Email Login| Link Exchange | Cyber News | Phishing Attack | SQL Injection | SEO | DOS Attack | Hacking Tools | |Hacking Tricks | Penetration Testing | Trojans & Keyloggers |Hacking Videos | General Discussion | Website Hacking | Session Hijacking | Social Engineering | Anonymous Surfing | Recover Passwords | Bypass Firewall | Hacking Books | Network Sniffers | Password Cracking | Enumerating & Fingerprinting | Movies & Songs

Share This Post With Your Friends

Showing newest 19 of 25 posts from 04/18/10. Show older posts
Showing newest 19 of 25 posts from 04/18/10. Show older posts

Saturday, April 24, 2010

Blackhat Search Engine Optimisation (SEO) Techniques

How hackers exploit hot trending news stories using blackhat search engine optimisation (SEO) techniques to poison search engine results ??

Often this is with the intention of spreading scareware (also known as fake anti-virus attacks).

In fact, SEO poisoning is one of the major methods of attack that we are seeing being used by online criminals at the moment.
Fraser and Onur in our labs have written an excellent technical paper (PDF) which discusses the problem, and lifts the lid on how the bad guys are using automated kits to do their dirty work for them.


It's a great read. Check it out now.

McAfee False-Positive Attack: Exploited By Hackers

Criminals have been keen to take advantage of the critical update bug that affected McAfee users in the past few days.

A false-positive in McAfee's detection of the Wecorl.A virus caused hundreds of thousands of computers around the world to repeatedly reboot themselves, as the antivirus software mistakenly zapped the critical svchost.exe file.

To its credit, McAfee is discussing the problem on its online community forum, has apologized, withdrawn the buggy update, and advised customers on how to manually fix the affected computers.

But that hasn't stopped blackhat SEO hackers from creating poisoned Web pages that appear high in the search rankings if you hunt for information on the McAfee false-positive.

Clicking on one of these dangerous links can take you to a Website that harbors the Mal/FakeAV-BW scareware (also known as fake antivirus) attack, designed to trick you into believing you have a serious security problem on your computer -- and urging you to purchase or install other code from the hackers behind the scam.

If you have suffered from the false positive, then I suggest you visit McAfee's Website for advice -- and not to go clicking on unknown links.

More details about the fake antivirus attack associated with the McAfee false alarm can be found on this blog.

Friday, April 23, 2010

Windows XP Hacking Tricks Download EBook



DOWNLOAD HERE

Password: freehacking.net

If you face any problem, leave a comment here.

Google Hacks
By Paul Bausch, Tara Calishain, Rael Dornfest

Publisher: O'Reilly
Pub Date: August 2006
Print ISBN-10: 0-06-3
Print ISBN-13: 978-0-59-652706-8
Pages: 543

Everyone knows that Google lets you search billions of web pages. But few people realize that Google also gives you hundreds of cool ways to organize and play with information.

Since we released the last edition of this bestselling book, Google has added many new features and services to its expanding universe: Google Earth, Google Talk, Google Maps, Google Blog Search, Video Search, Music Search, Google Base, Google Reader, and Google Desktop among them. We've found ways to get these new services to do even more.

The expanded third edition of Google Hacks is a brand-new and infinitely more useful book for this powerful search engine. You'll not only find dozens of hacks for the new Google services, but plenty of updated tips, tricks and scripts for hacking the old ones. Now you can make a Google Earth movie, visualize your web site traffic with Google Analytics, post pictures to your blog with Picasa, or access Gmail in your favorite email client. Industrial strength and real-world tested, this new collection enables you to mine a ton of information within Google's reach. And have a lot of fun while doing it:

  • Search Google over IM with a Google Talk bot
  • Build a customized Google Map and add it to your own web site
  • Cover your searching tracks and take back your browsing privacy
  • Turn any Google query into an RSS feed that you can monitor in Google Reader or the newsreader of your choice
  • Keep tabs on blogs in new, useful ways
  • Turn Gmail into an external hard drive for Windows, Mac, or Linux
  • Beef up your web pages with search, ads, news feeds, and more
  • Program Google with the Google API and language of your choice

For those of you concerned about Google as an emerging Big Brother, this new edition also offers advice and concrete tips for protecting your privacy. Get into the world of Google and bend it to your will!


Password: freehacking.net

If you face any problem, leave a comment here






Password: freehacking.net

If you face any problem in downloading, just leave a comment here.

How to Hack Mobile Phones & Reveal Mobile Phone Data

Researchers in the US have shown that owing to the way GSM mobile networks work, it's possible to track down the number of almost anyone, and find out where they are.

In what sounds like a stalkers dream, researchers built on information released in 2008 by Tobias Engel, showing how to gain access to mobile network databases in order to track mobile phones. This time, however, researchers from mobile security firm iSec Partners demonstrated that it was possible to track a single mobile phone user, even without knowing his or her number. They were also able to gain access to other information which most mobile users assume is secure.

Commenting on the revelation, Nick DePetrillo of iSec said:  "The scary thing is that you can give me a random cellphone number and I can tell you, usually, who owns it. So if I want to find Brad Pitt's number I can dump all the cellular phone caller ID information out of California and hunt for his number."

The hack works by utilising the GSM caller-ID system, tricking it into creating a full directory of almost every mobile number. Further crunching of that data then allowed the researchers to figure out which individuals are associated with what numbers; and furthermore access to the 'home location register' which allows mobile providers to find any handset in order to communicate with it. And because the hack uses base functionality of the network - i.e the ability to route calls and data to a handset regardless of its location, by knowing where it is, there is no way to restrict the information without preventing the network from doing its job.

Chris Paget, of reverse-engineering consultancy company H4RDW4RE commented: "They've discovered some pretty scary stuff. They looked behind the towers and found a whole other wrongness. You're literally down to the situation where you can't be secure unless you pull the battery out of your phone."

Hackers Selling 1.5 Million Social Networking Accounts

Cyber criminals are selling on data from social networking accounts to help the spread of malware and money scams.

Social networking accounts are a favoured target for cyber criminals, and a report released today has shown the crime is going global.

iDefense, the cyber security intelligence division of VeriSign, has discovered that more than 1.5 million account details are being put up for sale by hackers on just one online forum called “kirllos” as the black market for personal data continues to explode.

“The trend for harvesting information from social networking sites has been around for some time now, however cyber criminals typically limited their attacks to social media sites within their own geography,” said Rick Howard, director of intelligence at iDefense.

“However the increasing exploitation of users of popular international platforms is important as it signifies that criminals are becoming more and more internationalised – these sites provide a convenient platform for criminals to expand their trade around the globe.”

Prices for the data can vary depending on how many contacts the user has on their account, ranging from $25 (£16) per 1,000 accounts with 10 contacts or less to $45 for accounts with over 10 online friends.

Even accounts where the user has no contacts are still popular sellers as they can help with the spread of malware through friend finder tools and friend requests.

The data stolen can then enable criminals to commit money scams and data mining as well as start malware or spam campaigns.

Howard warned users of social networking sites to be vigilant with their privacy measures and to immediately report any unusual activity to the website in question.

SOURCE

PayPal Patches Critical Security Vulnerabilities

PayPal in the news again for a series of fairly high-profile vulnerabilities discovered by the same guy that found the XSS bugs in Google Calendar and Twitter (Nir Goldshlager).

The volume of monetary transactions that pass through their site on a daily basis is huge. It’s still the leading payment processing solution, especially for International transactions.

Seems to be more on the business side rather than effecting users, but exposing so much customer is never a good thing.

A security researcher has uncovered multiple vulnerabilities affecting PayPal, the most critical of which could have enabled attackers to access PayPal’s business and premier reports back-end system.

The vulnerabilities were patched recently by PayPal after security researcher Nir Goldshlager of Avnet
Technologies brought the vulnerabilities to the site’s attention. The most critical bug was a permission flow problem in business.paypal.com, and could have potentially exposed a massive amount of customer data.

“An attacker was able to access and watch any other user’s financial, orders and report information with unauthorized access to the report backend application,” Goldshlager explained. “When users have a premier account or business account the transaction details of their orders are saved in the reports application … an attacker can look at any finance reports of premier or business accounts in the PayPal reports application and get a full month [and] day summary of the orders reports.”

That includes information such as the PayPal buyer’s full shipping address, the PayPal transaction ID of the buyer and the date and amount of transaction.

It’s good to see responsible disclosure by the researcher and swift action on behalf of PayPal fixing the flaws. It seems pretty rare these days with the walls of bullshit companies push our via their PR/comms channels try to create enough smoke and mirrors to distract everyone from the real issues.

Hijacking a users account on PayPal is a pretty serious issue as the attacker could simply transfer all the persons funds to their own account, if they weren’t very active they wouldn’t even notice. Even more dangerous if their account is linked to a Credit or Debit card.

The other vulnerabilities Goldshlager found included an XSS (cross-site scripting) vulnerability affecting the paypal.com and business.paypal.com sites that an attacker could use to steal session IDs and hijack user accounts, as well as a CSRF (cross-site request forgery) bug that exposed user account information. The CSRF vulnerability impacts the IPN (Instant Payment Notification) system, a PayPal service that sends a message once a transaction has taken place.

Once IPN is integrated, sellers can automate their back offices so they don’t have to wait for payments to come in to fulfill orders, Goldshlager explained.

“This CSRF exploit method exposes the same information from the buyer as the first vulnerability … to exploit a CSRF attack that adds a Instant Payment Notification access, the attacker will make an attack that adds his own Website address to the victim account IPN settings, and when there is transaction on PayPal the victim’s transaction details will be sent to the attacker’s Website,” he said.

The IPN issue is dangerous too as you could develop some software to place bogus orders on ecommerce sites then generate a fake IPN back to the site to get the goods for free without any actual payment taking place.

Some other minor CSRF flaws were also discovered, but according to Paypal ‘nearly all‘ have been fixed.

SOURCE

One look at Tom Keigher's Facebook page and it's pretty clear something went wrong.

"Mr. Keigher sir you have been hacked," one friend posted.

"Looks like Nancy Pelosi is running your FB (Facebook)," another wrote.

Last week, many of Keigher's Facebook friends received posts from the conservative Gaston County commissioner with derogatory or offensive comments.

At the same time, hundreds of his friends and constituents received a note from an e-mail address that claimed to belong to Keigher. It endorsed his Republican opponent in the upcoming May 4 primary election, and claimed that Keigher likes to raise taxes. The address was not Keigher's, but it was similar, and whoever sent the e-mail clearly had access to Keigher's address book.

His opponent Jack Brown said, "My folks, I'm sure, didn't do anything like that."

Keigher agrees.

He suspects the hacking is related to a burglary at his home this fall. Several computers were stolen and Keigher thinks the thieves accessed his accounts.

"Just some small, little person that wanted to make fun of my nearly 12 years of service," he said.

"It's just not me, anybody that knows me knows it's not coming from me but those that really don’t know me," Keigher said, "that's where the damage is done, and I feel bad for those people. I apologize for the inconvenience, but it's nothing I had any control over. I didn’t do it, and it's just all bogus."

Keigher said his computer is infected with a virus. County IT officials have taken it and are working to repair it.

Cyber Crime in UK Hitting Small Business

Small businesses thinking of making the move to accept payments from customers via the internet need to seek advice before doing so, according to Tony Neate, managing director of Get Safe Online.

Research taken by the organisation reveals that 44 per cent of small businesses in the UK have been a victim of cybercrime, including internet scams, identity fraud, phishing and data theft. Of those businesses affected, more than a third (36 per cent) had suffered a computer virus and almost one in five (18 per cent) had been a victim of internet scams such as phishing, spyware or hacking in the last two years.

In such an environment, Mr Neate said that as soon as your company is responsible for handling other people’s confidential information, then new rules and regulations come in to play.

He reveals that there are now regulations that have been brought in by the credit card companies, and small business outfits probably need to have a look at those because they will likely be imposed on them as a result of taking credit card details.

The message is that if you are not an expert in relation to computers and computer security and you have your own e-commerce site or server, then you need to get advice. Furthermore, if you are taking people’s credit card details and transacting online, make sure you have listened to the correct advice.

However, Get Safe Online reveals only five per cent of small businesses have access to dedicated IT support, either internally or via an outsourced provider. Instead, many business owners have to take it upon themselves to keep up with the latest online security issues. Of those who had experienced online crime or other IT-related problems, almost a fifth (19 per cent) said they lost revenue as a result of downtime – the average figure cited as £1,540 – or an estimated £750 million in losses across the UK small business population as a whole.

Furthermore 60 per cent of small businesses said they would grind to a halt altogether if their PCs were taken down by cybercrime or IT related issues.

While businesses must look at access control, data encryption and secure password practices, as well as looking at other measures such as staff training, it’s also important to remember that by taking a few simple precautions should mean that online risks needn’t overshadow the huge benefits that the internet brings to UK businesses.

Thursday, April 22, 2010

WEP Cracking: Wireless Hacking Live CD Download (FBI Version)


This version is for all systems except systems with the Intel B/G wireless cards (IPW2200).
  • Live CD with all the tools you need to hack a WLAN / wireless Access point. Linux Live-CD OS runs from CD. 635 MB ISO.
  • Also used by the FBI
WEP Hacking. The Next Generation

WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products. WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver.

Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long. A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of strong encryption while a 128 bit key has 104. The IV is placed in encrypted frames header, and is transmitted in plain text.

Traditionally, cracking WEP keys has been a slow and boring process. An attacker would have to capture hundreds of thousands or millions of packets. A process that could take hours or even days, depending on the volume of traffic passing over the wireless network. After enough packets were captured, a WEP cracking program such as Aircrack would be used to find the WEP key.

Fast-forward to last summer, when the first of the latest generation of WEP cracking tools appeared. This current generation uses a combination of statistical techniques focused on unique IVs captured and brute-force dictionary attacks to break 128 bit WEP keys in minutes instead of hours. As Special Agent Bickers noted, It does’nt matter if you use 128 bit WEP keys, you are vulnerable!

WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products.

WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver.

Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long.

A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of strong encryption while a 128 bit key has 104.

The IV is placed in encrypted frames header, and is transmitted in plain text.

Traditionally, cracking WEP keys has been a slow and boring process.

An attacker would have to capture hundreds of thousands or millions of packets a process that could take hours or even days, depending on the volume of traffic passing over the wireless network.

After enough packets were captured, a WEP cracking program such as Aircrack would be used to find the WEP key.

Fast-forward to last summer, when the first of the latest generation of WEP cracking tools appeared.

This current generation uses a combination of statistical techniques focused on unique IVs captured and brute-force dictionary attacks to break 128 bit WEP keys in minutes instead of hours.

How to use?

1) Boot from cd
2) Get the wep key
3) Write it down
4) Reboot into windows
5) Connect using wep key.

    Wednesday, April 21, 2010

    Backtrack 4 Download for Windows VMWare & Torrents

    BackTrack is a live CD Linux distribution that focuses on penetration testing. A merger of two older security-related distros — Whax and Auditor Security Collection — BackTrack bundles more than 300 security tools.

    BackTrack is based on the SLAX distribution (a live CD derived from Slackware) and runs a patched 2.6.20 kernel. It offers users both KDE and Fluxbox desktop environments.
    To start using BackTrack, download the ISO image and burn it to a CD. Insert the disc and boot your machine. Once booted, the system start at runlevel 3 (text mode), where you must log in as root and choose whether to start KDE or Fluxbox or just use the terminal.

    BackTrack provides clear, concise instructions for logging in, starting the window manager, and configuring the video card before you see the login prompt. If you’ve never used BackTrack before, use a graphical environment, since it will help you understand how all the included applications are organized and let you take advantage of some graphical utilities. When the window manager comes up you’ll find some ordinary desktop programs, such as Firefox, Gaim, K3b, and XMMS, within a nice environment with beautiful wallpaper and window transparency.

    Don’t let the attractive appearance fool you — BackTrack packs a punch. The security tools are arranged inside a Backtrack submenu. This is a big improvement over older releases, because you can easily follow an attack methodology: starting by collecting information and end by hiding your actions.

    The tools are arranged in 12 categories, such as vulnerability identification, penetration, privilege escalation, radio network analysis, and reverse engineering. Among the more than 300 security tools you’ll find such familiar names as the Metasploit Framework, Kismet, Nmap, Ettercap, and Wireshark (previously known as Ethereal).

    One of the core points of this release is the attention to detail. For example, when you choose most of the programs from the Backtrack menu, a console window opens with the output of the program’s help. Some tools have been bundled with scripts that in a few steps configure and run the program for you. For example, if you run the Snort intrusion detection application, a script asks for some passwords and then sets up MySQL, Apache, Base, and Snort itself so you can easy browse alert logs via a Web browser.

    If you open Firefox or Konqueror you’ll find some useful security-oriented bookmarks. In the Documents submenu the developers have included PDF manuals for the ISSAF and OSSTMM security methodologies. There are also some tools that you wouldn’t expect inside a live CD; for example, you have a popular debugger for Windows, OllyDbg, which runs fine through Wine, so you can even debug .exe files.

    If you like the live CD, you can install BackTrack to a hard drive (decompressed, it requires 2.7GB of space) or USB memory stick (compressed, 700MB) using a graphical wizard.
    While BackTrack is an excellent tool, nothing is perfect. Unfortunately it doesn’t include Nessus, the popular security scanner, due to license problems. I tried to start PostgreSQL from the Services menu, but it gave an error. And it seems as if the developers forgot to update the Backtrack menu in Fluxbox, because it offers the previous version arrangement. Tools like VMware and Nessus appear on the menu but are broken links because they have been removed from this release.

    Despite a few little bugs and problems, BackTrack is the best distribution I’ve found for handling security-oriented tasks out of the box.

    Download Links :

    Last Update: 11.01.2010
    Description: Image Download
    Name:: bt4-final.iso
    Size: 1570 MB
    MD5: af139d2a085978618dc53cabc67b9269



    Description: VM Image Download
    Name:: bt4-final-vm.zip
    Size: 2000 MB
    MD5: 733b47fad1d56d31bc63c16b3706a11c



    FOR OLDER VERSIONS CLICK HERE

    To learn HOW TO USE BACKTRACK & for all BACKTRACK TUTORIALS & COMMANDS: CLICK HERE & JOIN THIS FORUM

    Zeus Botnet in Action Exploiting PDF for Hacking


    Botnet are exploiting an Adobe's PDF vulnerability and are using PDF documents for the "Launch" design flaw to spread the malware onto computers.

    The virus infects the computer when the users open an email with the attached PDF file. Once the computer is infected to sends sensitive information to malware creators somewhere in China.

    A spokesperson for the Websense, a security firm that detected the hacking warned people against opening PDF file attachment email with the name Royal_Mail_Delivery_Notice. pdf.

    Dan Hubbard, CTO of Websense said, "When recipients open the PDF, it asks to save the file. The user falsely assumes that the file is just a PDF, and, therefore, safe to store on the local computer. The file, however, is really a virus. The malicious PDF launches the dropped file, taking control of the computer. It was discovered that the latest anti-viruses have an 80% chance of mistaking the file as a harmless one."

    Zeus is the first major malware to exploit the PDF format /Launch feature. The flaw is not security vulnerability but actually a by-design function of the program. Belgium researcher Didier Stevens had earlier showed how a multistage attack could exploit /Launch.

    The users can protect their computer by disabling Javascript or the launch feature within Adobe Reader. Both the Reader and Acrobat display a warning when an executable inside a PDF file is launched.


    A demo video of this attack can be viewed here

    Firefox & Chrome Mafia Wars Autoplayer Script

    Mafia Wars Autoplayer is a script made to work with greasemonkey add-on on your Firefox/Chrome browser.

    With the Mafia Wars Autoplayer you will be able to automate doing jobs, harvesting cuban business, deposit money when it reaches certain amount automayically, do fighting, robbing even collect bounty for you, it can also auto purchase inventories for you, probabaly one of the best thing with Mafia Wars Autoplayer is when it does a job, and you don’t have the prerequisite item for that particular job it will automatically go and do the job to try and fill the prerequisite which is great. For those of you that is addicted to Mafia Wars, check it out.

    How to use this:
    • Install greasemonkey – CLICK HERE TO INSTALL
    • Install the script – CLICK HERE TO INSTALL SCRIPT
    • On your facebook homepage: Hold Ctrl, then click on your “Mafia Wars” bookmark. This will prevent the application from shrinking into a bar.
    • Alternatively, load mafia wars using this link -

    Google Chrome support!
    • Install from this link:

    Video Tutorial on how to use this in Firefox
    • Watch the high quality video tutorial here!
    • Also seen on and

    Download Live Hacking CD by Dr.Ali Jahangiri

    Hi readers....how can I stop my self to share this wonderful live hacking CD with you. Continuing to me earlier post Popular Ethical Hacking Book 'Live Hacking' Now Available in India at half of the international sales price

    You can download this new Linux distro at Here.

    Live Hacking CD is a new Linux live distribution focused on penetration testing and live hacking. With no installation the analysis platform is started directly from the CD-Rom and is fully accessible within minutes to conduct live hacking and penetration test.

    User Name: cd
    Password: password
    ZIP File MD5 Hash: 289BF449EEEF7EDA3DE35D1A42A8DD65
    Note: Please unzip the file and burn the ISO image on a CD.

    You can download this new Linux distro at Here.


    How to Trace IP Address Location From Email, Gmail, Hotmail, MSN & Yahoo Mail

    This Guest post has been shared by Mr.Amey. He and his friends running a very good technology blog

    We will explain how you can track your friends IP address. You will need to do some social engineering in this trick. You will need to ask your friend to mail you something or send him some mail to which he will reply.

    Now there can be two scenarios. Your friends/victims IP can be static or dynamic.

    Scenario 1: Static IP

    Static IP is assigned by the ISP to a specific user, that is, you have one unique IP whenever you log on to the internet. In this case, here's how you can find the IP. We will consider three major email services, viz. gmail, yahoo and hotmail.

    Gmail:

    Open the mail you have recieved from your friend and click on the down arrow to the right of the reply button. Now click on Show Original.
    You will get to see the complete headers of the mail from which you have to find the IP from which this mail was sent. Mostly in case of a static IP, the IP is shown as in the figure

    Hotmail:

    Right click on the recieved mail and select 'view message source'


    You will get the complete message with source. This is how the originating IP looks in hotmail
    Yahoo:

    Open the mail and at the right bottom of the mail, click on 'Full headers'

    Again over here you will get to see the IP in the same format as in hotmail and gmail, shown above.

    Scenario 2: Dynamic IP

    In case of dynamic IP, hotmail and yahoo wont help much. Whereas Gmail shows the private IP of the sender. Just follow the procedure above as shown for static. On the source page you have to look for the following:



    Here the IP 10.141.12.9 is the private IP of our victim. This is how you can get IP information of victims behind subnets. Well sometimes the private is not shown by any of the email services because instead of sending detailed email information a DKIM-signature is sent for authentication.

    There are other numerous ways using which we can track our victims IP. Will soon be posting on that. Stay subscribed. Till then..

    Happy Tracking!!!


    Tuesday, April 20, 2010

    Free Penetration Testing

    Centuno is now offering a Free Penetration Testing. Simulate an actual hacking attack with Free Penetration Testing.

    The first line of defense for many computers is a password. Although passwords restrict access to a computer, they're the weakest link in any security system. The most secure passwords are lengthy, consisting of random characters, but most people tend to choose simple, easy-to-remember passwords and use the same password for several different systems.

    Also visit here:
    When a computer requires a password, but you don't know what that password may be, you have several options:
    • Steal a valid password
    • Guess the password
    • Discover the password with a brute-force attack
    Stealing a password

    If you can get physical access to a computer, the easiest way to steal a password is by shoulder surfing-peeking over someone's shoulder as they type in a password. If that option isn't available, poke around the person's desk. Most people find passwords hard to remember, so they often write them down and store them where they can easily find them, like next to their monitor or inside their desk drawer.

    Still can't find that pesky password? Try one of these methods:
    • keystroke logger
    • desktop-monitoring program
    • remote desktop-monitoring program
    • password-recovery program
    Note - All of these programs require that you have access to the victim's computer so you can install or run the programs without the user's knowledge.

    Using a keystroke recorder or logger

    Keystroke recorders or loggers record everything a person types, and either sends their typing to a monitoring computer or saves it to a file. The simplest keystroke loggers record anything a user types which can include incriminating email messages, credit card numbers, and passwords. When the user leaves the target computer, you can remove the keystroke logging program from their machine and retrieve the logging file that contains the password and anything else they typed. The more advanced keystroke loggers can email the log file of a user's keystrokes to you so you can monitor their activities from another location.

    To avoid detection, keystroke loggers run in stealth mode, which means that they hide their presence from the user, although they can still be spotted if you know what and where to look. Unless someone suspects that someone has planted a keystroke logger on their computer, chances are good they will never look for, let alone find, a keystroke logger hidden in stealth mode.

    To avoid giving away their presence at all, some keystroke loggers are available as hardware devices that plug in between the computer and the keyboard. Such hardware keystroke loggers can be spotted easily just by looking at the back of the computer, but their presence is completely invisible to any software running on that computer. Best of all, unlike their software equivalents that only work under specific operating systems, hardware keystroke loggers work with any operating system running on that computer, such as FreeBSD, Linux, Windows XP, or OS/2.

    Some popular hardware keystroke loggers include KeyGhost (http://www.keyghost.com), Hardware KeyLogger (http://www.amecisco.com), and KEYKatcher (http://www.tbotech.com/key-katcher.htm). To find a software keystroke logger, visit Keylogger.org (http://www.keylogger.org), which rates the different keystroke loggers by their features and ease of use.

    Spying with a desktop-monitoring program

    More powerful than keystroke loggers are desktop-monitoring programs. Like a computer surveillance camera, desktop-monitoring programs secretly record the programs a person uses, how long the person uses each program, the websites viewed, and every keystroke the user types. To show you what a user might be doing, some desktop-monitoring programs can periodically capture the contents of the screen or secretly turn on a webcam to record the person sitting in front of the computer.

    Many desktop-monitoring programs can store days of recordings, and some can be set to record at specifically designated times, when certain applications are run, or when a user logs on to the Internet.

    To find a desktop-monitoring program, visit Computer Monitoring Software http://www.computer-monitoring.com or try these programs:
    1. AppsTraka http://appstraka.hypermart.net
    2. Desktop Surveillance http://www.omniquad.com
    3. iSpyNOW http://www.ispynow.com
    4. Net Vizor http://www.mi-inc.com/netvizor.htm
    5. Spector http://www.spectorsoft.com
    6. SpyBuddy http://www.agent-spy.com
    7. WinWhatWhere Investigator http://www.winwhatwhere.com
    8. WinGuardian http://www.webroot.com
    Remotely viewing another computer's desktop

    Desktop-monitoring programs are useful if you have regular access to the computer you want to watch. But if you don't, you can use a remote desktop-monitoring program instead. Just install a program such as Q-Peek (http://www.qpeek.com), Spector (http://www.netbus.org), or PC Spy (http://www.softdd.com) on the computer you want to monitor. Then, anything anyone types, views, or manipulates on that computer will appear live on your computer's screen.

    Using a password-recovery program

    Because typing a password over and over again to access a program can be a nuisance, many programs let you store passwords directly in the program, hidden behind a string of asterisks. Because people often forget these passwords and then can't access their programs or files, password-recovery programs have been developed to retrieve these lost or forgotten passwords. You can, of course, also use these programs to retrieve other people's passwords.

    There are many commercial and free versions of password-recovery programs, such as these:
    1. iOpus Password Recovery XP http://www.iopus.com
    2. Passware Kit http://www.lostpassword.com
    3. Peek-a-boo http://www.corteksoft.com
    4. Revelation http://www.snadboy.com
    Besides blocking access to a program, passwords can also block access to files, like WordPerfect documents or Microsoft Excel spreadsheets.
    1. AccessData http://www.accessdata.com
    2. Alpine Snow http://www.alpinesnow.com
    3. Crak Software http://www.crak.com
    4. ElcomSoft http://www.elcomsoft.com
    5. Password Crackers http://www.pwcrack.com
    6. Passware http://www.lostpassword.com
    Guess a password with a dictionary attack

    Most people choose easy-to-remember passwords, which means the odds that someone will choose an ordinary word for a password are extremely high. To find passwords that use ordinary words, hackers have created special password-cracking programs that use dictionary files (sometimes called word lists), which contain actors' names, names of popular cartoon characters, popular rock bands, Star Trek jargon, common male and female names, technology-related words, and other common words found in most dictionaries.

    The password-cracking program takes a word from the dictionary file and tries this word as a password to access a computer. If the first word isn't the right password, the password-cracking program tries another word from its dictionary list until it either finds the right password or runs out of words. If the password works, you have access to the program you want. Of course, if it runs out of words in its dictionary file, you can try another dictionary file until you find a valid password or run out of dictionary files. If a password is an ordinary word, it's only a matter of time before a dictionary attack will uncover it.

    To increase the odds of uncovering a password, some password-cracking programs will not only try every word in a dictionary file, but also subtle variations of each word, such as spelling the word backwards or adding different numbers on the end. So even though a password like SNOOPY12 won't be found in an ordinary dictionary file, the password-cracking program can still uncover this password by manipulating each word in its dictionary file.

    For an example of a dictionary attack tool sold commercially for people to test the security of their networks, visit SolarWinds (http://solarwinds.net). For one of the largest collections of word lists, visit the Wordlist Project (http://wordlists.securityon.net), which offers word lists in various languages, including English, Spanish, Japanese, and Russian.

    Brute-force password attacks

    Dictionary attacks can find ordinary words or variations of words, but sometimes a password may consist of random characters. In these cases, the only solution is to use a brute-force attack.

    As the name implies, a brute-force attack is like prying a password out of a computer by smashing it with a sledgehammer. Instead of trying common words that most people use as passwords, the brute-force method simply tries every possible combination of characters in varying lengths. So, if someone's password is as obscure as NI8$FQ2, a brute-force attack will find that password (and every other password on that computer) eventually.

    Brute-force attacks are especially popular when cracking Unix systems, because most Unix systems store the list of account names and passwords in the /etc/passwd file. To provide a small degree of security, Unix encrypts each person's password using an encryption algorithm (also called a hash function), usually using the Data Encryption Standard (DES).

    To gain access to Unix computers, hackers simply copy the /etc/passwd file to their own computer so that they can run a dictionary or brute-force attack on that file at their convenience, without risk of being spotted. With a copy of the passwd file on their own computer, hackers can take as much time as they need until either the dictionary or brute-force attack succeeds. Once it finds just one password, the hacker can use that password to gain access to that unlucky person's account.

    To find password-cracking programs that use word-list or brute-force attacks, visit these sites:
    1. BlackCode http://www.blackcode.com
    2. AntiOnline http://www.antionline.com
    3. New Order http://neworder.box.sk
    OTHER USEFUL LINK RELATED TO THIS POST:


    All Search Engines List in the World

    The following list includes some of the more powerful search engines:
    1. About - http://about.com
    2. AlltheWeb - http://www.alltheweb.com
    3. AltaVista - http://www.altavista.com
    4. AOL Search - http://search.aol.com/
    5. Ask Jeeves - http://www.askjeeves.com
    6. Google - http://www.google.com
    7. Hotbot - http://www.hotbot.com
    8. LookSmart - http://www.looksmart.com
    9. MSN - http://www.msn.com
    10. Open Directory Project - http://dmoz.org
    11. Teoma - http://www.teoma.com
    12. Yahoo! - http://www.yahoo.com
    Meta-search engines

    Rather than visit multiple search engines yourself, you can save time by using a meta-search engine, which simultaneously sends your query to two or more general-purpose search engines and eliminates duplicate results. Here are some popular meta-search engines:
    1. DogPile - http://www.dogpile.com
    2. Mamma - http://www.mamma.com
    3. MetaCrawler - http://www.metacrawler.com
    4. Search.com - http://www.search.com
    Specialized search engines

    Finally, don't ignore specialized search engines designed to search only for websites pertaining to a particular topic. Specialized search engines often find obscure web-sites that the larger search engines might overlook. There are specialized search engines for everything from caring for fish to the latest crafting fads. Here are a few interesting ones:
    • AvatarSearch Finds occult information about witchcraft, vampires, pagan rituals, astrology, tarot cards, and other topics that often panic right-wing conservatives (http://www.avatarsearch.com).
    • Black Web Portal Finds websites of particular interest to blacks (http://www.blackwebportal.com).
    • Crime Spider Searches for websites providing information about various crime and law enforcement sites and organized by topics such as serial murder, urban legends, and cybercrime (http://www.crimespider.com).
    • Disinformation Conspiracy theory-laden search engine that helps you uncover websites offering the "real truth" behind the pyramids of Mars, the sightings of black helicopters over America, film footage of Bigfoot, and the government secrets hidden in Area 51 (http://www.disinfo.com).
    • Education World Finds websites that can help students, teachers, and parents learn more about education (http://www.education-world.com).
    • Federal Web Locator Lists many of the websites from various government agencies and organizations (except for the really cool ones like the CIA and FBI). Maybe you can use it to find out where all your hard-earned tax dollars are going (http://www.infoctr.edu/fwl).
    • GovSearch Collection of government search engines for finding information about the U.S. government: IRS documents, Customs Service, NTIS, U.S. law code, legislative information, OSHA regulations, and information from many other agencies and departments (http://www.nwbuildnet.com/nwbn/govbot.html).
    • CopSeek Directory and Police Search Engine Helps you find websites related to law enforcement so you can find a policeman when you need one (http://www.copseek.com).
    • NerdWorld Search engine dedicated to computer and technology fanatics (http://www.nerdworld.com).
    • Que Pasa! A bilingual search engine geared towards Hispanics and Latinos, available in both English and Spanish (http://www.quepasa.com).
    • Satanist Net Search engine geared to helping you find satanic information on the Internet (http://www.satanist.net).
    • Women.com and WWWomen Two search engines geared toward helping women find information and resources on the Internet (http://www.women.com and http://www.wwwomen.com).
    Kid-safe search engines

    If you leave your children unsupervised, it's likely that they'll eventually find bomb-making instructions and pornography on the Internet. While keeping children isolated from such information may be impossible, you can at least limit their searching to kid-safe search engines. Unlike general-purpose search engines, kid-safe search engines won't accidentally display links to pornographic or bomb-making websites. Try one of the following:
    1. Ask Jeeves for Kids - http://www.ajkids.com
    2. CleanSearch - http://www.cleansearch.com
    3. Go.com - http://www.go.com
    4. Yahooligans - http://www.yahooligans.com
    Multimedia search engines
    Most search engines help you find text, but what if you want to find a song, a picture, or a video clip? Rather than waste your time using a general purpose search engine to find an MP3 file of your favorite band, try using a special multimedia search engine instead. These multimedia search engines specialize in searching only for specific audio, graphic, or video files.

    Here are some of the more popular multimedia search engines:
    1. Ditto - http://www.ditto.com
    2. FAST Multimedia Search - http://multimedia.alltheweb.com
    3. SpeechBot.net - http://speechbot.research.compaq.com
    4. MIDI Explorer - http://www.musicrobot.com
    Searching for more search engines
    1. AllSearchEngines - http://www.allsearchengines.com
    2. Search Engine Watch - http://www.searchenginewatch.com
    Regional search engines


    Zune HD Hacks Mods & Tricks | Download OpenZDK

    Zune HD is the only digital media player with a touchscreen, HD Radio, HD video out, and wireless sync.

    The guys at Zuneboards have released a first ever hack for the Microsoft Zune HD, named OpenZDK which allows full access to Zune hardware previously denied by XNA framework, this translates to the beginning of the development of third party apps and software like emulators, games etc just like the case is today with the jailbroken iPhone and iPod Touch. OpenZDK can be used to hack ZuneHD and all the previous Zune models.

    Download OpenZDK Quickstart Kit Edition 1

    OpenZDK allows developers to make applications using the powerful Tegra APX2600 graphics chip using custom vertex and fragment shaders with OpenGL ES 2.0, without any limitations imposed by closed Microsoft XNA Framework. Quickstart kit contains sample programs along with a 3D Demo showing the 3D graphics capability of the hacked Zune device.

    Download from OpenZDK from Hotfile, More download mirrors available here

    OpenZDK Torrent Download Link

    Find latest information about Zune HD Hacking at the Official ZunedevWiki


    Newer Posts Older Posts Home