Email Login| Link Exchange | Cyber News | Phishing Attack | SQL Injection | SEO | DOS Attack | Hacking Tools | |Hacking Tricks | Penetration Testing | Trojans & Keyloggers |Hacking Videos | General Discussion | Website Hacking | Session Hijacking | Social Engineering | Anonymous Surfing | Recover Passwords | Bypass Firewall | Hacking Books | Network Sniffers | Password Cracking | Enumerating & Fingerprinting | Movies & Songs

Share This Post With Your Friends

Showing newest 25 of 39 posts from 06/13/10. Show older posts
Showing newest 25 of 39 posts from 06/13/10. Show older posts

Saturday, June 19, 2010

How To Make Happy Wife | How To Make Happy Husband

New insight into stress & relations management: Books you learn from

Packed with several soul-stirring real-life anecdotes, the author addresses real life problems both at work place and home.

In the time of economic meltdown and social turmoil as lot of people are passing through now, this book by a doctor stress management consultant, can help many of us cope with a stressed out life.

Tit For Tat To Treat For Tat comes straight from the eclectic experience of Dr. Harvinder Pal Singh as a doctor who is also a leading stress management consultant. Besides treating his patients with stress management therapies he has been organizing workshops and seminars with the Life Care Foundation, an NGO.

The book begins as a dialogue between him and his friend and a past patient, who helped himself come out of the stressful phase of his life. The reader is taken through learning to self-healing through the conversation between the two.

Packed with several soul-stirring real-life anecdotes, the author addresses real life problems both at work place and home, be they related to anger management or settling differences with spouse, thus helping change one's perception towards life to earning respect, happiness, success and a stress-free working life.

A number of testimonials from people from different walks of life, including academicians, sum up this work as illuminating and very useful treatise on taking our day-to-day problems head on.

Book your copy today online: CLICK HERE

You can contact him on

To read more about this book click here

Best Hacking Videos: Hacking Videos Free Download

52 Video Tutorial Networking Hacking

A Penetration Attack Reconstructed
A Quick and Dirty Intro to Nessus using the Auditor Boot CD!
Adding Modules to a Slax or Backtrack Live CD from Windows
Airplay replay attack – no wireless client required
Anonym.OS LiveCD with build in Tor Onion routing and Privoxy
BackTrack LiveCD to HD Installation Instruction Video
Basic Nmap Usage!
Basic Tools for Wardriving!
Bluesnarfer attack tool demonstration
Bluesnarfing a Nokia 6310i hand set
Breaking WEP in 10 minutes
Cain to ARP poison and sniff passwords!
Complete Hacking Video using Metasploit – Meterpreter
Cracking a 128 bit WEP key (Auditor)
Cracking a 128 Bit Wep key + entering the cridentials
Cracking Syskey and the SAM on Windows Using Samdump2 and John!
Cracking Windows Passwords with BackTrack and the Online Rainbow Tables at Plain-Text!
Cracking WPA Networks (Auditor)
DoS attack against Windows FTP Server – DoS
Droop s Box Simple Pen-test Using Nmap, Nikto, Bugtraq, Nslookup and Other Tools!
Exploiting some bugs of tools used in Windows
Exploiting weaknesses of PPTP VPN (Auditor)
Finding Rogue SMB File Shares On Your Network!
Fun with Ettercap Filters!
How to crack the local windows passwords in the SAM database
How to decrypt SSL encrypted traffic using a man in the middle attack (Auditor)
How to sniff around switches using Arpspoof and Ngrep!
Install VNC Remotely!
Internet Explorer Remote Command Execution Exploit (CMDExe) Client Side Attack (Hi-Res)
Internet Explorer Remote Command Execution Exploit (CMDExe) Client Side Attack (Lo-Res)
John The Ripper 1.7 password cracker Installation Instruction Video
Local Password Cracking Presentation for the Indiana Higher Education Cybersecurity Summit 005!
MAC Bridging with Windows XP and Sniffing!
Mass De-Authentication using void11 (Auditor)
Metasploit Flash Tutorial!
MITM Hijacking
Nmap Video Tutorial 2 Port Scan Boogaloo!
Sniffing logins and passwords
Sniffing Remote Router Traffic via GRE Tunnels (Hi-Res)
Sniffing Remote Router Traffic via GRE Tunnels (Lo-Res)
Sniffing VoIP Using Cain!
Snort Instruction video – howto install into backtrack
SSH Dynamic Port Forwarding!
Start a session and get interactive commandline access to a remote Windows box!
Telnet Bruteforce
Tunneling Exploits through SSH
Use Brutus to crack a box running telnet!
Using NetworkActiv to sniff webpages on a Wi-Fi network!
WEP Cracking using Aireplay v2.2 Beta 7 (Whax 3.0)
WMF File Code Execution Vulnerability With Metasploit!
WPA Cracking using Aireplay v2.2 Beta 7 (Whax 3.0)

Download HotFile:
http://hotfile.com/dl/49059311/6faf540/52.Hacking.Videos.part1.rar.html
http://hotfile.com/dl/49059308/462960c/52.Hacking.Videos.part2.rar.html
http://hotfile.com/dl/49059306/43f4414/52.Hacking.Videos.part3.rar.html
http://hotfile.com/dl/49059313/ee8767f/52.Hacking.Videos.part4.rar.html
http://hotfile.com/dl/49059307/0ee97a1/52.Hacking.Videos.part5.rar.html
http://hotfile.com/dl/49059305/912d759/52.Hacking.Videos.part6.rar.html
http://hotfile.com/dl/49059309/3001692/52.Hacking.Videos.part7.rar.html
http://hotfile.com/dl/49059314/610ff06/52.Hacking.Videos.part8.rar.html

Download FS:
http://www.fileserve.com/file/jjk7MQb/52.Hacking.Videos.part1.rar
http://www.fileserve.com/file/6MVu4Dy/52.Hacking.Videos.part2.rar
http://www.fileserve.com/file/GuEX6pr/52.Hacking.Videos.part3.rar
http://www.fileserve.com/file/zHnjX8z/52.Hacking.Videos.part4.rar
http://www.fileserve.com/file/Z9qyQaF/52.Hacking.Videos.part5.rar
http://www.fileserve.com/file/PVwPsxH/52.Hacking.Videos.part6.rar
http://www.fileserve.com/file/uEC7KPC/52.Hacking.Videos.part7.rar
http://www.fileserve.com/file/DhGDf4p/52.Hacking.Videos.part8.rar

Download FS Mirror:
http://www.fileserve.com/file/ySJyJES/52.Hacking.Videos.part1.rar
http://www.fileserve.com/file/5gfc4q6/52.Hacking.Videos.part2.rar
http://www.fileserve.com/file/HZK8Fcc/52.Hacking.Videos.part3.rar
http://www.fileserve.com/file/29yJ27C/52.Hacking.Videos.part4.rar

Download SHR:
http://sharingmatrix.com/file/8495959/52.Hacking.Videos.part1.rar
http://sharingmatrix.com/file/8496025/52.Hacking.Videos.part2.rar
http://sharingmatrix.com/file/8496017/52.Hacking.Videos.part3.rar
http://sharingmatrix.com/file/8495953/52.Hacking.Videos.part4.rar
http://sharingmatrix.com/file/8495943/52.Hacking.Videos.part5.rar
http://sharingmatrix.com/file/8495983/52.Hacking.Videos.part6.rar
http://sharingmatrix.com/file/8495971/52.Hacking.Videos.part7.rar
http://sharingmatrix.com/file/8495695/52.Hacking.Videos.part8.rar

Download Windows 7 ULTIMATE FULLY ACTIVATED ORIGINAL



Windows 7 ULTIMATE x86/x64 (32/64bit) | ORIGINAL | FULLY ACTIVATED!

ENGLISH + MULTILANGUAGE SUPPORT (35 LANGUAGES) | DVD ISO | BOOTABLE | NO SERIAL/NO ACTIVATION NEEDED | Size: 3.47GB | Genuine Version | FULLY UPDATABLE with MS Windows Update | Instructions and Installation Notes Included

Download from Hotfile
http://hotfile.com/list/251448/6896f9b

Download from FileServe
http://fileserve.com/list/msRgfGq

Hack Adobe Acrobat PDF Password | How to Decrypt Adobe Acrobat PDF Files: Download PDF Decrypter

PDF Decrypter v2.50 | 6MB

PDF Decrypter 2.5 can be used to decrypt the protected Adobe Acrobat PDF files, which have “owner” password set, preventing the file from editing, printing, selecting text and graphics etc. It is the fast, affordable way to decrypt a lot of protected pdf files to decryped pdf files once time for saving your time! Its easy-to-use interface allows you to decrypt PDF files by simply few clicks.

The decrypted file can be opened in any PDF viewer (e.g. Adobe Acrobat Reader). All versions of Adobe Acrobat PDF (including 7.x, which features 128-bit encryption) are supported. And PDF decrypter V2.5 don’t need any software such as adobe acrobat.

Download link 1

Download Link 2

Download Adobe Photoshop CS5 Extended v12.0 Final

Adobe Photoshop CS5 Extended v12.0 Final

The complete package includes the setup, master keygen, patch and a COMPLETE ILLUSTRATED INSTALLATION GUIDE. This version works 100%. Also included is an illustrated guide for those who encounter invalid serial number.


Adobe Photoshop CS5 Extended software is the ultimate solution for advanced digital imaging, delivering all the editing and compositing capabilities of Photoshop CS5 plus breakthrough tools that let you create and edit 3D and motion-based content.

DOWNLOAD:
http://hotfile.com/dl/49368764/ad94c88/A.PShopCS5.part01.rar.html
http://hotfile.com/dl/49368769/3e8398b/A.PShopCS5.part02.rar.html
http://hotfile.com/dl/49368770/5bab565/A.PShopCS5.part03.rar.html
http://hotfile.com/dl/49368772/eb7035f/A.PShopCS5.part04.rar.html
http://hotfile.com/dl/49368774/d886a08/A.PShopCS5.part05.rar.html
http://hotfile.com/dl/49368777/38cfd13/A.PShopCS5.part06.rar.html
http://hotfile.com/dl/49368778/f0c2e5a/A.PShopCS5.part07.rar.html
http://hotfile.com/dl/49368780/39423fd/A.PShopCS5.part08.rar.html
http://hotfile.com/dl/49368782/f4fdf9d/A.PShopCS5.part09.rar.html
http://hotfile.com/dl/49368783/caeecec/A.PShopCS5.part10.rar.html

Download Norton Ghost 15.0 with Recovery Disk

Norton Ghost 15.0 with Recovery Disk

• Creates full system and file backups — Safeguards your system, settings, applications, and files with flexible, comprehensive backup protection.
• Restores from system failures — Recovers your system and data even when you can’t restart your computer.
• Enables convenient, secure offsite backups — Saves recovery points to an FTP site for easier offsite management and even backs up your data to network-attached storage devices.

• NEW! Cold imaging
• NEW! Blu-ray Disc support
• File and folder backups
• NEW! Windows® 7 Bitlocker™ support
• NEW! Symantec ThreatCon integration
• Advanced compression and encryption
• Incremental backup
• Event based backups
• Onsite and offsite backups
• Full system (disk image) backup and restore

DOWNLOAD:
http://hotfile.com/dl/49368978/5df9622/NortonGhost15.part1.rar.html
http://hotfile.com/dl/49368981/c45e2de/NortonGhost15.part2.rar.html
http://hotfile.com/dl/49368983/adfbe91/NortonGhost15.part3.rar.html

Download All to PDF Converter Professional

Okdo All to PDF Converter Professional v3.6 | 8.46 Mb

Okdo All to Pdf Converter Professional is the most powerful PDF converter which provides a speedy and easy way to batch convert any file to your personal, searchable PDF with ease. All you need to do is to add your converted files to list then click "Convert" is ok. Own it, you do not need to find other software because it can convert numerous formats like doc, docx, docm, xls, xlsx, xlsm, ppt, pptx, pptm, pdf, txt, rtf, htm, html, url, jpg, jpeg, bmp, gif, tif, wmf, emf, png, jp2, j2k, pcx etc with fast speed and good quality.

Download Link 1

Download Link 2

Blu-Ray DVD Tools, Blu-Ray Video Tools and Blu-Ray Audio Tools: Ainsoft Software Suite All In One

Ainsoft Software Suite AiO | 450.97 Mb

Ainsoft Software Suite All In One 12.06.2010. Blu-Ray Tools, DVD Tools, Video Tools and Audio Tools..

Includes:
Blu-ray Copy 1.0.0.014
Blu-ray DVD Copy 1.0.0.014
Blu-ray Ripper 2.1.0.521
Blu-Ray DVD Ripper 2.1.0.521
Blu-ray to AVI Converter 2.1.0.521
Blu-ray to iPod Converter 2.1.0.521
Blu-ray to MP3 Converter 2.1.0.521
Blu-ray to MP4 Converter 2.1.0.521
Blu-ray to MPEG Converter 2.1.0.521
Blu-ray to PS3 Converter 2.1.0.521
Blu-ray to WMV Converter 2.1.0.521
Blu-ray to HD Video Converter 2.1.0.521
DVD Ripper Standard 1.0.1.47
DVD Ripper Platinum 1.0.1.47
DVD Copy 1.0.1.47
DVD to AVI Converter 1.0.1.47
DVD to BlackBerry Converter 1.0.1.47
DVD to FLV Converter 1.0.1.47
DVD to iPod Converter 1.0.1.47
DVD to iPhone Converter 1.0.1.47
DVD to PSP Converter 1.0.1.47
DVD to MP3 Converter 1.0.1.47
DVD to MP4 Converter 1.0.1.47
Video Converter 1.0.1.23
AVI Video Converter 1.0.1.23
BlackBerry Video Converter 1.0.1.23
FLV Video Converter 1.0.1.23
iPod Video Converter 1.0.1.23
iPhone Video Converter 1.0.1.23
PSP Video Converter 1.0.1.23
MP4 Video Converter 1.0.1.23
MPEG Video Converter 1.0.1.23
MKV Video Converter 1.0.1.23
PPT to Video Converter 1.0.1.23
Video to Audio Converter 1.0.1.23

DOWNLOAD

http://www.fileserve.com/file/nrD8bhF/Ainsoft_Software_Suite_AiO.rar.001
http://www.fileserve.com/file/Pfx2MZP/Ainsoft_Software_Suite_AiO.rar.002
http://www.fileserve.com/file/wPdE4HC/Ainsoft_Software_Suite_AiO.rar.003
http://www.fileserve.com/file/Tnhg4MR/Ainsoft_Software_Suite_AiO.rar.004
http://www.fileserve.com/file/xHkXQNX/Ainsoft_Software_Suite_AiO.rar.005


MIRROR 1

http://uploading.com/files/fc69cef6/Ainsoft_Software_Suite_AiO.rar.001/
http://uploading.com/files/252cfmc4/Ainsoft_Software_Suite_AiO.rar.002/
http://uploading.com/files/c7bb8faf/Ainsoft_Software_Suite_AiO.rar.003/
http://uploading.com/files/3d2e7416/Ainsoft_Software_Suite_AiO.rar.004/
http://uploading.com/files/a7d21f13/Ainsoft_Software_Suite_AiO.rar.005/


MIRROR 2

http://www.sharingmatrix.com/file/8639021/Ainsoft_Software_Suite_AiO.rar.001
http://www.sharingmatrix.com/file/8638333/Ainsoft_Software_Suite_AiO.rar.002
http://www.sharingmatrix.com/file/8639793/Ainsoft_Software_Suite_AiO.rar.003
http://www.sharingmatrix.com/file/8637959/Ainsoft_Software_Suite_AiO.rar.004
http://www.sharingmatrix.com/file/8637625/Ainsoft_Software_Suite_AiO.rar.005

Download Manager All in One Free Download: 17 Download Managers in 1 Pack











DOWNLOAD LINK 2

DOWNLOAD LINK 3

How to control internet programs and connections


Internet Lock 5.3.0 With Crack l 9 MB

Helps control internet programs and connections:
******************************************************

* Restrict internet access.
* Password protect
internet access.
* Block internet web sites.
* Allow one or more web sites while blocking all others.
* Prevent any user accounts from accessing internet.
* Schedule internet access for any or all programs.
* Any internet program can be protected: Internet Explorer, Firefox, Google Chrome, Outlook, FTP programs, Messengers...

Internet Lock is the access control and password protection solution for your internet connections and programs. With Internet Lock, you can fully control the internet connections and programs on your computer.

Restrict or password protect internet access. Schedule internet access. Protect internet programs on certain IP addresses or domains. Limit users access to only the web sites you specified, or keep them from accessing the unwanted web sites.

Restrict internet connections & programs.
*********************************************
You can use Internet Lock to restrict internet connections and programs. Programs blocked by Internet Lock will not be able to access the internet.

Internet Lock supports to protect all internet programs including, but not limited to:

* Web browsers: Internet Explorer, Firefox, Google Chrome and so on.
* Email clients: Outlook, Outlook Express...
* FTP programs.
* MSN Messenger, AOL Instant Messenger etc.
* Any other internet programs.

Password protect internet programs.
****************************************
You can use Internet Lock to password protect internet programs, to give them the opportunity to ask for the passwords when they want to connect to internet.

When a password protected program tries to connect to internet, Internet Lock pops up a password window, asks user to enter password. If she or he can not provide the password or the password is incorrect, Internet Lock drops the connection and the program is blocked.

Schedule internet access.
*****************************
With Internet Lock, you can schedule internet access for any or all internet programs.

Some examples:

* Only allow users to access internet every day 9:00 AM - 7:00 PM.
* Block internet access every Saturday and Sunday.
* Users must provide password to access internet after 10:00 PM.
* And many more combination to protect internet access daily, weekly or monthly.

Control access to internet web sites.
*****************************************
* Block or password protect programs from accessing any web sites on your computer, so that none can access those sites from your computer or they must provide password.
* Limit users access to the web sites you specified only.

Protect any kind of internet program.
***************************************
You protected the special TCP port of an internet service, you will protect all the internet programs which will use that internet service. This way, protecting a special TCP port will protect a bunch of internet programs.

It's easy to get started with the powerful Wizard.
**************************************************

With Internet Lock Wizard, you can easily configure the Internet Lock for normal uses. It provides the pre-defined rules, for examples:

* Password protect all web browsers
* Limit computer to access only specified domains
* Deny all email client programs.

You fully control the internet access.
**************************************

With Internet Lock, you can:

* Allow any ones of the internet programs, block any ones of them.
* Let a program ask for password when it tries to access internet, or simply restrict it.
* Block some programs on certain web sites, but allow them on other web sites.
* Allow a program to access internet 20:00 - 22:00, block the same program after 22:00.
* Allow Outlook to receive emails but prevent it from sending emails.
* Block the whole internet access, but allow access to your web sites only.

**********************************************************************************

How To?

1. Unrar the file.
2.Install inetlock.exe.
3.After Installation Exit the programme.
4.Copy the crack in to Install folder (Default: C:Program FilesInternet Lock).
5.Thats all Enjoy

Tested And Working...

Scanned (With NOD32) And 100% Clean.

DOWNLOAD HERE

Download JV16 PowerTools: Windows Optimization & Tuneup Utility Suite

jv16 PowerTools 2010 (RC1) 2.0.0.949 | 8.03 MB

jv16 PowerTools is the ultimate Windows optimization and tuneup utility suite. The bottom line is that it keeps your computer running smooth and fast and greatly improves its overall stability. The program allows users to remove hidden traces of previously uninstalled software, to clean the Windows registry for optimal performance and stability, and to fix many registry-based problems with a single mouse click. The highly improved multilingual user interface allows the software to be used in all major languages, while automatic backup and safety features make the program very safe to use.

jv16 PowerTools is a full Windows optimization utility suite containing 27 different main tools. Each of these tools is carefully crafted with the experience of 10 years of extensive Windows utility and registry cleaning experience to form a solid foundation to a smoother and faster system. jv16 PowerTools 2009 optimizes, repairs, and maintains Windows-based PCs making them running fast, safe, and free of problems.

Even the smallest details in the product have been designed with your ease of use in mind. The Windows Control Panel like user interface and the intuitive graphic tabs for example make the product easy to learn. And, the automatic backup creation makes it safe to use - even if you are learning by trying and make a mistake sometime, you can always just restore the backup created by the program and you're safe again.

With jv16 PowerTools you can:
* Instantly make your Windows run faster and smoother, by disabling certain features which have no useful function and by modifying a few key aspects of the system's behavior.
* Automatically clean your Windows registry from obsolete and unneeded data.
* Automatically fix many kinds of registry errors, such as broken file references.
* Easily uninstall leftover traces of software you have thought you have already uninstalled ages ago.
* Detect and remove unneeded history data and MRU (most recently used) lists that can contain sensitive information about you.
* Locate and delete unneeded files, including temp files and duplicate files.
* And much, much more!

Key features:
• Clean Windows registry
• Uninstall software
• Optimize Windows
• Improve your privacy
• Recover deleted files
• Safe to use - automatic backup feature
• Multilingual user interface

Home Page - http://www.macecraft.com/


DOWNLOAD LINK 2

Registry Purify | Download Free Registry Cleaner: Registry Cleaner Free Download

Registry Purify 5.03 | 7.15 MB

Registry Purify analyze and clean invalid entries in Windows registry, backup and restore entire registry in system file level, compact registry to gain efficiency.
Main Features:

• New Scan Engine
Registry Purify improves analyzing speed over 50% than normal algorithm by using new "SharpANA Engine". Meanwhile, "SharpANA Engine" reduces reading of hard disk evidently, which protects your hard disk effectively. The proper use of multithread technology, reduces consumption of system resources.

• Automatic Undo File Creation And Easy Recover
For your convenience and for insuring maximum protection, Registry Purify automatically create undo file for any repairs made so that you can easily recover any changes again if required.

• Build-in Microsoft Registry Editor Support
By double click any entry found in Registry Purify list, Microsoft Regedit will run focusing on the entry you just clicked. It is convenient for you to examine each entry detailedly and then make your decision.

• Microsoft Regedit compatible Undo File
Registry Purify's registry undo file is compatible with Microsoft Windows Registry Editor Version 5.00. The registry file is fully opened to end users, meaning that you can edit directly or just import manually by double click on it.

• User Friendly GUI Interface
Registry Purify is powerful and simple to use. Its Interface has all the functionality and performance required in today's computing environments.

• Simple But Powerful and Safe
Registry Purify safely scans inside your Windows registry for errors, using robust analyzing algorithm , and repairs them with just a few mouse clicks.

• Registry Compact To Gain Read/Write Efficiency
When cleaned many invalid registry entries, registry compact is necessary to your registry. Registry Purify rebuilds the registry removing blanks in the entries to compact your registry.

• Reliable Registry Backup
Registry Purify supports registry backup of different time and creation any number of backup depending on your free hard disk space. For your convenience, registry backup file name takes format of "Year/Month/Day/Hour:Minute:Second".

• Efficient Registry Restore
In one simple dialog interface, registry restore and backup deletion can be finished easily and explicitly. Although number of? backup is not limited, Registry Purify will remind you to delete some backup when the number of registry backup is over 3, for backup files can be big.

• Two-Aspect Analyze
While analyzing registry entries, Registry Purify take action in two aspect: one is registry-based analyzing method, another is file-based analyzing method. By using the two-aspect analyze, Windows registry will be analyzed thoroughly to check out more invalid entries than ever.

Home Page - http://registrypurify.com/


DOWNLOAD LINK 2

Friday, June 18, 2010

A 21-year-old hacker swaps Porsche for porridge

Free Penetration Testing

Centuno is now offering a Free Penetration Testing. Simulate an actual hacking attack with free Penetration Testing.

A 21-year-old hacker was banged up yesterday for frauds netting him a Porsche, £40,000 in cash and £30,000 in gold bullion.

Alistair Peckover is serving 20 months after pleading guilty to two counts of fraud, and admitting 50 other offences which were taken into consideration.

Peckover targeted online betting sites, and also hacked individual email accounts. He exploited both BT and Google, and the companies have said they've fixed their holes.

Peckover both downloaded and wrote his own scripts to remotely view and control other individuals' computers. Sussex Police said he had been able to access the email account and the password of everyone that had bought an item using BT Openzone. Using this info Peckover checked which of them had Gmail and ended up with with access to 500 email accounts.

Peckover then filtered these with keywords including "sort code", "exp" or "amazon", and removed them from his victim's inbox without them knowing. Using "fake mail", he'd then continue corresponding with the original sender.

This got him credit cards, and he opened many bank accounts, and gaming accounts with Ladbrokes and Skybet, under his victims' identities.

This scam got him a haul of a Porsche, and £40,000 in cash (in Sterling and Euros) stuffed into two containers. Detectives also seized a Breitling watch, a Rolex watch, a Nintendo Wii console, a Pioneer car stereo, the bullion in small handsize bars and six computers from Peckover's home. Passports in three names that he had used were also found.

Detective Constable Des Hamilton, of the Sussex Police Major Fraud Unit, said: "This is a classic example of a self-taught obsessive loner with real computer skills but no concern for his impact on other people.

"Peckover used his skills to systematically defraud legitimate online businesses and unsuspecting members of the public. He was caught time and again but seemed completely uncaring about others. We hope that this sentence will help him use his obvious talents for more honest activity. Computer-based crime is not victimless.

"The message for genuine computer users is to routinely check the security you hold on your home computers. Importantly, do not download something unless you are certain that it is safe. This is how these hackers access your computer. Also, and as important, change the passwords you hold periodically, particularly on financial sites and email accounts."

How to Delete Internet Tracks: Erase your Internet Activities With Tracks Eraser Pro

Tracks Eraser Pro 8.12 Build 1000 | 2.26 Mb

With Tracks Eraser Pro leave out any left trace of your Internet activities or other applications like iTunes, Quicktime, Windows Media, Office, etc. Your browser's capabilities to delete temporary files is not really as good as you think; with this tool you can erase any trace from the hard drive and keep personal data and private information safe from hackers or other users.

It was designed to be simple and easy to understand. It has a short menu of options, and a menu that lists everything to be cleaned from cookies and IP addresses to specific Web site passwords.
Pressing the erase button, a pop up will show what is being inspected. When finished, the status screen will show all the files that were cleaned, registry keys released, and disk space that was freed.

Protect yourself by erasing the cache, cookies, history, visited URLs, auto-complete, run and search history, recent documents from the browser, temp folder and more. If you wish you can add exceptions and always keep certain URLs or cookies

Home page - http://www.acesoft.net/


Download from RapidShare

Download Accelerator Plus Premium Download Free

Download Accelerator Plus Premium 9.4.0.7 Beta | 13.48 Mb

Download Accelerator Plus (DAP) is the worlds most popular download accelerator, giving you the fastest possible download speeds, with privacy, security, and ease of use. Allows you to download up to 300% faster with increased reliability, resume support and errors recovery. It searches for mirror sites that most effectively serve your downloads through multiserver connections for optimal utilization of dial-up or broadband connections. DAP automatically recovers from shutdowns, lost connections, and other errors.

It is fully integrated into Netscape, Internet Explorer, and Opera, Mozilla/Firefox and offers a toolbar for internet Explorer with a links catcher and a highlighter, providing the best possible performance from ANY internet connection (dial-up, cable, DSL / ADSL, T1 etc.), allowing a Faster and more Reliable download experience. It features auto-hang-up after downloading, proxy settings, scheduling, and a unique AlwaysResume service.

Download Link 1

Download Link 2

Defragmentation of Hard Disk For System Optimization: Download Advanced Defrag 4.5

Advanced Defrag 4.5 Datecode 18.06.2010 + (Rus) | 15.74 MB

Advanced Defrag - Complete Care for the health of your computer hard drive and Performance! Advanced Defrag is an award-wining professional program which is designed to cure system sluggishness and crashes. Program applies the most advanced defrag technology which enables you to completely and thoroughly analyze the disks and clean up all the fragmentation found in the computer disk with a very pleasant speed, effectively maximum the system performance and improve your working efficiency with the computer, it is definitely worth for your investment. Defragmentation is really important for your system's optimization. As your hard disk may be badly fragmented in the course of time, it would eventually cause negative problems to your computer like system slowdowns, PC crashes, slow startup and shutdown; it would even shorten the disk life span.

Benefits from Advanced Defrag:
• Completely & thoroughly defrag hard disk.
• Optimize computer system performance.
• Accelerate program & application launching.
• Improve working efficiency with the computer.

Download Link 1

Download Link 2

Israeli hacker hits IHH website

Thirty-year-old computer expert from Holon disables Turkish group's fundraising mechanism for hours.

An Israeli hacker managed to break into the website of Turkish IHH group, which organized the Gaza flotilla, disabling the organization's fundraising mechanism for a few hours.

The 30-year-old hacker from Holon, who wished to remain anonymous, said he was concerned with Israel's poor PR efforts and decided to make a contribution of his own.

"The real war today is online. I spent an entire week exploring the site, a few hours each night, until I succeeded," he said.

The hacker added that he was surprised to learn that IHH received some 9,000 euros in donations every hour via the website. The group is planning to send a second flotilla to Gaza next month.

Since the Navy's raid on the aid convoy, Turkish and Arab hackers have broken into hundreds of Israeli websites and inserted anti-Israel photos and messages. Israeli hackers responded by targeting various Turkish websites.

'Yes, we can'
However, the Holon hacker chose not to completely disable the website, but rather, inserted new content into it. For example, he replaced a large photo of the Marmara vessel with an image of an Israeli fighter jet, and a caption which read: "Yes, we can."

He also planted photos of the IDF's rescue unit helping earthquake victims in Turkey, as well as pictures showing Israeli leaders signing peace accords with Arab states on the White House lawn.

"I wanted to convey the message that Israel seeks peace," he said.

After four hours, the website's administrators finally managed to circumvent the online attack and restore the site's regular operations.

A hacker has posted sexually explicit comments on the Twitter, Facebook and blog accounts of Tory Member of Parliament Therese Coffey.

According to a report in the East Anglian Daily Times the messages included unpleasant remarks about Prime Minister David Cameron's wife, Samantha Cameron.

In an interview with the newspaper the MP for Suffolk Coastal said: "I came back to my computer and discovered someone had hacked into my website, blog, Facebook and Twitter - it is very frustrating."

She said she was having particular trouble getting help to regain control of her Twitter account.

"I have managed to get control back of them all apart from Twitter - I am still having trouble getting hold of anyone."

Hacking Criminals: 10 Convicted Computer Criminals

This is a guest post by Computer Science Schools

Wherever there’s a computer, there’s a way to hack. Computer criminals have jumped through virtual loopholes to steal identities and authorized government information, as well as infect computers and expose personal information. Although some computer criminals hack for experimental or learning purposes, most do it for personal wealth and gain. Either way, computer criminals teach us a great deal about computer security and keep us on our toes. Here are 10 convicted computer Hacking criminals:

Kevin David Mitnick
Mitnick was convicted of phone fraud, computer fraud and hacking into networks to steal computer software. Mitnick was most well known for his cell phone hacking spree, specifically the hacking of Digital Equipment Corporation’s network to steal their software, in addition to hacking major cell phone companies, Nokia and Motorola. He was considered one of the most wanted computer hackers in the U.S., but his arrest came after he cracked into fellow hacker Tsutomu Shimomura’s computer and was discovered by the FBI in 1995. He was sentenced to five years in prison.
Jeanson James Ancheta
Jeanson James Ancheta, a member of the infamous “botmaster underground” group, was arrested for selling armies of infected computers to hackers, with the intention of sending large quantities of spam across the Internet, causing damage to protected computers, causing damage to computers used by the federal government in national defense and hacking protected computers without authorization to commit fraud and money laundering. Ancheta was sentenced to 57 months in federal prison and required to pay $15,000 in restitution for the damages he caused to national defense networks.

Robert Tappan Morris
Robert Tappan Morris was convicted of intentionally accessing Federal interest computers without authorization, therefore, preventing authorized access that caused $1,000 in losses. He did so by creating the first worm, a computer virus, which was released on the Internet and drastically slowed down computers and crippled the Internet. Morris was fined, placed on probation for three years and had to complete 400 community service hours. This case was the first prosecution under the United States Code: Title 18, 1030, which involves fraud and related activity in connection with computers.

Gary McKinnon
Gary McKinnon, a British hacker, was convicted of breaking into U.S. military computers, in an attempt to find hidden alien technology that he thought would be the key to solving the global energy crisis. While hacking, McKinnon admitted to deleting files, hard drives and other materials that cost the government $700,000 to fix. McKinnon suffers from Asperger’s syndrome, which his attorneys have used in his defense, while the U.S. government argues his hack jobs were intended to breach American defense systems.

Kevin Poulsen
Kevin Poulsen, also known as the “Dark Dante,” was convicted of wire fraud and money laundering. Considered one of the smartest and sneakiest hackers, Poulsen managed to break-in to the FBI’s database, as well as hacked the phone lines to Los Angeles radio station KIIS, making him the 102nd caller and winner of a Porsche and a Hawaii trip. Poulsen was sentenced to five years in prison.
Gerald Wondra
Gerald Wondra was one the six men involved in a 1983 computer hacking case, called The 414s, in which hackers broke into a number of secured computer systems at the Los Alamos National Laboratory, Sloan-Kettering Cancer Center and Security Pacific Bank. Wondra was placed on probation for two years.

Raphael Gray
The Wales teenager, Raphael Gray, was arrested for hacking the databases of e-commerce sites to steal credit card numbers and personal information of 26,000 American, British and credit card holders. Gray, who was also known as the “Curador,” admitted to downloading the credit card numbers, but claimed he didn’t do it for personal gain and was instead trying to help the e-commerce sites. Gray’s penalty was three years of psychiatric treatment.
Cameron Lacroix
Cameron Lacroix was convicted of illegally accessing celebrity Paris Hilton’s cell phone account, and hacking into consumer data giant LexisNexis Inc., which made the personal records of more than 300,000 consumers public. Because Lacroix was a juvenile when the crime occurred, he had to spend 11 months in a juvenile detention facility, and was not allowed to use or own a cell phone, computer or any electronic device that has access to the Internet.

Jeffrey Lee Parson
Jeffrey Lee Parson was convicted of intentionally causing and attempting to cause damage to a protected computer with his version of the Blaster worm, called Blaster.B worm. He released the worm from his house, and it spread to computers using the Microsoft operating systems. Parson’s house was searched by federal agents on suspicion of writing and releasing malicious computer programs. He was arrested at 18 years old and was sentenced to 18 months in federal prison, as well as community service hours and restitution.
Adrian Lamo
Adrian Lamo, also known as “the homeless hacker,” would sleep in abandoned buildings and hack computers at Internet cafes and public libraries. He was arrested for breaking into the databases of high-profile organizations, such as Microsoft, Yahoo and the New York Times. Lamo was placed on probation for two years.

Thursday, June 17, 2010

Ethical Hacking Tips For Beginners: Hacking & Cracking Basics Tips

Free Penetration Testing

Centuno is now offering a Free Penetration Testing. Simulate an actual hacking attack with free Penetration Testing.

The beginners to ethical hacking could learn a thing or two from former hackers Rob Newhouse and Dan Verton. Verton authored and is a former U.S. Marine Corps intelligence officer. Newhouse was formerly chief technology officer of a New York City option market-making company. Together, they offer the following six valuable software development lessons:

1. Nothing is impossible. One of the major tenets of hacking and cracking has always been that nothing is impossible. Many problems are difficult to solve, but that means changing your approach in order to attack them from a different direction. The same thinking can be applied to enterprise development. It’s easy to claim that your deadlines are unrealistic, but are they really impossible? Newhouse notes that, like hacking a system, you must consider unusual solutions when coding business requirements.

2. Criticize your work. Learn to be brutally honest when it comes to evaluating your work. Find the strong and weak points. Hackers are always analyzing and criticizing their work; enterprise developers must do the same. Ideally, it should be a daily task that becomes a dynamic process.

3. Look for unique solutions. Impressing other hackers is one of the major driving forces behind hacking. That was Newhouse’s goal when he wrote a new piece of software. Earning fellow hackers’ praise for creativity was just as important as the personal pride he took in the accomplishment. In the corporate world, the goal is to work out a unique solution, taking into account cost and other parameters important to the enterprise. Striving for unique results benefits the organization and your reputation. Hunt for security vulnerabilities. Verton suggests taking security strategies out of the hacker’s playbook. In other words, think like they do.

4. Software doesn’t ship secure out of the box. Software is not shipped with standard security settings. When you buy a new operating system, systems administrators must go through it carefully. All default settings must be changed. Hackers know this, and it makes it easier for them to break into a system. Enterprise developers would do well to follow suit and consider potential security lapses in their designs.

5. Find systems’ vulnerabilities. Take a defensive position and look at your enterprise from the hacker’s perspective. It’s a good idea to actually hack your system for its vulnerabilities. This should be done regularly, especially when you have a change in your enterprise — new users, for example. The formal term for this process, “Red Teaming,” originated in the military. Red Teaming is a vulnerability assessment that targets information-based systems and associated support infrastructure to uncover security problems and devise fixes.

6. Monitor what’s being posted out about your company. Search the Internet to find out what’s being said about your company or its software. Hackers use this reconnaissance technique to gather information on their targets, for example; when administrators unwittingly release information a hacker can use to gain entry into a system. Regularly gathering such defensive intelligence will help you stay a step ahead of the hackers.

How to Hack Hotfile: Hotfile Hacker: Download Hotfile Premium Link Generator

Hotfile Premium Link Generator 1.4 | 6MB

Don’t have premium to download on Hotfile? Don’t worry.. Here are the new Premium Link Generator for you.. You will get full SPEED DOWNLOAD !

Version 1.4:

-Tested on windows xp sp3 and windows 7
-If you are using vista/ windows 7, try run as administrator
-Added help file
-This application has premium built in.

Download link 1

Download link2

How to play the London Mafia Wars

Recently the Mafia Wars game, which you can play on Facebook, has been introducing new special challenge missions. The first one took you to Paris, and now this new challenge available is taking you to London. This is an exciting new challenge to this game, and it has you trying to obtain a Crown Jewel. Along the way you will find yourself dealing with the Secret Service in Britain, and later you will work to escape away to India where you will finally get your reward. Of course, you may be wondering how to play Mafia Wars London challenge. Here is some helpful information about this challenge to help you out as you play mafia games.

This new challenge mission is going to last for three weeks, but even before it started you were able to start getting the important British Passports when you did jobs, robbed, or got involved in fights within the game. Having plenty of passports is definitely going to be important, since they are needed for each job that you do. The great thing is that there are some great Limited Edition items available when you complete these jobs.

The main goal of this new London challenge within mafia games is to complete every stage. Within each stage, there are four different jobs that you have to complete. Once you complete each of the jobs, you go on to the next step. In order to participate in this new challenge, you have to add a new member to your mafia. As you complete every chapter within the game, more slots will be added for the London Crew. New people that join up with your mafia are going to be added to the crew and you will get more passports for each new crew member as well. The great thing is that you only have to complete each job one time. There are not mastery levels like there are in other areas of the Mafia Wars Game.

Collecting the Passports

As we already mentioned, you can collect passports in jobs, fights, and while robbing. These passports are randomly dropped so you never know when they will show up. Also, when you get new members to the London crew, you will get more passports. There is yet another way that you can get passports. During the week before the game opened, you could collect 12 passports each day by visiting the London area of the game. During week one of the game, you are able to collect 30 passports every day. Once week two begins you will be able to collect 40 passports every 24 hours, and then in the last week, week three, you can get 50 every 24 hours. Make sure that you do collect these passports every day because you use them up when doing the jobs in London.

The Job Heat Meter

One of the most important things you need to know about in the new London Challenge in Mafia Wars is the job heat meter. This is a special meter that you will notice when you go to London. It is located right above the jaws. When the job heat meter is empty or in the green, you are paying the base amount of energy and using the minimum amount of passports to do a job. However, after doing so many jobs, the heat meter turns gold. This means you have to use more energy for each job and it will require more passports. You can wait for eight hours and come back and the heat meter will be back at zero again. The heat meter can turn red as well. If this occurs, you are using the maximum amount of energy to do a job and using the maximum amount of passports. It is recommended to come back every eight hours to avoid using too many of your passports to do the jobs.

The Rewards

It is not quite clear what all the rewards will be as you master the levels of London within the mafia games. However, within the first tier of jobs, when you finish up this level, you will get a special Blockade Auto Shotgun. This offers a great 58 in attack and 48 in defense. It is definitely a great weapon to add to your mafia arsenal. The second tier offers a great reward for mastery as well. You get a special FSB Agent that has 42 in attack and a whopping 76 in defense. Since the third chapter is not yet open yet, it remains to be seen what kind of reward will be offered once you master that chapter.

OTHER USEFUL LINKS FOR FACEBOOK MAFIA WAR:

**


**

Wednesday, June 16, 2010

Determining if something is secure can be difficult. Fortunately, software has the advantage of testing regimens like the Pwn2Own contest. If the software has any weaknesses, the highly-qualified contestants will find them.

It took reading about that Chrome is secure, and I needed to switch. I also started wondering what sets Chrome apart when it comes to security. After a little digging, I met Ian Fette of the Google Chrome team. He provided the needed insight:

TechRepublic: It’s been mentioned numerous times that security was a top priority when designing Chrome. Could you list the top three security concerns of the development team?


Fette: When building Google Chrome, we wanted to design the browser with security in-depth. We know that there isn’t a single silver bullet to solve all security problems so we wanted to develop security functionality in all levels of the application. Three areas where we invested a lot of time were:
  • Warn users when they were accessing an unsafe site.
  • Work to keep untrusted code from leaving the browser’s sandboxed renderer.
  • Ensure that users always have the latest and most up to date version of the browser in as quick a time as possible.
TechRepublic: Those concerns make sense; could you briefly explain what the development team came up with to overcome each of the concerns?

Fette: To warn users that they may be accessing a phishing site or a web site that contains malware, we were able to utilize our , which already powers similar functionality in Google Search, as well as in Firefox and Safari. Safe Browsing warns users through an interstitial page that the site they are about to visit may not be safe.

To prevent untrusted code from leaving the renderer process we implemented what’s known as a “sandbox” around the renderer. This added level of security makes it harder for an attacker to exploit code on your computer, because even if they find a vulnerability in the renderer, they still are stuck in the sandbox.

Finally, to ensure users are always up to date with the latest version of the browser, including having the most recent security patches, we developed an automated system that updates the browser in the background without any manual intervention.

In order to meet their goals, the Chrome development team decided to use what is called multi-process architecture.

Multi-process architecture

By design, multi-process architecture splits the browser application into component processes. This way if one fails, the entire browser does not crash. Chrome is divided into the following processes:
  • Browser: This process manages tabs, windows, and “chrome” of the browser. This process also interfaces with the hard drive, network, user input, and display.
  • Renderer: This process is responsible for displaying web pages using HTML, JavaScript, CSS, and images. Renderers are controlled by software called the WebKit rendering engine.
  • Plug-ins: By design, a process is created for each plug-in or extension that is in use.
  • Now, to some questions about multi-process architecture:

TechRepublic: If I understand correctly, Google was the first to use multi-process architecture for Web browsers. How is Google’s implementation different from other web-browser applications?

Fette: Google took a novel approach by breaking down the browser into distinct components — the browser, the renderer, and plug-ins. When we launched, we were the only major browser with this approach, which gave us a number of advantages.

For instance, if a plug-in crashes, the page you are viewing stays visible and remains responsive, it’s just the portion of the page being rendered by the plug-in that turns into a “sad” icon.

The policy we set on renderer processes prevents malicious code running in the renderer from doing either reads to or writes from the user’s file system (desktop etc), registry, and more. This policy is stricter than other browsers shipping today, and also applies to Windows XP, which still has significant market share.

TechRepublic: I remember being surprised at the number of processes Chrome can have open. Is there a limit to the number of web sites that can be open at the same time? If so what happens after the limit is reached?

Fette: We limit the number of processes we will create, not the number of web sites you can open. We do this to achieve optimal performance tradeoffs, based largely on the amount of memory on your system (if you have more memory, we will limit the number of processes at a higher number).

Once you hit the limit on the number of processes, new tabs that you open will share a renderer process with other tabs. So, if you have 20 windows open with 20 tabs each, for a total of 400 tabs, it’s possible that each renderer process might be supporting 10 tabs each, as opposed to overloading your computer with 400 different Chrome processes.

Chrome sandbox

Besides stability, multi-process architecture affords another benefit. By design, individual processes are not dependent on each other and can be isolated in what Google calls Chrome sandboxes. The following analogy penned by Esalkin on the Sandboxie forum is a great way to explain sandbox applications to those not familiar with them:


“Think of your PC as a piece of paper. Every program you run writes on the paper. When you run your browser, it writes on the paper about every site you visited. And any malware you come across will usually try to write itself into the paper.


Traditional privacy and anti-malware software try to locate and erase any writings they think you wouldn’t want on the paper. Most of the time they get it right. But first, the makers of these solutions must teach the solution what to look for on the paper and how to erase it safely.


On the other hand, a sandbox works like a transparency layer placed over the paper. Programs write on the transparency layer and to them it looks like the real paper. When you delete the sandbox, it’s like removing the transparency layer, the real paper is unchanged.”

Experts, such as Charlie Miller sees the use of sandboxes as the reason Chrome has not been exploited:

“They’ve got that sandbox model that’s hard to get out of. With Chrome, it’s a combination of things, you can’t execute on the heap, the OS protections in Windows and the sandbox.”

How the Chrome sandbox works

Remember the renderers that I mentioned earlier? They are the sandboxed processes in Chrome. Because they are in sandboxes, the only resources renderers (Web page tabs) can use are CPU cycles and memory. Examples of what renderers cannot do, would be write to disk or display their own window. Those tasks are controlled by the browser process.

In order to achieve this, Google Chrome uses the Windows security model based on access tokens. An access token consists of information about the process owner and the privileges the process has. After reading the access token, the operating system then knows what resources that particular process or sandbox can access. Here is Google’s explanation:

“Before launching the renderer process we modify its token to remove all privileges and disable all groups. We then convert the token to a restricted token. A restricted token is like a normal token, but the access checks are performed twice, the first time with the normal information in the token, and the second one using a secondary list of groups.


Both access checks have to succeed for the resources to be granted to the process. Google Chrome sets the secondary list of groups to contain only one item, the NULL user. Since this user is never given permissions to any objects, all access checks performed with the access token of the renderer process fail, making this process useless to an attacker.”

How this helps

Using sandboxes prevents an attacker from exploiting the Web browser. Malicious code can be run by the sandboxed process, but the malware will not be able to read or modify any files on the computer. I again turned to Ian Fette for help in understanding the details.

TechRepublic: Could you give some real-world examples of what our computers will be protected from by using Chrome sandboxes?

Fette: Like many other browsers, we maintain a list of security vulnerabilities that we have fixed. Many of the listed vulnerabilities are mitigated by the sandbox. For instance, we had an integer overflow in our JavaScript engine that, were it not for the sandbox, would allow an attacker to run any arbitrary code on your computer.

Because of the sandbox, the exposure due to this vulnerability was much less. An attacker would not, for instance, have been able to install malware that would persist on your computer after the tab had been closed.

TechRepublic: A colleague wanted me to ask if plug-ins and extensions are sandboxed?

Fette: Extensions in Google Chrome are sandboxed, because they operate just like normal Websites and are written using standard Web languages like HTML, JavaScript, and CSS.

Plug-ins are not sandboxed right now, but we are working to bring them into the sandbox. Our recent announcement about integrating Adobe Flash into Google Chrome is a big step towards helping us operate Flash in the sandbox.

TechRepublic: With regards, to Chrome sandboxes, I have read they work differently when using operating systems newer than Windows XP. Could you elaborate on that? Is there a benefit to using the newer OSs?

Fette: In Vista and later, extra capabilities are introduced to lock down a process, namely “integrity levels.” Chrome applies low integrity on top of the normal restrictions applied by the Chrome sandbox on both XP and Vista.

While this theoretically makes the Vista sandboxing capabilities stronger, we are not aware of any practical attacks against Chrome where this would have made a meaningful difference. However, it does provide another layer of defense, and so we do use the integrity levels on Windows versions where they are available, as a defense-in-depth practice.


Final thoughts

I am no expert when it comes to Web browser design, but Charlie Miller is. If he can’t exploit Chrome, that means something. I now have a better idea as to why he can’t thanks to Google’s Ian Fette. I also want to thank Eitan Bencuya of Google Communications, for connecting me with Ian.

Source: TechRepublic

Hackers exploit Microsoft XP security flaw

Malicious hackers are exploiting last week's disclosure of a Microsoft XP security hole to install Trojan horse malware onto computers.

A Google engineer controversially disclosed details of a Help and Support Centre last week in a bid to get Microsoft to resolve it quicker.

Yet as some security experts feared, hackers have now exploited this hole to install Trojan horse malware onto people's computers.

Security firm Sophos has found a compromised website that uses the vulnerability to drop this Trojan and make it possible for the computer to then be accessed and controlled remotely.

Graham Cluely of Sophos said: "A responsible security researcher would have been happy working with Microsoft on a successful resolution of the issue, and only shared details once a safe patch had been developed."

"Five days isn't a sensible period of time to expect Microsoft to develop a fix which has to be tested thoroughly to ensure it doesn't cause more problems than it intends to correct," he continued.

The engineer, Tavis Ormandy, did offer a workaround to the flaw yet Microsoft said at the the time that this may not work and could damage other elements of the operating system.

Download Free Vulnerability Scanner Netsparker: Web Application Security Testing Tool

Free Penetration Testing

Centuno is now offering a Free Penetration Testing. Simulate an actual hacking attack with free Penetration Testing.

SOURCE: Techkranti

"This is probably the best web-app tool that I have ever seen. Of course, I am not a hacker... Really :) But I have reviewed some penetration test results and other tools, and of course I know a lot of hackers, so I can say that your tool covers all of the most important things. Also, the interface is simple and clean. I know some of the hackers and engineers that work for iDefense-VeriSign would love to see this in action. Thanks for the demo..."
Eli Jellenc, International Cyber Threat Analysis Manager, VeriSign

Netsparker® can find and report security issues such as SQL Injection and Cross-site Scripting (XSS) in all web applications regardless of the platform and the technology they are built on. Netsparker's unique detection and exploitation techniques allows it to be dead accurate in reporting hence it's the first and the only False Positive Free web application security scanner.

List of vulnerabilities check:

SQL Injection

Netsparker can detect different SQL Injections including Error Based, Blind and Time Based SQL Injections. SQL Injection engine is quite comprehensive and can detect Blind SQL Injections even in complicated queries.
After identification of the vulnerability, Netsparker will carry out extra checks to identify if the database user used by the application has admin privileges. In this case it'll report a separate issue called “Database User Has Admin Privileges”

XSS (Cross-site Scripting)

Netsparker identifies Permanent/Stored and Reflective Cross-site Scriptings. Cross-site scripting issues can be identified in parameters or in the URL. It carries out several different attacks to bypass known and custom weak protections.

XSS (Cross-site Scripting) via Remote File Injection

Netsparker detects if it's possible to call a remote file to execute JavaScript in the current page by an attacker. This can be used by attackers to carry out normal Cross-site scripting attacks.

XSS (Cross-site Scripting) in URLs

Netsparker detects Cross-site Scripting issues in URLs. This is common in websites using URL Rewrite and PHP.

Local File Inclusions & Arbitrary File Reading

Netsparker detects Local File Inclusion and Arbitrary File Reading issues. It detects if an attacker can access files and source code from the server. It supports Windows and *nix systems. It carries out advanced checks, it uses process directories, Null byte injection attacks, dynamic file extension replacements and many other methods to bypass weak filters and black listings. It checks if the Local File Inclusion can be used for executing remote commands by injecting code into log files. Netsparker has exploitation features for Local File Inclusion attacks.

Remote File Inclusions

Netsparker detects if the application is vulnerable to Remote File Inclusions which allow an attacker to inject a remote file and execute piece of code in the server. Netsparker carries out several dynamic requests and tries to bypass many weak protections and black-listings.

Remote Code Injection / Evaluation

Netsparker detects if the application evaluates / executes the given code in the application by using a dangerous call such as eval(). This is a very dangerous vulnerability and an attacker can use this to execute code in the server.

OS Level Command Injection

Netsparker detects if an attacker can inject OS command via the web application to execute code in the server. This vulnerability can allow an attacker to gain full access over the server and the web application.

CRLF / HTTP Header Injection / Response Splitting

Netsparker detects CRLF injection issues in the web applications. This issue can cause many problems, most common of which are Cross-site scripting and session hijacking through carrying out a session fixation attack.

Find Backup Files

Netsparker tries to find backup and temporary files in the target website by using crawled file names and well-known names. Netsparker identifies if this problem can lead to source code disclosure issues.

Crossdomain.xml Analysis

Netsparker detects and analyses crossdomain.xml files for problems such as open access policy.
An attacker needs to attack an authenticated user of the website to successfully exploit this problem. The attacker can read authenticated users' private messages or carry out actions as the attacked user. If Crossdomain.xml file has open policy then the attacker can bypass any CSRF protections (nonce / CSRF tokens).

Finds and Analyse Potential Issues in Robots.txt

Netsparker detects and parses links in Robots.txt files. If it identifies a potentially critical URL listed in the Robots.txt, it will report the problem with details.

Finds and Analyse Google Sitemap Files

Netsparker detects and parses Google Sitemap files to increase the coverage and informs the user that the sitemap file is accessible to confirm that this is the intended behaviour.

Detect TRACE / TRACK Method Support

Netsparker checks and identifies if TRACE / TRACK HTTP Methods are supported and enabled by the web server.

Detect ASP.NET Debugging

Netsparker identifies if ASP.NET Debugging is enabled.

Detect ASP.NET Trace

Netsparker detects if ASP.NET Tracing is enabled and accessible. An attacker can use ASP.NET Tracing output to access active users' sessions and gather information about the application and its structure.

Checks for CVS, GIT and SVN Information and Source Code Disclosure Issues

Netsparker detects files disclosed by source code versioning systems such as CVS, GIT and SVN.
An attacker might exploit this problem to gain access to the source code of the application or might retrieve configuration and other important files.

Finds PHPInfo() pages and PHPInfo() disclosure in other pages

Netsparker attempts to find forgotten PHPInfo files in the system. It also reports PHPinfo() output in all crawled pages. Disclosed information from PHPInfo() might help attackers to gain more information about the target system.

Finds Apache Server-Status and Apache Server-Info pages

Netsparker detects if the Apache Server-Status or Server-Info pages are publicly accessible.
Apache Server-Status and Server-Info can be used by attackers to gain more information about the target system and will help them to find hidden URLs and currently visited URLs.

Find Hidden Resources

Netsparker looks for hidden files and directories in the target website.

These include:
Test files
Management files and directories
Known vulnerable files / scripts
For example, even if it's not linked anywhere in the website, Netsparker will identify the “admin” directory.
Basic Authentication over HTTP

Netsparker reports if the server requests Basic Authentication over HTTP.

An attacker who can sit between the user and the website might carry out a MITM (Man in the middle) or sniffing attack to capture the user's password.
Password Transmitted over HTTP

Netsparker identifies if the website sends passwords over HTTP.

An attacker who can sit between the user and the website might carry out a MITM (Man in the middle) or sniffing attack to capture the user's password.
Password Form Served over HTTP

Netsparker identifies if a login form is served over HTTP and target of the form is HTTPS.

Many developers might not be aware that this is a security issue, therefore Netsparker reports a detailed issue for this problem to ensure that issue is correctly addressed by developers.
An attacker who can sit between the user and the website might carry out a MITM (Man in the middle) and inject a piece of JavaScript code to steal the password before it reaches HTTPS or the attacker can easily change the target of the form to HTTP as well to steal the user's password.

Source Code Disclosure

Netsparker provokes the web server to disclose source code where possible and detects if the source code disclosure is due to a configuration problem, a security issue or just commented code.

An attacker can access hard coded passwords, might learn more about the logic of the application and gain more information about the system by reading the disclosed source code.

Auto Complete Enabled

Netsparker identifies if Auto Complete is left Enabled in sensitive form fields such as Credit Card numbers. An attacker who can access the user's computer can access these auto complete data cached by the browser. This is especially critical if the website is used from public computers.

ASP.NET ViewState Analysis

Netsparker analyses ViewState related issues in ASP.NET pages.

ViewState is not Signed

Netsparker reports a new issue if the ViewState in the page is not signed. In this case an attacker might modify the content of the ViewState and subvert the logic of the application or carry out other attacks by changing the ViewState .

ViewState is not Encrypted

Netsparker reports a vulnerability if the ViewState in the page is not encrypted. In this case an attacker can read the data within ViewState by simply decoding it. This might leak sensitive information.

E-mail Address Disclosure

Netsparker identifies email addresses exposed on the website. This can help users to identify what sort of information they exposed on the internet and can also .

Internal IP Disclosure

Netsparker identifies internal IP Disclosure issues where a system exposes its internal network IP address.

Cookies are not marked as Secure

Netsparker reports an issue if cookies are not marked as “Secure” in HTTPS websites.
Not marking cookies as “Secure” can allow attackers to steal the cookies over an HTTP connection and use those cookies to login to the application.

Cookies are not marked as HTTPOnly

Netsparker reports an issue if the cookies are not marked as HTTPOnly.

JavaScript can't read cookies if they are marked as “HTTPOnly”; this means a Cross-site Scripting attack can't just steal the cookies via JavaScript. However that doesn't mean the application is secure. Cross-site Scripting vulnerabilities should be addressed even if cookies are marked as “HTTPOnly”, since there are many other ways to use Cross-site Scripting attacks.
“HTTPOnly” should be considered as a defence in depth feature and should be used where possible.

Directory Listing

Netsparker detects if directory listing is enabled in the web server. Directory listing can allow attackers to see all files in the system and help them to gain more information or download sensitive files from the target system.

Stack Trace Disclosure

Netsparker identifies if the target application is disclosing stack trace information.
Stack trace can leak information about internals of the application and might include some sensitive data or application logic related clues.

Version Disclosure

Netsparker identifies version disclosures in HTTP Headers and HTTP responses. It supports many frameworks and well known languages and web servers such as ORACLE, IIS, PHP, ASP.NET, Apache, Apache Modules, JSP.

Access Denied Resources

Netsparker reports an information issue when access is denied to the requested resources.
This can help the user to identify the design of the application and possible resources that exist in the web server but are not publicly available.

Internal Path Disclosure

Netsparker identifies if an application discloses internal paths related to the application or the configuration. This generally indicates a programming error in the application and can help an attacker to gain more information about internals of the system. An attacker can use this information while crafting an exploit for another identified vulnerability.

Programming Error Messages

Netsparker provokes the given website to give error messages and reports these. These errors have no direct security impact but most of the time they indicate a programming error, quality issue or potential vulnerability in the application.

Many of them also leak information about the logic or implementation of the application, which can help an attacker to identify or exploit other related issues.

Database Error Messages

Netsparker provokes and reports database error messages leaked by the website. If the problem is related to SQL Injection, then a separate issue will be raised by Netsparker; otherwise this is reported to inform the user that the application is giving away some database error messages which is potentially related to a programming error or another problem regarding the database connectivity.

Newer Posts Older Posts Home