, Pls give us a feedback and leave a comment here.

Tuesday, March 9, 2010

Chicopee's municipal website is up and running after being Hacked: Hackers were from Argentina

Chicopee's municipal website is up and running after being temporarily compromised by hackers from Argentina. Mayor Michael Bissonnette said no critical information was leaked.

Everyone worries about their personal computers being hacked, but it can also happen to large municipalities. Chicopee found that out this weekend.

The city's website was successfully hacked from Argentina on Sunday morning. Chicopee Mayor Michael Bissonnette said no critical information was compromised, due to the purely informative nature of the website.

"It really is a public access point," said Mayor Bissonnette, "so there is little damage other than some temporary inconveniences that can be done by hacking the website itself."

Records show that website was hacked around 2AM Sunday morning. At 9:30AM the error was recognized by the city and temporarily shut down the website. Things were back up and running just an hour and a half later.
All of the city's private data is located on another network, which was not affected. Security systems prevented the hackers from getting into the municipal network.

"The hackers made over 200 attempts to try to crack our firewall to get into our main servers and they were rejected." said Mayor Bissonnette. "I'm confident that the system and firewalls have secured all the proprietary information, all our financial data, and all the personal identifying information that we contain in the municipal system."

Mayor Bissonnette says at this day in age, cyber attacks like these are the new form of graffiti.

"Twenty years ago these guys would be out spray painting buildings and putting their logos on the side of railroad cars." said Mayor Bissonnette. "But today with the computer and wire to the internet, anybody can go anywhere anytime."

As for Chicopee's website, which was newly renovated last April, everything is up and running again. Mayor Bissonnette said this was a good test for the municipality's firewalls, and serves as a good lesson for the future.

"We've added a couple new security teaks for the website itself." said Mayor Bissonnette. "It just goes to show you never can be too careful, and you never know where the next internet pirate's coming from."

SOURCE: http://www.cbs3springfield.com

Too lazy to say Thanks or comment here? Why not too lazy to read my post?? If you like this post and want us to post similar articles, Pls give us a feedback and leave a comment here.

Monday, March 8, 2010

How to hack email, yahoo, orkut, myspace and gmail account passwords. Download free email password hacking software. List of Underground hacking sites

Free Penetration Testing

Centuno is now offering a Free Penetration Testing. Simulate an actual hacking attack with Free Penetration Testing.

Readers, the below is basically not related to security. I have received huge number or emails from readers of this blog regarding all such script kiddie tools and softwares. Every thing already available on net free of cost so I have not seen any harm in sharing of all these links. USE IT AT YOUR OWN RISK.

I have found below cited blogs/sites/forums related to hacking and cracking, which I would like to share. These blogs contains all stuff like how to hack email account password, How to create a Phishing page and how to hack gmail, orkut, myspace, facebook, twitter and many other websites account passwords. I have also mentioned few of links from freehacking.net itself.

You can also get the free password hacking softwares to download. Be careful before downloading. I am mentioning those website links here does not mean I have tested all those tools. I am taking no responsibility of those Techniques tools and softwares. All the softwares detected as Trojan and virus by antivirus, so you have to use it on some system which is not having any antivirus. Also don't use you real email id password while doing testing. Create a fake account first and use it.

  • List of all underground hacking websites: Hacker Top Sites. To visit click here
  • Download free Anonymous mailer software, Send anonymous email. DOWNLOAD HERE
Password for rar file is: techotips.blogspot.com
To know how it works, visit here
Password for rar file is: techotips.blogspot.com
To know how it works, visit here

Password for rar file is: techotips.blogspot.com
To know how it works, visit here

  • How does an attacker installed any trojan on the victim's computer? How to bypass antivirus ? Answer: Using Wrappers. To know more click here
  • Which are various back doors, Trojans and Key loggers available and how they work? To Get a complete guide regarding all famous back doors...click here
  • How you can spread you Trojan, virus OR keylogger on network or internet ? To know which all are various modes of transmission..CLICK HERE
  • How many different types of trojans, backdoors and keyloggers are available on internet.. To know CLICK HERE
  • To know working of trojan OR how trojan works..CLICK HERE
  • How to Hack Facebook Account Passwords Using Phishing Attack..
  • How to Hack Twitterl Account Passwords Using Phishing Attack..
  • How to hack facebook using Facebook Freezer. To download the software
  • A very good source to download free Keyloggers, Trojans and password stealer's. CLICK HERE

Free Penetration Testing

Centuno is now offering a Free Penetration Testing. Simulate an actual hacking attack with Free Penetration Testing.

How to Spoofing IP Addresses: Learn how to create custom IP packets Using tool RafaleX and Engage Packet Builder

The RafaleX application allows for the creation of custom IP packets. The packet is very customizable and allows for the spoofing of the IP, setting the flags, number of packets, and so forth. RafaleX is becoming hard to locate on the Internet as it appears it is now called Engage Packet Builder.

The RafaleX application is an excellent way to “spoof” custom packets. Attackers can place a valid IP address as the source of the packet and the target will have to attempt to respond to the spoofed address. By sending hundreds of thousands of packets in this manner, an attacker can create a Denial of Service attack against a target.
In this example, the Source IP of the packets to be sent is set to 10.10.10.10 with the source address of port 123. According to Internet etiquette, this should never be able to route on the Internet as the 10.x.x.x range is reserved for Private addressing. Set the destination IP to the target address. In this example it is 172.16.1.40. Set the Destination
port to port 21. The SYN and ACK flags were set for each packet.

*Note: The Ethernet communications process requires a three-way handshake:

SYN: Synchronize
SYN-ACK: Synchronize-Acknowledge
ACK: Acknowledge

When a computer receives an uninitiated SYN-ACK packet its response is to send a RST (Reset) packet.
The number of packets was set to 100. Click the Send button to send the packets to the target. The Status area at the bottom left of the application will tell you that the packets were sent.

The proof is below screen shot captured from packet capturing tool




Too lazy to say Thanks or comment here? Why not too lazy to read my post?? If you like this post and want us to post similar articles, Pls give us a feedback and leave a comment here.

Hackers and Viruses Threaten online voting Validity

This article has been posted by Michael Geist 15 minutes ago. He holds the Canada Research Chair in Internet and E-commerce Law at the University of Ottawa, Faculty of Law. He can be reached at or online at www.michaelgeist.ca.

With the increasing shift from analog to digital, some elections officials are unsurprisingly chomping at the bit to move toward Internet-based voting. Last year, Elections Canada officials mused about the possibility of online voting trials, noting the potential benefits of increasing voter participation, particularly among younger demographics.

More recently, the province of Alberta opened the door to incorporating new technologies into their voting processes as part of an electoral reform package.

New trials would require the approval of a legislative committee, but the province's Chief Electoral Officer acknowledged that online voting may be coming, noting "online voting is something that's on the forefront of people's minds ... people say, 'I can do my banking online, but I can't do my voting online.' "

The enthusiasm for Internet voting is understandable. At first blush, there is a certain allure associated with the convenience of Internet voting, given the prospect of increased turnout, reduced costs and quicker reporting of results. Moreover, since other security sensitive activities such as banking and health care have gravitated online, supporters argue that elections can't be far behind.

Yet before rushing into Internet voting trials, the dangers should not be overlooked.

Democracy depends upon a fair, accurate and transparent electoral process with outcomes that can be independently verified. Conventional voting accomplishes many of these goals – private polling stations enable citizens to cast their votes anonymously, election-day scrutineers offer independent oversight and paper-based ballots provide a verifiable outcome that can be re-counted if necessary.

While technology may someday allow us to replicate these essential features online, many of them are currently absent from Internet voting, which is subject to any number of possible disruptions. These include denial-of-service attacks that shut down the election process, counterfeit websites, phishing attacks, hacks into the election system or the insertion of computer viruses that tamper with election results.
These concerns are based on real-world experience. The Internet Corporation for Assigned Names and Numbers (ICANN), the organization that administers the domain name system, ran an online board of directors election in 2000. The experience was fraught with technical difficulties, leading a reviewer to conclude "the technical weakness in the registration system made it virtually impossible to assess the integrity of the voters' list, the security of the PINs, and secrecy of vote."

More recently, the Netherlands used Internet voting as part of its 2006 parliamentary elections. The online option was an alternative for Dutch citizens working or living abroad. Nearly 20,000 valid Internet votes were received at a cost of approximately 90 euros per Internet voter. Two years later, the country implemented a ban on Internet voting.

The Canadian experience is limited primarily to municipal elections. Several Ontario municipalities have offered Internet-based voting, enabling local residents to vote without leaving their homes. Residents were required to pre-register for Internet voting and were provided with detailed instructions on the technical requirements to "vote anywhere."

Caution on Internet voting appears prudent, since experts have identified a long and costly list of necessary precautions, including random spot checks and post-vote verification programs to preserve anonymity. Given the security risks, opening the door to provincial or federal Internet voting seems premature. In the zeal to increase voter turnout, the reliance on Internet voting could inadvertently place the validity of the election process at risk.

SOURCE: http://www.thestar.com

Too lazy to say Thanks or comment here? Why not too lazy to read my post?? If you like this post and want us to post similar articles, Pls give us a feedback and leave a comment here.

Are you getting Tweets on weight-loss ? Beware..It is a hacking attempt to your twitter account

It seems as though good advice regarding Twitter at the moment is that whatever you do, don’t click on the links if you are Tweeted about weight loss plans. Apparently hundreds of Twitter accounts have been hacked in to with these Tweets.

It all goes to show that weight loss is a thriving industry at the moment, when not only do we receive spam e-mails about it, but now it has invaded social media too. According to Product-Reviews.net this goes to prove that spamming has been made simpler since Twitter search engine integration.

There are over 200 of these weight loss Tweets about at the moment, which when clicked, direct the user to a weight loss website. No Twitter user is immune to receiving these Tweets and at present nobody is sure how they have occurred.

One suggestion is that a third-party app may have been installed but it’s really too early to say. Have you or anybody you know received these weight loss Tweets yet, and how do you think they can be stopped?

SOURCE: http://www.onlykent.com

Too lazy to say Thanks or comment here? Why not too lazy to read my post?? If you like this post and want us to post similar articles, Pls give us a feedback and leave a comment here.
Newer Posts Older Posts Home