28
February

See Hidden Facebook Pictures

Follow these steps :-1. Go to the Profile-page of the Person.2. Clear your Address line3. Copy this into:Code:javascript:(function(){CSS.removeClass(document.body,%20'profile_two_columns');tab_controller.changePage("photos");})()4. Now you can easily see Pictures of s.b. you don't even kn ...
28
February

Download Free Quick heal total security 2010 Full Version

DOWNLOAD FREE QUICK HEAL TOTAL SECURITY 2010 FULL VERSIONQuick Heal AntiVirus 2010, with its intuitive and easy-to-use interface, provides hassle-free protection for your system. Once installed it acts as a shield against viruses, worms, trojans, spywares and other malicious threats. It also provides protection against new and unknown viruses using Quick Heal's renowned DNAScan technology, and blocks malicious ...
28
February

Download Free BitDefender Total Security 2011 x86 Final Full Version

BitDefender Total Security 2011 x86 Final + Serial KeyBitDefender Total Security 2011 x86 Final Full Version | 215.6 MbBitDefender 2011 product line has just launched, and the developer announces hefty improvements to the modules that maintained your PC secure in the previous edition, as well as new features to increase protection and turn handling the applications into less of a challenge for all types of ...
28
February

Metasploit Explained A Tutorial For Beginners

Metaspoit Framework is a open source penetration tool used for developing and executing exploit code against a remote target machine it, Metasploit frame work has the world's largest database of public, tested exploits. In simple words, Metasploit can be used to test the vulnerability of computer systems in order to protect them and on the other hand it can  alsobe used to break into remote systems. ...
26
February

Anonymizers- Make your web surfing anonymous

         Anonymizers are services that help make your own web surfing anonymous.    *      The first anonymizer developed was Anonymizer.com, created in 1997 by Lance Cottrell.    *      An anonymizer removes all the identifying information from a user's computers while the user surfs the Internet, thereby ensuring the privacy of the user.      Many anonymizer sites create an anonymized URL by appending the name of the site the user wishes to access to their own URL, e.g.:      http://anon.free.anonymizer.com/http://www.yahoo.com/      ...
26
February

What is Proxy?

Proxy is a network computer that can serve as an intermediate for connection with other computers. They are usually used for the following purposes: As firewall, a proxy protects the local network from outside access.    *      As IP-addresses multiplexer, a proxy allows to connect a number of computers to Internet when having only one IP-address    *      Proxy servers can be used (to some extent) to anonymous web surfing.    *      Specialized proxy servers can filter out unwanted content, such as ads or 'unsuitable' material.    *      ...
26
February

Cheops-Network management tool-equivalent of a Swiss-army knife

Cheops (KEE-ops) is a Network management tool for mapping and monitoring the network. It has host/network discovery functionality as well as OS detection of hosts.Cheops is an Open Source Network User Interface. It is designed to be the network equivalent of a Swiss-army knife, unifying your network utilities. Cheops does for the network what a file manager does for the file system.Cheops can optionally determine ...
26
February

Passive Fingerprinting

    * Passive fingerprinting is also based on the differential implantation of the stack and the various ways an OS responds to it.    * However, instead of relying on scanning the target host, passive fingerprinting captures packets from the target host and study it for tell tale signs that can reveal the OS.    * Passive fingerprinting is less accurate than active fingerprinting.Like active fingerprinting, passive fingerprinting is also based on the differential implantation of the stack and the various ways an OS responds to it. However, instead of relying on scanning the target host, passive fingerprinting captures packets from the ...
26
February

Active Stack Fingerprinting: This technique is called OS fingerprinting

    * Fingerprinting is done to determine the remote OS    * Allows attacker to leave smaller footprint and have greater chance to succeed    * Based on the fact that various OS vendors implement the TCP stack differently    * Specially crafted packets sent to remote OS and response is noted. This is compared with a database to determine the OSConcept  The term OS fingerprinting defines any method used to determine what operating system is running on a remote computer. OS fingerprinting is an essential part of network reconnaissance, because the attacker has a greater probability of succeeding in his attack if he can ...
26
February

Tool: Super Scan - Port scanner

SuperScan is a powerful connect-based TCP port scanner, pinger and hostname resolver. Released by Foundstone, its multithreaded and asynchronous techniques make this program extremely fast and versatile. SuperScan can do ping sweeps and scan any IP range. The attacker can also compile a list of target IP as a text file and use SuperScan to extract this list for scanning. The visual interface allows the attacker ...
26
February

Tool: Net Scan Tools Pro

NetScanTools consists of many independent network functions joined together in a single tabbed window. Most functions are designed to run in separate threads so several tabs can be used simultaneously. This program operates best on the newer Windows platforms.NetScanTools Pro has a scanner tab - Port Prober, which will be discussed here. Port Probe (a port scanner) is an essential tool in determining the services ...
26
February

Ethical Hacker and Scanning Tools

Ethical Hacker and Scanning ToolsCan an ethical hacker simulate the scanning techniques to ensure the security of the network? The first and foremost armor is knowledge itself. The results of a scanner can be misleading if the ethical hacker does not have a good knowledge of common vulnerabilities, commonly affected hosts, and patterns indicating misuse.Apart from this, performing an exhaustive scan against all ...
26
February

What is Nslookup?

What is Nslookup    *      Nslookup is a program to query Internet domain name servers. Displays information that can be used to diagnose Domain Name System (DNS) infrastructure.    *      Helps find additional IP addresses if authoritative DNS is known from whois.    *      MX record reveals the IP of the mail server.    *      Both Unix and Windows come with a Nslookup client.    *      Third party clients are also available - E.g. Sam Spade      Nslookup employs ...
26
February

Footprinting - Attack Methods

Attack Methods The attacker may choose to source the information from:* A web page (save it offline, e.g. using offline browser such as Teleport pro * Yahoo or other directories. (Tifny is a comprehensive search tool for USENET newsgroups. * Multiple search engines (All-in-One, Dogpile), groups.google.com is a great resource for searching large numbers of news group archives without having to use a tool.* Using advanced search (e.g. AltaVista),* Search on publicly trade companies (e.g. EDGAR).* Dumpster diving (To retrieve documents that have been carelessly disposed)* Physical access (False ID, temporary/contract employees, unauthorized access etc)There are four RIRs, each maintaining ...
26
February

What is Footprinting?

Defining Foot printing    *      Foot printing is the blueprinting of the security profile of an organization, undertaken in a methodological manner.    *      Foot printing is one of the three pre-attack phases. The others are scanning and enumeration.    *      Foot printing results in a unique organization profile with respect to networks (Internet / Intranet / Extra net / Wireless) and systems involved.      There is no single methodology for foot printing, as a hacker can choose several routes to trace the information. Foot printing therefore, ...
26
February

Hacker Classes - Black hats, White Hats, Gray Hats,

Continuing to my old post who-are-hackers.htmlHacker Classes * Black hats o Individuals with extraordinary computing skills, resorting to malicious or destructive activities. Also known as 'Crackers.' * White Hats o Individuals professing hacker skills and using them for defensive purposes. Also known as 'Security Analysts'. * Gray Hats o Individuals who work both offensively and defensively at various times. * Ethical Hacker Classes o Former Black Hats + Reformed crackers + First-hand experience + ...
26
February

Hacking Phase 5 - Covering Tracks

Phase 5 - Covering Tracks * Covering Tracks refers to the activities undertaken by the hacker to extend his misuse of the system without being detected. * Reasons include need for prolonged stay, continued use of resources, removing evidence of hacking, avoiding legal action etc. * Examples include Steganography, tunneling, altering log files etc. * Hackers can remain undetected for long periods or use this phase to start a fresh reconnaissance to a related target syst ...
26
February

Hacking Phase 3 - Gaining Access - The hacker exploits the system

Phase 3 - Gaining Access*Gaining Access refers to the true attack phase. The hacker exploits the system.*The exploit can occur over a LAN, locally, Internet, offline, as a deception or theft. Examples include stack-based buffer overflows, denial of service, session hijacking, password filtering etc.*Influencing factors include architecture and configuration of target system, skill level of the perpetrator and initial level of access obtained.*Business Risk - 'Highest' - The hacker can gain access at operating system level, application level or network lev ...
26
February

Hacking Phase 4 - Maintaining Access

Phase 4 - Maintaining Access * Maintaining Access refers to the phase when the hacker tries to retain his 'ownership' of the system. * The hacker has exploited a vulnerability and can tamper and compromise the system. * Sometimes, hackers harden the system from other hackers as well (to own the system) by securing their exclusive access with Backdoors, RootKits, Trojans and Trojan horse Backdoors. * Hackers can upload, download or manipulate data / applications / configurations on the 'owned' syst ...
26
February

Hacking Phase 1 - Reconnaissance

    *      Reconnaissance refers to the preparatory phase where an attacker seeks to gather as much information as possible about a target of evaluation prior to launching an attack. It involves network scanning either external or internal without authorization    *      Business Risk - To see if someone is watching and responding. Could be future point of return when noted for ease of entry for an attack when more is known on a broad scale about the target.    *      Passive reconnaissance involves monitoring network data for patterns and clues.          ...
26
February

Hacking Phase 2 - Scanning

Phase 2 - Scanning    *      Scanning refers to pre-attack phase when the hacker scans the network with specific information gathered during reconnaissance.    *      Business Risk - 'High' - Hackers have to get a single point of entry to launch an attack and could be point of exploit when vulnerability of the system is detected.    *      Scanning can include use of dialers, port scanners, network mapping, sweeping, vulnerability scanners e ...
26
February

Hacktivism

 * Refers to 'hacking with / for a cause'. * Comprises of hackers with a social or political agenda * Aims at sending across a message through their hacking activity and gaining visibility for their cause and themselves. * Common targets include government agencies, MNCs, or any other entity perceived as 'bad' or 'wrong' by these groups / individuals. * It remains a fact however, that gaining unauthorized access is a crime, no matter what the intent. Most hacktivists aim at sending across a message through their hacking activity and gaining visibility for their cause and themselves. Common targets include government agencies, MNCs, or any other entity ...
26
February

What do Ethical Hackers do?

  * "If you know the enemy and know yourself, you need not fear the result of a hundred battles." - Sun Tzu, Art of War * Ethical hackers tries to answer: o What can the intruder see on the target system? (Reconnaissance and Scanning phase of hacking) o What can an intruder do with that information? (Gaining Access and Maintaining Access phases) o Does anyone at the target notice the intruders attempts or success? (Reconnaissance and Covering Tracks phases) * If hired by any organization, an ethical hacker asks the organization what it is trying to protect, against whom and what resources it is willing to expend ...
25
February

Can Hacking Be Ethical?

Can Hacking Be Ethical?    *      The noun 'hacker' refers to a person who enjoys learning the details of computer systems and stretch their capabilities.    *      The verb 'hacking' describes the rapid development of new programs or the reverse engineering of already existing software to make the code better, and efficient.    *      The term 'cracker' refers to a person who uses his hacking skills for offensive purposes.    *      The term 'ethical hacker' refers to security professionals who apply their hacking skills for defensive ...
25
February

Test your hacking Skill

Test your hacking Skill athttp://www.hellboundhackers.orgThe hands-on approach to computer security. Learn how hackers break in, and how to keep them out..................... ...
25
February

Download Free SMS Bomber International V4.2

Download Free SMS Bomber International V4.2   Virus Total:http://www.virustotal.com/analisis/3e5ec...1270281118 Download From H ...
25
February

Learn How To Hack Websites With LFIntruder (Lfi scanner)

Hi all,i'd like to share some of my stuff with my blog visitors.It Will Help to scan websites for Lfi(Local File Inclusion)SnapShot:Download mirror:[Warning! This file can include malicious contents which you may not be aware of!] Multiupload.com - upload your files to multiple file hosting sites!Password: inter ...
25
February

Hack Yahoo,Hotmail,Myspace,MSN account passwords

Hello Friends here is One More tutorial about hacking Facebook , Hotmail ,Yahoo ,Gmail ,Twitter ,orkut ,myspace and msn accounts with easy as 1 2 3 . In my previous article, I mentioned about  Armadax Key logger for Hacking Hotmail, Yahoo, Myspace and Msn account passwords. Today i am Introducing a very effective key logger namely Vicspy key logger - the key logger that I found extremely Good and user-friendly ...